Virtual power plant security scheduling and trading method based on dual blockchain technology

A virtual power plant and transaction method technology, applied in the field of identity-based encryption and proxy re-encryption technology, can solve the problems of less use and analysis of blockchain technology, failure to highlight the functions of blockchain technology, etc.

Pending Publication Date: 2021-03-02
JIANGXI UNIV OF SCI & TECH
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the above literatures focus on VPP energy scheduling and transaction process, and there is little analysis on the specific use of blockchain technology, which fails to highlight the functions of blockchain technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual power plant security scheduling and trading method based on dual blockchain technology
  • Virtual power plant security scheduling and trading method based on dual blockchain technology
  • Virtual power plant security scheduling and trading method based on dual blockchain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0131] Embodiment 1: The power generation unit sends production-related information to the virtual power plant for safe scheduling. which is Image 6 The corresponding steps are as follows:

[0132] (1) System settings:

[0133] The verification authority executes the algorithm. Enter system security parameters and the system property set U, and then construct two multiplicative cyclic groups G and G of order p T , p is a prime number. g, g 1 , g 2 , g 3 Both are generators of G, and G and G T Satisfy the bilinear mapping relationship e:G×G→G T . random selection of elements And define three hash functions H 1 :(0,1) * →G,H 2 :G T →G,H 3 : Finally, output system public parameters GP and master key MSK.

[0134] GP=(p,g,g 1 , g 2 , g 3 ,e(g,g) α ,H 1 ,H 2 ,H 3 ), MSK=α (1)

[0135] It should be noted that the system public parameters and master key of IBE have been included in Equation 1, and the specific IBE system public parameters GP IBE and m...

Embodiment 2

[0179] Embodiment 2: The specific realization process of virtual power plant acquiring transaction information and implementing auction. which is Figure 7 The corresponding steps are as follows:

[0180] There are three entities involved in the reputation-based CDA mechanism: buyers, sellers, and auctioneers. In the present invention, power consumption units such as residences and factories represent buyers, power generation units such as photovoltaic power plants and hydroelectric power plants represent sellers, and CVPP assumes the responsibility of auctioneers. At the beginning of the transaction cycle, the power consumption unit and the power generation unit submit the initial and Indicates the transaction information submitted by power unit i for the first time in the kth transaction cycle. Similarly, Indicates the transaction information submitted by power generation unit j for the first time in the kth transaction cycle. The specific content contained in the two...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A virtual power plant security scheduling and transaction method based on a dual blockchain technology comprises a scheduling private chain for scheduling and a transaction alliance chain for transaction, adopts a hybrid proxy re-encryption algorithm based on a ciphertext strategy, and is formed by combining an identity-based encryption algorithm and an attribute proxy re-encryption algorithm based on the ciphertext strategy. The agent converts the ciphertext based on attribute encryption into the ciphertext based on identity encryption, so that the decryption cost of the data accessor is reduced, and the non-repudiation and reliability of production information are ensured. In the transaction process, a continuous bilateral auction mechanism based on reputation is adopted, participants can continuously adjust their own quotation according to the current electric quantity transaction price, benefit maximization is achieved, transaction information and a reputation value are recorded inan alliance chain, and tamper resistance and transparency of the information are guaranteed. A low-cost, open and transparent information and transaction platform is provided for a virtual power plant, and the safety, tamper resistance, non-repudiation, integrity and the like of data are guaranteed.

Description

technical field [0001] The invention belongs to the safe scheduling and transaction of virtual power plant (Virtual Power Plant, VPP) energy, and relates to block chain technology in the field of information security, and identity-based encryption and proxy re-encryption technology. Background technique [0002] According to the global greenhouse gas emission data in 2010, the emissions generated by energy production such as electricity and industry accounted for about 76% of the total global emissions in that year. Considering the impact of greenhouse gas emissions on climate change and the cost and supply of fossil fuels, the traditional single form of thermal power generation can no longer meet people's living needs. With the development of the Energy Internet, the future power supply model may gradually change to Distributed Energy Resources (DER) as the main primary energy source. [0003] DER is mainly composed of distributed power supply, distributed energy storage, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06Q30/06G06Q30/08G06Q40/04G06Q50/06H04L29/06H04L29/08
CPCG06F21/64G06Q30/0611G06Q30/08G06Q40/04G06Q50/06H04L63/0428H04L67/1097H04L9/50Y04S10/50Y04S50/10
Inventor 张小红宋子龙
Owner JIANGXI UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products