A method of energy usage data privacy preservation is described. The method includes downloading energy usage data and a signature from a repository. The method includes determining whether the signature is that of a utility. When the signature is not that of the utility, the method includes rejecting the energy usage data. When the signature is that of the utility, the method includes generating noisy data, encrypting a message-signature pair, constructing a proof, and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. The noisy data is generated by adding random noise to the energy usage data. The message-signature pair includes the energy usage data and a verified signature. The proof is configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language.
展开▼