湖南电力 ›› 2025, Vol. 45 ›› Issue (5): 95-103.doi: 10.3969/j.issn.1008-0198.2025.05.013

• 电力人工智能与数字化 • 上一篇    下一篇

基于加法秘密共享的电力物资供应链跨系统数据安全聚合

杨珂1,2, 孙爽2,3, 孙馨4, 房红4, 王伟宇2,3   

  1. 1.国网数字科技控股有限公司, 北京 100077;
    2.国网区块链应用技术实验室, 北京 100077;
    3.国网区块链科技(北京)有限公司, 北京 100077;
    4.国网江苏省电力有限公司物资分公司, 江苏 南京 210036
  • 收稿日期:2025-06-25 修回日期:2025-07-31 发布日期:2025-11-11
  • 作者简介:杨珂(1990),男,博士,高级工程师,主要研究方向为电力信息与网络安全、隐私计算等;孙爽(1988),女,硕士,工程师,主要研究方向为智能配电网、能源区块链、数据安全;孙馨(1996),女,硕士,工程师,主要研究方向为招标采购管理、数字化转型等;房红(1990),女,硕士,工程师,主要研究方向为电力物资抽检技术、供应商评价管理、合同签约等;王伟宇(1995),男,硕士,工程师,主要研究方向为电网数字化、能源区块链、信息安全等。
  • 基金资助:
    国家电网有限公司总部科技项目(5700-202418240A-1-1-ZN)

Cross-System Data Security Aggregation of Electric Power Materials Supply Chain Based on Additive Secret Sharing

YANG Ke1,2, SUN Shuang2,3, SUN Xin4, FANG Hong4, WANG Weiyu2,3   

  1. 1. State Grid Digital Technology Holding Co., Ltd., Beijing 100077, China;
    2. State Grid Block-Chain Application Technology Laboratory, Beijing 100077, China;
    3. State Grid Block-Chain Technology (Beijing) Co., Ltd., Beijing 100077, China;
    4. State Grid Jiangsu Electric Power Co., Ltd., Materials Branch, Nanjing 210036, China
  • Received:2025-06-25 Revised:2025-07-31 Published:2025-11-11

摘要: 为了解决电力物资供应链管理涉跨业务系统电子数据协同面临的数据异构、依赖可信第三方、跨系统数据流通泄露风险大等挑战,提出一种基于加法秘密共享的电力物资供应链跨系统数据安全聚合方案。该方案依托加法秘密共享,构建线性与非线性的安全计算框架,实现无需可信第三方参与的数据安全聚合。此外,设计一系列安全聚合协议,包括安全求和聚合、安全均值聚合、安全方差聚合、四方安全比较与安全最值聚合,解决跨业务系统间数据互操作难题。经过严格的安全性分析和实验验证,该方案不仅能够在保护各业务系统隐私的基础上确保数据准确聚合,而且完全无需依赖任何外部可信第三方,在聚合通信开销和效率方面性能优越,为物资供应链数字化管理提供有效技术支持。

关键词: 物资供应链, 秘密共享, 数据聚合, 隐私保护, 无可信第三方

Abstract: The existing supply chain management of power materials involves multiple business systems. The collaboration of electronic data across business systems faces challenges such as data heterogeneity, reliance on trusted third-party platforms, and high risks of data circulation leakage across systems. In order to solve these problems, a cross-system data security aggregation scheme for power material supply chain based on additive secret sharing is proposed. The scheme relies on additive secret sharing to build linear and nonlinear secure computation frameworks, enabling secure data aggregation without trusted third parties. Moreover, a series of secure aggregation protocols are designed, including secure sum aggregation, secure mean aggregation, secure variance aggregation, four-party secure comparison and secure extremum aggregation, to solve the problem of data interoperability among cross-business systems. Rigorous security analysis and experiments show that this scheme can not only ensure the accurate aggregation of data while protecting the privacy of each business system, but also does not rely on any external trusted third party at all. It has superior performance in terms of aggregation communication overhead and efficiency, providing effective technical support for the digital management of the material supply chain.

Key words: material supply chain, secret sharing, data aggregation, privacy protection, no trusted third party

中图分类号: