Publication number: 20250131452
Abstract: Provided are a method for tracking carbon flow of a power system, a device and a medium. The method includes: acquiring related data of carbon flow tracking, where the related data include an injected active power sum column matrix of generator sets of all substations to be tracked, an injected carbon flow rate sum column matrix of generator sets of all substations to be tracked, an output power distribution matrix of a branch formed between substations to be tracked, and a power flow proportion distribution matrix of the branch formed between substations to be tracked; acquiring a carbon potential matrix EN of each substation to be tracked; and acquiring a carbon flow rate of each substation to be tracked, a carbon flow rate of the branch, and a carbon flow rate of an output load on the basis of the carbon potential matrix of each substation to be tracked.
Type:
Application
Filed:
October 15, 2024
Publication date:
April 24, 2025
Inventors:
Bo HU, Gangjun GONG, Jiaxuan YANG, Wanli CUI, Jichao DONG, Jun LU, Xu ZHANG, Chunhua LIN, Zongle MA, Ren QIANG, Li LIU, Qiguo ZHANG, Xin WU, Jiuliang LIU, Luyao WANG, Luning JIANG, Yurui WANG, Chang SU, Qiang FANG, Ao YU, Yutong WANG, Shengjie ZHOU, Meinan LIN, Linan FENG, Yilin LIU, Qiang ZHANG
Publication number: 20250038976
Abstract: A lattice-based proxy signature method, apparatus and device, a lattice-based proxy signature verification method, apparatus and device, and a storage medium. Polynomials are randomly selected in rings to calculate public and private keys of nodes, and the magnitudes of proxy public and private keys are the same as the magnitudes of public and private keys of an original signer. Therefore, compared with existing proxy signature schemes, the present application has smaller lengths of public and private keys and higher storage efficiency. Proxy signature information generated in the present application shows a signature of the original signer and also shows a signature of a proxy signer. Once a proxy signature is created, the proxy signature cannot be repudiated by the proxy signer, and has strong non-repudiation and strong unforgeability. The proxy signature method has the advantage of resisting quantum computer attack.
Type:
Application
Filed:
August 18, 2022
Publication date:
January 30, 2025
Applicants:
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID, GUIZHOU POWER GRID CO., LTD.
Inventors:
Bin QIAN, Houpeng HU, Yong XIAO, Jiaxiang OU, Mi ZHOU, Pengcheng LI, Yi LUO, Yanhong XIAO, Ji WANG, Xin WU, Fusheng LI, Peilin HE, Xiaoming LIN, Zhenghao GAO, Jianlin TANG, Zerui CHEN, Fan ZHANG, Gaoyi LONG, Qiang CHANG, Qin FENG, Yuanhong CEN