This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Chance-constrained OPF: A Distributed Method with Confidentiality Preservation

Mengshuo Jia,  Gabriela Hug, , Yifan Su, , and Chen Shen
Abstract

Given the increased percentage of wind power in power systems, chance-constrained optimal power flow (CC-OPF) calculation, as a means to take wind power uncertainty into account with a guaranteed security level, is being promoted. Compared to the local CC-OPF within a regional grid, the global CC-OPF of a multi-regional interconnected grid is able to coordinate across different regions and therefore improve the economic efficiency when integrating high percentage of wind power generation. In this global problem, however, multiple regional independent system operators (ISOs) participate in the decision-making process, raising the need for distributed but coordinated approaches. Most notably, due to regulation restrictions, commercial interest, and data security, regional ISOs may refuse to share confidential information with others, including generation cost, load data, system topologies, and line parameters. But this information is needed to build and solve the global CC-OPF spanning multiple areas. To tackle these issues, this paper proposes a distributed CC-OPF method with confidentiality preservation, which enables regional ISOs to determine the optimal dispatchable generations within their regions without disclosing confidential data. This method does not require parameter tunings and will not suffer from convergence challenges. Results from IEEE test cases show that this method is highly accurate.

Index Terms:
Wind power, chance constraint, OPF, distributed computing, confidentiality preservation

I Introduction

Given the carbon neutrality targets of more than 100 countries [1], wind power, as a major renewable source, has seen rapid development in the past decade and will likely continue to grow in the near future. However, such rapid development may cause significant wind power curtailment if not well integrated. Interconnection among regional power grids provides an effective means to reduce curtailment as connected regional grids can support each other. Most importantly, if the global optimal power flow (OPF) calculations are carried out for the whole interconnected grid, the overall energy security and economic efficiency can be improved [2]. However, the uncertainty introduced by renewable generation requires formulating a stochastic OPF problem. Chance constraints, which can limit the risk brought by wind power uncertainty, offer an intuitive way to formulate and solve the stochastic OPF problem [3]. All the above motivates the investigation of the chance-constrained OPF (CC-OPF) of multi-regional interconnected grids (MIGs).

In previous works, a wide variety of methods have been developed to solve CC-OPF problems. Each of these methods consists of two critical steps, namely (i) the approximation step and (ii) the conversion step. The approximation step transforms the AC power flow model into a linear one [4, 5, 6, 7, 8, 9, 10, 11]. This step seems to be unavoidable, as a linear model can not only convert the OPF into a convex problem, but also yield an explicit mapping relationship between power flows and power injections, which is the foundation for the following conversion step. Among all the approximation techniques used, the DC power flow is the most commonly-used approach [4, 5, 6, 11]. Other techniques, say, linearization around the operating point [7, 8] and full linearization of the whole AC model [9, 10], are also adopted for better accuracy.

The conversion step converts chance constraints into their deterministic versions. According to the chance constraint type, the conversion step can be further divided into two categories, namely converting single chance constraints (SCCs) [4, 5, 6, 7, 8], and converting joint chance constraints (JCCs) [9, 10, 11]. The SCC restricts the violation probability of a single system state (e.g., a line flow) whereas a JCC restricts the combined violation probability of multiple system states simultaneously. While JCCs provide a stronger guarantee of the overall system security compared to SCCs [12], a number of existing methods [9, 10, 11] are capable to decompose JCCs into SCCs. Therefore, converting SCCs into deterministic constraints is the more fundamental step.

Wind power uncertainty is usually assumed to follow the normal distribution [4, 5, 6, 7, 8]. Consequently, each SCC can be equivalently converted into its deterministic version through quantile calculation (i.e., the inverse calculation of the normal cumulative distribution function) [4, 5, 6, 7, 8]. However, the hypothesis of following a normal distribution is not suitable for non-Gaussian wind power uncertainty [13]. To address this problem, a Gaussian mixture model (GMM), which is flexible enough to capture different distribution characteristics (including bias, heavy tail, and multi-peak) [14], is adopted by many existing works to formulate the probability distribution of wind power uncertainty [13, 11, 15]. Conveniently, the quantile-based conversion strategy is still applicable to GMMs and therefore, any distribution model can be considered.

