From: Protecting the grid topology and user consumption patterns during state estimation in smart grids based on data obfuscation
Protocol
Output
Verify([Y1],γ1)
Q 1
Verify([Y2],γ2)
Q 2
Verify([Y12],γ2)
Q 12
Verify([Y21],γ1)
Q 21