60,057 research outputs found

    Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches

    Get PDF
    Peer-to-peer (P2P) energy trading has emerged as a next-generation energy management mechanism for the smart grid that enables each prosumer of the network to participate in energy trading with one another and the grid. This poses a significant challenge in terms of modeling the decision-making process of each participant with conflicting interest and motivating prosumers to participate in energy trading and to cooperate, if necessary, for achieving different energy management goals. Therefore, such decision-making process needs to be built on solid mathematical and signal processing tools that can ensure an efficient operation of the smart grid. This paper provides an overview of the use of game theoretic approaches for P2P energy trading as a feasible and effective means of energy management. As such, we discuss various games and auction theoretic approaches by following a systematic classification to provide information on the importance of game theory for smart energy research. Then, the paper focuses on the P2P energy trading describing its key features and giving an introduction to an existing P2P testbed. Further, the paper zooms into the detail of some specific game and auction theoretic models that have recently been used in P2P energy trading and discusses some important finding of these schemes.Comment: 38 pages, single column, double spac

    Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem

    Get PDF
    A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain natural setting of the threshold values on compartments. We then propose a secure scheme that works for all threshold settings. In this scheme, we employ a refined version of Asmuth-Bloom secret sharing with a special and generic Asmuth-Bloom sequence called the {\it anchor sequence}. Based on this idea, we also propose the first multilevel conjunctive threshold secret sharing scheme based on the Chinese Remainder Theorem. Lastly, we discuss how the proposed schemes can be used for multilevel threshold function sharing by employing it in a threshold RSA cryptosystem as an example
    corecore