TABLE I: Confidential Data of Each Regional Grid and the Reason Why the Data Cannot Be Leaked
Confidential Data Reason Why the Data Cannot Be Leaked
Generation cost of dispatchable generators First, once other stakeholders, especially the adversaries, know the generation cost of the dispatchable generators within a regional grid, they are able to cause economical damage [16], or gain more benefits in the market [17]; Second, in some mature electricity markets, e.g., Pennsylvania—New Jersey—Maryland (PJM), ISOs are prohibited from disclosing commercially sensitive information to others in general cases [2, 18].
Current outputs and available capacities of dispatchable generators In PJM, for example, the current outputs and available capacities of generators are regarded as confidential information. If ISOs from other regions want to access these data, they must apply to PJM first [19]. The application will only be approved if this request is necessary.
Load data Once the load data of an area is shared with others, the number of eavesdroppers that may access this load data will increase. This simultaneously enhances the risk of the load-information-based attack to this area, e.g., the attack on the automatic generation control system [20], as knowing the load data is one of the main prerequisites to implementing such an attack.
Grid topology and line parameters Sharing the grid topology and line parameters of a region might increase the risk of an attack on the state estimation of this region [21]. Such an attack will greatly influence the decision of opening or closing lines, changing the position of transformer taps, etc. [22].

Although the research on CC-OPF is already diverse, all the aforementioned CC-OPF methods have to be implemented in a centralized manner. In a MIG, however, multiple regional independent system operators (ISOs) participate in the decision-making, rendering centralized algorithms unsuitable. First, it is unlikely that there is a central operator with access to all the data of the regional grids in a MIG [23, 2]. Second, even in cases where a central authority (or say an upper-level operator) does exist, e.g., the National Power Dispatch Center of China (NPDCC) that coordinates regional ISOs within the country, the OPF of an interconnected grid is still unlikely to be implemented centrally. This is because different control centers have a clear division of functionality/responsibility [24]. Specifically, in the MIG of China, the NPDCC is in charge of scheduling the transmission plan of tie lines between regions according to the power transaction contracts, while each regional ISO is responsible for deciding the generation dispatch within its own area using the transmission plan as boundary condition. No one is authorized to make decisions for others, i.e., the NPDCC and regional ISOs function independently [24]. Such a hierarchical management structure makes the global OPF of the MIG unsuitable and thus traditional centralized OPF methods not applicable.

Since centralized methods are not suitable for the CC-OPF of MIGs, distributed methods should be considered. Despite the fact that there is a vast literature on distributed OPF approaches, to the best of the authors’ knowledge, there is no distributed method for CC-OPF problems. The reason might lie in the unique nature of chance constraints. E.g., the coefficients in a line flow SCC are mainly dependent on the topological connections between that particular line and the dispatchable generators all over the whole grid. That is to say, these coefficients are not locally obtainable unless the global information of the whole grid is known, which again is not the case in a MIG. Consequently, developing a distributed method for CC-OPF is more complicated than merely proposing a distributed optimization algorithm. So far, how to solve the CC-OPF problem in a distributed manner remains an open question. Accordingly, this paper aims to develop a distributed CC-OPF method for MIGs.

It should be noted that information exchange between data owners is always necessary in distributed methods. Most importantly, such information exchange may disclose the confidential data of data owners (e.g., regional ISOs in this paper) [16]. However, the leakage of confidential information is unacceptable for regional ISOs [16, 17, 2, 18, 19, 20, 21, 22]. For details, please refer to Table I, which offers the types of confidential data for a regional grid as well as the reason why such data should not be disclosed. Hence, regional ISOs actually need a confidentiality-preserving distributed CC-OPF method (instead of a pure distributed approach), which not only can enable regional ISOs to solve their global CC-OPF in a distributed way, but also can protect the confidential data of each ISO.

To this end, this paper, on the basis of the transformation-based encryption (TE) technique [25, 26, 2], proposes a confidentiality-preserving distributed CC-OPF method. The advantage of the TE techniques is that it not only can solve optimization problems in a confidentiality-preserving manner, but also does not require parameter tunings or iterative calculations [25, 26, 2]. In contrast, other distributed optimization algorithms, such as the alternating direction method of multipliers (ADMM), normally need sophisticated parameter tuning approaches to achieve satisfactory convergence. Yet, parameter tuning is usually problem-specific without a universal rule, and improper tuning may lead to divergence [27, 28]. It is worth mentioning that, although the TE technique has appealing features, there are still some unsolved challenges if using this technique for CC-OPF. Specifically, the TE technique is only proven to be effective for linear programming so far, but the CC-OPF problem is nonlinear. In addition, the TE technique still faces the issue that the coupled coefficients in SCCs are locally unobtainable for regional ISOs. To address these challenges, this paper first proves two theorems to ensure that the TE technique can be adopted for the nonlinear CC-OPF problem. Then, this paper reveals that computing the coupled coefficients in SCCs corresponds to solving a system of linear equations. Accordingly, a fast distributed algorithm for solving linear equation systems is proposed, which enables regional ISOs to obtain the coupled coefficients in SCCs without revealing their confidential data. Finally, this paper proposes a distributed CC-OPF method with confidentiality preservation. Therefore, the contributions of this paper are as follows:

  1. 1.

