Privacy-Friendly Energy-Metering via Homomorphic Encryption

  • Flavio D. Garcia
  • Bart Jacobs
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6710)


The first part of this paper discusses developments wrt. smart (electricity) meters (simply called E-meter s ) in general, with emphasis on security and privacy issues. The second part will be more technical and describes protocols for secure communication with E-meter s and for fraud detection (leakage) in a privacy-preserving manner. Our approach uses a combination of Paillier’s additive homomorphic encryption and additive secret sharing to compute the aggregated energy consumption of a given set of users.


smart-metering privacy homomorphic encryption 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [CK08]
    Cuijpers, C., Koops, B.-J.: Het wetsvoorstel slimme meters: een privacytoets op basis van art. 8 EVRM. Technical report, Tilburg University, Report (October 2008) (in Dutch) Google Scholar
  2. [CPW09]
    Cavoukian, A., Polonetsky, J., Wolf, C.: SmartPrivacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation (November 17, 2009),
  3. [EPI09]
    EPIC. Comments of the Electronic Privacy and Information Center on the NIST Smart Grid Standards (December 1, 2009),
  4. [Har89]
    Hart, G.: Residential energy monitoring and computerized surveillance via utility power flows. IEEE Technology and Society Magazine 8(2), 12–16 (1989)MathSciNetCrossRefGoogle Scholar
  5. [JP09]
    Jacobs, B., Pieters, W.: Electronic voting in The Netherlands: From early adoption to early abolishment. In: Aldini, A., Barthe, G. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 121–144. Springer, Heidelberg (2009)Google Scholar
  6. [KR08]
    Keemink, S., Roos, B.: Security Analysis of Dutch Smart Metering Systems. Technical report, Amsterdam: UvA (July 7, 2008),
  7. [LGGG07]
    LeMay, M., Gross, G., Gunter, C., Garg, S.: Unified architecture for large-scale attested metering. In: HICSS 2007: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, pp. 115–125. IEEE Computer Society, Washington, DC, USA (2007)CrossRefGoogle Scholar
  8. [NIS10]
    NIST. Smart Grid Cyber Security Strategy and Requirements (February 2, 2010),
  9. [Pai99]
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes (chapter 16). In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  10. [Qui09]
    Quinn, E.L.: Privacy and the New Energy Infrastructure (2009),

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Flavio D. Garcia
    • 1
  • Bart Jacobs
    • 1
  1. 1.Institute for Computing and Information SciencesRadboud University NijmegenNijmegenThe Netherlands

Personalised recommendations