    Prove the TE technique’s adaptability to quadratic programming, ensuring that this technique can find the centralized optimal solution of the CC-OPF problem.

  2. 2.

    Propose a fast confidentiality-preserving distributed algorithm for solving linear-equations-system, which has both higher accuracy and higher efficiency than the corresponding state-of-the-art methods.

  3. 3.

    Propose a distributed CC-OPF method with confidentiality preservation.

In the following, Section II first formulates the CC-OPF problem for a MIG, and then discusses the privacy issues when building and solving this problem. After that, Section III briefly revisits the TE technique, and also explains the unsolved challenges if applied to the CC-OPF. These challenges are further addressed in Section IV. Consequently, Section V presents the distributed CC-OPF algorithm with confidentiality preservation. Finally, case studies are performed in Section VI and Section VII concludes this paper.

II CC-OPF Model for MIG

In this section, a CC-OPF problem is formulated first. Then, the SCCs in this problem are converted into their deterministic versions, accordingly generating a compact formulation of this model. Finally, the confidentiality issues when formulating and solving this problem are revealed.

II-A CC-OPF

We start by providing a description of the notations used in the CC-OPF formulation. Let \mathcal{M} be the set of regions in the grid. The dispatchable generator set, non-dispatchable wind farm set, load set, and transmission line set of the whole grid are represented by 𝒢\mathcal{G}, 𝒲\mathcal{W}, 𝒟\mathcal{D}, and \mathcal{L}, respectively. Correspondingly, the sets of generators, wind farms, loads, and lines in area nn are denoted by 𝒢n\mathcal{G}_{n}, 𝒲n\mathcal{W}_{n}, 𝒟n\mathcal{D}_{n}, and n\mathcal{L}_{n}, respectively. This paper uses 𝒯\mathcal{T} as the set of time slots, and uses |||\cdot| to express the cardinality calculation of any set. Besides, the active power output of dispatchable generators, active wind power outputs, reactive wind power outputs, active loads, reactive loads, and active line flows in area nn at time tt are respectively denoted by 𝒈n,t|𝒢n|\boldsymbol{g}_{n,t}\in\mathfrak{R}^{|\mathcal{G}_{n}|}, 𝒘n,t|𝒲n|\boldsymbol{w}_{n,t}\in\mathfrak{R}^{|\mathcal{W}_{n}|}, 𝒘^n,t|𝒲n|\boldsymbol{\widehat{w}}_{n,t}\in\mathfrak{R}^{|\mathcal{W}_{n}|}, 𝒅n,t|𝒟n|\boldsymbol{d}_{n,t}\in\mathfrak{R}^{|\mathcal{D}_{n}|}, 𝒅^n,t|𝒟n|\boldsymbol{\widehat{d}}_{n,t}\in\mathfrak{R}^{|\mathcal{D}_{n}|}, and 𝒍n,t|n|\boldsymbol{l}_{n,t}\in\mathfrak{R}^{|\mathcal{L}_{n}|}. We further introduce Na=||N_{a}=|\mathcal{M}|, T=|𝒯|T=|\mathcal{T}|, Hn=|𝒢n|×|𝒯|H_{n}=|\mathcal{G}_{n}|\times|\mathcal{T}|, and H=|𝒢|×|𝒯|H=|\mathcal{G}|\times|\mathcal{T}|.

The objective of the CC-OPF is to minimize the overall generation cost across the entire grid given the non-dispatchable wind power:

min𝒈n,t0=t𝒯n12𝒈n,t𝓘n𝒈n,t+t𝒯n𝓚n𝒈n,t\displaystyle\min_{\boldsymbol{g}_{n,t}}\ \mathcal{F}_{0}=\sum_{t\in\mathcal{T}}\sum_{n\in\mathcal{M}}\frac{1}{2}\,\boldsymbol{g}_{n,t}^{\top}\,\boldsymbol{\mathcal{I}}_{n}\,\boldsymbol{g}_{n,t}\ +\sum_{t\in\mathcal{T}}\sum_{n\in\mathcal{M}}\boldsymbol{\mathcal{K}}_{n}^{\top}\boldsymbol{g}_{n,t} (1)

where 𝓘n|𝒢n|×|𝒢n|\boldsymbol{\mathcal{I}}_{n}\in\mathfrak{R}^{|\mathcal{G}_{n}|\times|\mathcal{G}_{n}|} is a diagonal matrix composed of the quadratic cost coefficients of dispatchable generators in region nn, whose non-zero elements are all positive, rendering (1) strictly convex. Vector 𝓚n|𝒢n|\boldsymbol{\mathcal{K}}_{n}\in\mathfrak{R}^{|\mathcal{G}_{n}|} consists of the linear cost coefficients of dispatchable generators in region nn, whose elements are assumed to be positive.

Due to the non-dispatchable wind power, the supply-demand constraint at time tt is formulated as an SCC, as in [29, 30]:

{n𝟙|𝒢n|\displaystyle\mathbb{P}\Big{\{}\sum\nolimits_{n\in\mathcal{M}}\mathds{1}^{\top}_{|\mathcal{G}_{n}|} 𝒈n,t+n𝟙|𝒲n|𝒘n,t\displaystyle\boldsymbol{g}_{n,t}\ +\sum\nolimits_{n\in\mathcal{M}}\mathds{1}^{\top}_{|\mathcal{W}_{n}|}\boldsymbol{w}_{n,t}
n𝟙|𝒟n|𝒅n,t0}1ϵb\displaystyle-\sum\nolimits_{n\in\mathcal{M}}\mathds{1}^{\top}_{|\mathcal{D}_{n}|}\boldsymbol{d}_{n,t}\geq 0\Big{\}}\geq 1-\epsilon_{b} (2)

This constraint enforces the supply to be greater than or equal to the demand with a probability of at least 1ϵb1-\epsilon_{b}. Vector 𝟙|𝒢n|\mathds{1}_{|\mathcal{G}_{n}|} is an all-ones vector of size |𝒢n||\mathcal{G}_{n}|. Similarly, 𝟙|𝒲n|\mathds{1}_{|\mathcal{W}_{n}|} and 𝟙|𝒟n|\mathds{1}_{|\mathcal{D}_{n}|} are also all-ones vectors with appropriate dimensions. Besides, the wind power outputs 𝒘n,t\boldsymbol{w}_{n,t} are random variables whereas 𝒅n,t\boldsymbol{d}_{n,t} is constant, that is, this paper ignores the uncertainty of load because it is relatively small compared to wind power uncertainty [31].

Constraints for the dispatchable generators in area nn at time tt include the capacity and ramp rate constraints:

𝒈n𝒈n,t𝒈n+,𝒓n𝒈n,t+1𝒈n,t𝒓n+\displaystyle\boldsymbol{g}_{n}^{-}\leq\boldsymbol{g}_{n,t}\leq\boldsymbol{g}_{n}^{+},\ \ \boldsymbol{r}_{n}^{-}\leq\boldsymbol{g}_{n,t+1}-\boldsymbol{g}_{n,t}\leq\boldsymbol{r}_{n}^{+}

where 𝒈n+\boldsymbol{g}_{n}^{+} and 𝒈n\boldsymbol{g}_{n}^{-} represent the upper and lower generation bounds of generators in area nn. Similarly, 𝒓n+\boldsymbol{r}_{n}^{+} and 𝒓n\boldsymbol{r}_{n}^{-} are the ramp rate bounds of the generators in area nn. All of these bounds are vectors in |𝒢n|×1\Re^{|\mathcal{G}_{n}|\times 1}.

Constraints for system states (e.g., nodal voltages or line flows) are also formulated as SCCs. Let sn,i,ts_{n,i,t} denote state ii in area nn at time tt, which could be either a nodal voltage or a line flow. The constraint for sn,i,ts_{n,i,t} is given as follows:

{sn,i,tsn,i+}1αS,i𝒮n,n\displaystyle\mathbb{P}\left\{s_{n,i,t}\leq s_{n,i}^{+}\right\}\geq 1-\alpha_{S},\ \ \forall i\in\mathcal{S}_{n},\ \forall n\in\mathcal{M} (3)

where sn,i+s_{n,i}^{+}\in\mathfrak{R} is the upper bound of sn,i,ts_{n,i,t}, and set 𝒮n\mathcal{S}_{n} consists of the states in region nn. Constraint (3) enforces sn,i,ts_{n,i,t} to be within its bound with a probability of at least 1αS1-\alpha_{S}.

II-B Conversion of SCCs

Converting the SCCs in (2) and (3) into their deterministic versions is the prerequisite for solving the CC-OPF problem. To this end, this paper first adopts a linear but sufficiently accurate power flow model, namely the decoupled linearized power flow (DLPF) model proposed in [32], whose performance has been verified in [33, 34]. Accordingly, sn,i,ts_{n,i,t}, i.e. line flow or voltage, can be expressed as a linear function of power injections across regions:

sn,i,t=\displaystyle s_{n,i,t}= m𝓞n,i,m𝒘m,t+m𝓞^n,i,m𝒘^m,t+\displaystyle\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\mathcal{O}}_{n,i,m}^{\top}\boldsymbol{w}_{m,t}+\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\widehat{\mathcal{O}}}_{n,i,m}^{\top}\boldsymbol{\widehat{w}}_{m,t}\ +
m𝓨n,i,m𝒅m,t+m𝓨^n,i,m𝒅^m,t+\displaystyle\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\mathcal{Y}}_{n,i,m}^{\top}\boldsymbol{d}_{m,t}\,+\,\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\widehat{\mathcal{Y}}}_{n,i,m}^{\top}\boldsymbol{\widehat{d}}_{m,t}\ +
m𝓤n,i,m𝒈m,t+ξn,i,t\displaystyle\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\mathcal{U}}_{n,i,m}^{\top}\boldsymbol{g}_{m,t}\ +\xi_{n,i,t} (4)

where 𝓤n,i,m|𝒢m|\boldsymbol{\mathcal{U}}_{n,i,m}\in\mathfrak{R}^{|\mathcal{G}_{m}|} consists of the mapping coefficients (derived from the DLPF model) that map 𝒈m,t\boldsymbol{g}_{m,t} to sn,i,ts_{n,i,t}. Similarly, 𝓞n,i,m|𝒲m|\boldsymbol{\mathcal{O}}_{n,i,m}\in\mathfrak{R}^{|\mathcal{W}_{m}|}, 𝓞^n,i,m|𝒲m|\boldsymbol{\widehat{\mathcal{O}}}_{n,i,m}\in\mathfrak{R}^{|\mathcal{W}_{m}|}, 𝓨n,i,m|𝒟m|\boldsymbol{\mathcal{Y}}_{n,i,m}\in\mathfrak{R}^{|\mathcal{D}_{m}|}, and 𝓨^n,i,m|𝒟m|\boldsymbol{\widehat{\mathcal{Y}}}_{n,i,m}\in\mathfrak{R}^{|\mathcal{D}_{m}|} also consist of the corresponding mapping coefficients. Note that ξn,i,t\xi_{n,i,t} is a constant value computed from all known system states, e.g., the voltage magnitude/angle of the slack node, voltage magnitudes of PVPV nodes, etc. For more details regarding the DLPF model, please see [32].

Using (II-B), the SCCs in (2) and (3) can be converted into deterministic constraints using the quantile calculation method proposed in [13]. For (2), the resulting deterministic constraint is given by

n𝟙|𝒢n|𝒈n,tυt\displaystyle-\sum\nolimits_{n\in\mathcal{M}}\mathds{1}^{\top}_{|\mathcal{G}_{n}|}\boldsymbol{g}_{n,t}\leq\upsilon_{t} (5)

where

υt\displaystyle\upsilon_{t} =ωt1(ϵb)n𝟙|𝒟n|𝒅n,t\displaystyle=\mathbb{P}_{\omega_{t}}^{-1}(\epsilon_{b})-\sum\nolimits_{n\in\mathcal{M}}\mathds{1}^{\top}_{|\mathcal{D}_{n}|}\boldsymbol{d}_{n,t}
ωt\displaystyle\omega_{t} =n𝟙|𝒲n|𝒘n,t\displaystyle=\sum\nolimits_{n\in\mathcal{M}}\mathds{1}^{\top}_{|\mathcal{W}_{n}|}\boldsymbol{w}_{n,t}

and ωt1(ϵb)\mathbb{P}_{\omega_{t}}^{-1}(\epsilon_{b}) is the ϵb\epsilon_{b}-quantile of ωt\omega_{t}.

Similarly, the SCC in (3) is transformed into:

m𝓤n,i,m𝒈m,t𝒥n,i,t\displaystyle\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\mathcal{U}}_{n,i,m}^{\top}\boldsymbol{g}_{m,t}\leq\mathcal{J}_{n,i,t} (6)

where

𝒥n,i,t=\displaystyle\mathcal{J}_{n,i,t}= m𝓨n,i,m𝒅m,tm𝓨^n,i,m𝒅^m,t\displaystyle-\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\mathcal{Y}}_{n,i,m}^{\top}\boldsymbol{d}_{m,t}-\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\widehat{\mathcal{Y}}}_{n,i,m}^{\top}\boldsymbol{\widehat{d}}_{m,t}
ξn,i,t+sn,i+Ωn,i,t1(1αS)\displaystyle-\xi_{n,i,t}+s_{n,i}^{+}-\mathbb{P}_{\Omega_{n,i,t}}^{-1}\left(1-\alpha_{S}\right)
Ωn,i,t=\displaystyle\Omega_{n,i,t}= m𝓞n,i,m𝒘m,t+m𝓞^n,i,m𝒘^m,t\displaystyle\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\mathcal{O}}_{n,i,m}^{\top}\boldsymbol{w}_{m,t}+\sum\nolimits_{m\in\mathcal{M}}\boldsymbol{\widehat{\mathcal{O}}}_{n,i,m}^{\top}\boldsymbol{\widehat{w}}_{m,t}

and Ωn,i,t1(1αS)\mathbb{P}_{\Omega_{n,i,t}}^{-1}\left(1-\alpha_{S}\right) is the (1αS)(1-\alpha_{S})-quantile of Ωn,i,t\Omega_{n,i,t}.

II-C Compact Formulation of the Converted CC-OPF

After the above conversions, the CC-OPF problem becomes a quadratic programming problem with linear constraints. Its compact formulation, defined as (P0\rm P0), is given as follows:

(P0)min𝐱\displaystyle(\rm P0)\ \ \min_{\boldsymbol{x}}\quad 0=12𝒙𝑸𝒙+𝒄𝒙\displaystyle\mathcal{F}_{0}=\frac{1}{2}\boldsymbol{x}^{\top}\!\boldsymbol{Q}\boldsymbol{x}+\boldsymbol{c}^{\top}\!\boldsymbol{x}
s.t. 𝔸𝒙𝔹\displaystyle\boldsymbol{\mathbb{A}}\boldsymbol{x}\leq\boldsymbol{\mathbb{B}}

Matrix 𝑸\boldsymbol{Q} in the objective function is composed of the quadratic cost coefficients of dispatchable generators:

𝑸\displaystyle\boldsymbol{Q} =[𝚲1𝟎𝟎𝚲Na]H×H\displaystyle=\left[\begin{array}[]{ccc}\boldsymbol{\Lambda}_{1}&\cdots&\boldsymbol{0}\\ \vdots&\ddots&\vdots\\[2.84526pt] \boldsymbol{0}&\cdots&\boldsymbol{\Lambda}_{N_{a}}\\ \end{array}\right]\in\mathfrak{R}^{H\times H} (10)

where 𝚲n\boldsymbol{\Lambda}_{n} is detailed by

𝚲n=[𝓘n00𝓘n]Hn×Hn\boldsymbol{\Lambda}_{n}=\begin{bmatrix}\boldsymbol{\mathcal{I}}_{n}&\cdots&0\\ \vdots&\ddots&\vdots\\ 0&\cdots&\boldsymbol{\mathcal{I}}_{n}\\ \end{bmatrix}\in\mathfrak{R}^{H_{n}\times H_{n}}

Furthermore, 𝒄\boldsymbol{c} in the objective function consists of the linear cost coefficients of dispatchable generators of the whole grid, i.e.

𝒄\displaystyle\boldsymbol{c} =[𝒄1𝒄Na]H\displaystyle=\begin{bmatrix}\boldsymbol{c}_{1}^{\top}&\cdots&\boldsymbol{c}_{N_{a}}^{\top}\end{bmatrix}^{\top}\in\mathfrak{R}^{H}

where 𝒄n\boldsymbol{c}_{n} is defined as follows:

𝒄n\displaystyle\boldsymbol{c}_{n} =[𝓚n𝓚n]Hn\displaystyle=\begin{bmatrix}\boldsymbol{\mathcal{K}}_{n}^{\top}&\cdots&\boldsymbol{\mathcal{K}}_{n}^{\top}\end{bmatrix}^{\top}\in\mathfrak{R}^{H_{n}}

The decision variable 𝒙\boldsymbol{x} includes the active dispatchable generations of the whole grid for all time steps:

𝒙\displaystyle\boldsymbol{x} =[𝒙1𝒙Na]H\displaystyle=\begin{bmatrix}\boldsymbol{x}_{1}^{\top}&\cdots&\boldsymbol{x}_{N_{a}}^{\top}\end{bmatrix}^{\top}\in\mathfrak{R}^{H} (11)

where

𝒙n\displaystyle\boldsymbol{x}_{n} =[𝒈n,1𝒈n,T]Hn\displaystyle=\begin{bmatrix}\boldsymbol{g}_{n,1}^{\top}&\cdots&\boldsymbol{g}_{n,T}^{\top}\end{bmatrix}^{\top}\in\mathfrak{R}^{H_{n}} (12)

Before describing 𝔸\boldsymbol{\mathbb{A}} and 𝔹\boldsymbol{\mathbb{B}} in (P0)(\rm{P0}), several parameter matrices are first defined, including 𝑰n|𝒢n|×|𝒢n|\boldsymbol{I}_{n}\in\mathfrak{R}^{|\mathcal{G}_{n}|\times|\mathcal{G}_{n}|}, 𝑱nHn×Hn\boldsymbol{J}_{n}\in\mathfrak{R}^{H_{n}\times H_{n}}, 𝑬n(Hn|𝒢n|)×Hn\boldsymbol{E}_{n}\in\mathfrak{R}^{(H_{n}-|\mathcal{G}_{n}|)\times H_{n}}, 𝑲nT×Hn\boldsymbol{K}_{n}\in\mathfrak{R}^{T\times H_{n}}, 𝚽n|𝒮|×|𝒢n|\boldsymbol{\Phi}_{n}\in\mathfrak{R}^{|\mathcal{S}|\times|\mathcal{G}_{n}|}, and 𝑼nT|𝒮|×Hn\boldsymbol{U}_{n}\in\mathfrak{R}^{T|\mathcal{S}|\times H_{n}}, where 𝒮=n𝒮n\mathcal{S}=\bigcup_{n\in\mathcal{M}}\mathcal{S}_{n}. Among these parameter matrices, 𝑰n\boldsymbol{I}_{n} is an identity matrix; other parameter matrices are specified as follows:

𝑱n=[𝑰n𝟎𝟎𝑰n]\displaystyle\boldsymbol{J}_{n}=\left[\begin{array}[]{ccc}\boldsymbol{I}_{n}&\cdots&\boldsymbol{0}\\[2.84526pt] \vdots&\ddots&\vdots\\[2.84526pt] \boldsymbol{0}&\cdots&\boldsymbol{I}_{n}\\ \end{array}\right] (16)
𝑬n=[𝑰n𝑰n𝟎𝟎𝟎𝟎𝑰n𝑰n]\displaystyle\boldsymbol{E}_{n}=\left[\begin{array}[]{ccccc}-\boldsymbol{I}_{n}&\boldsymbol{I}_{n}&\cdots&\boldsymbol{0}&\boldsymbol{0}\\[2.84526pt] \vdots&\vdots&\ddots&\vdots&\vdots\\[2.84526pt] \boldsymbol{0}&\boldsymbol{0}&\cdots&-\boldsymbol{I}_{n}&\boldsymbol{I}_{n}\\ \end{array}\right] (20)
𝑲n=[𝟙|𝒢n|𝟎𝟎𝟙|𝒢n|]\displaystyle\boldsymbol{K}_{n}=\left[\begin{array}[]{ccc}-\mathds{1}^{\top}_{|\mathcal{G}_{n}|}&\cdots&\boldsymbol{0}\\[2.84526pt] \vdots&\ddots&\vdots\\[2.84526pt] \boldsymbol{0}&\!\cdots&-\mathds{1}^{\top}_{|\mathcal{G}_{n}|}\\ \end{array}\right] (24)
𝚽n=[𝓤1,1,n𝓤1,|𝒮1|,n𝓤Na,1,n𝓤Na,|𝒮Na|,n]\displaystyle\boldsymbol{\Phi}_{n}\!=\!\left[\boldsymbol{\mathcal{U}}_{1,1,n}\cdots\boldsymbol{\mathcal{U}}_{1,|\mathcal{S}_{1}|,n}\cdots\boldsymbol{\mathcal{U}}_{{N_{a}},1,n}\cdots\boldsymbol{\mathcal{U}}_{{N_{a}},|\mathcal{S}_{N_{a}}|,n}\right]^{\top} (25)
𝑼n=[𝚽n𝟎𝟎𝟎𝚽n𝟎𝟎𝟎𝟎𝟎𝟎𝚽n]\displaystyle\boldsymbol{U}_{n}\!=\!\left[\begin{array}[]{cccc}\boldsymbol{\Phi}_{n}&\boldsymbol{0}&\cdots&\boldsymbol{0}\\[2.84526pt] \boldsymbol{0}&\boldsymbol{\Phi}_{n}&\cdots&\boldsymbol{0}\\ \boldsymbol{0}&\boldsymbol{0}&\ddots&\boldsymbol{0}\\[2.84526pt] \boldsymbol{0}&\boldsymbol{0}&\cdots&\boldsymbol{\Phi}_{n}\\ \end{array}\right] (30)

Additionally, the following parameter vectors are introduced:

𝑮n+\displaystyle\boldsymbol{G}_{n}^{+} =[𝒈n+𝒈n+]Hn\displaystyle=\left[\boldsymbol{g}_{n}^{+^{\top}}\ \ \cdots\ \ \boldsymbol{g}_{n}^{+^{\top}}\right]^{\top}\in\mathfrak{R}^{H_{n}}
𝑮n\displaystyle\boldsymbol{G}_{n}^{-} =[𝒈n𝒈n]Hn\displaystyle=\left[\boldsymbol{g}_{n}^{-^{\top}}\ \ \cdots\ \ \boldsymbol{g}_{n}^{-^{\top}}\right]^{\top}\in\mathfrak{R}^{H_{n}}
𝑹n+\displaystyle\boldsymbol{R}_{n}^{+} =[𝒓n+𝒓n+](Hn|𝒢n|)\displaystyle=\left[\boldsymbol{r}_{n}^{+^{\top}}\ \ \cdots\ \ \boldsymbol{r}_{n}^{+^{\top}}\right]^{\top}\in\mathfrak{R}^{(H_{n}-|\mathcal{G}_{n}|)}
𝑹n\displaystyle\boldsymbol{R}_{n}^{-} =[𝒓n𝒓n](Hn|𝒢n|)\displaystyle=\left[\boldsymbol{r}_{n}^{-^{\top}}\ \ \cdots\ \ \boldsymbol{r}_{n}^{-^{\top}}\right]^{\top}\in\mathfrak{R}^{(H_{n}-|\mathcal{G}_{n}|)}
𝚼\displaystyle\boldsymbol{\Upsilon} =[υ1υT]T\displaystyle=\left[\upsilon_{1}\ \ \cdots\ \ \upsilon_{T}\right]^{\top}\in\mathfrak{R}^{T}
𝚫t\displaystyle\boldsymbol{\Delta}_{t} =[𝒥1,1,t𝒥1,|𝒮1|,t𝒥Na,1,t𝒥Na,|𝒮Na|,t]|𝒮|\displaystyle=\left[\mathcal{J}_{1,1,t}\cdots\mathcal{J}_{1,|\mathcal{S}_{1}|,t}\cdots\mathcal{J}_{{N_{a}},1,t}\cdots\mathcal{J}_{{N_{a}},|\mathcal{S}_{N_{a}}|,t}\right]^{\top}\!\!\in\mathfrak{R}^{|\mathcal{S}|}
𝚫\displaystyle\boldsymbol{\Delta} =[𝚫1𝚫T]T|𝒮|\displaystyle=\left[\boldsymbol{\Delta}_{1}^{\top}\ \ \cdots\ \ \boldsymbol{\Delta}_{T}^{\top}\right]^{\top}\in\mathfrak{R}^{T|\mathcal{S}|}

Based on the above parameter matrices and vectors, 𝔸\boldsymbol{\mathbb{A}} and 𝔹\boldsymbol{\mathbb{B}} are given by

𝔸=[𝑱1𝟎𝟎𝑱Na𝑱1𝟎𝟎𝑱Na𝑬1𝟎𝟎𝑬Na𝑬1𝟎𝟎𝑬Na𝑲1𝑲Na𝑼1𝑼Na],𝔹=[𝑮1+𝑮Na+𝑮1𝑮Na𝑹1+𝑹Na+𝑹1𝑹Na𝚼𝚫]\displaystyle\boldsymbol{\mathbb{A}}=\left[\begin{array}[]{ccc}\boldsymbol{J}_{1}&\cdots&\boldsymbol{0}\\ \vdots&\ddots&\vdots\\[2.84526pt] \boldsymbol{0}&\cdots&\boldsymbol{J}_{N_{a}}\\[2.84526pt] -\boldsymbol{J}_{1}&\cdots&\boldsymbol{0}\\ \vdots&\ddots&\vdots\\[2.84526pt] \boldsymbol{0}&\cdots&-\boldsymbol{J}_{N_{a}}\\[2.84526pt] \boldsymbol{E}_{1}&\cdots&\boldsymbol{0}\\ \vdots&\ddots&\vdots\\[2.84526pt] \boldsymbol{0}&\cdots&\boldsymbol{E}_{N_{a}}\\[2.84526pt] -\boldsymbol{E}_{1}&\cdots&\boldsymbol{0}\\ \vdots&\ddots&\vdots\\[2.84526pt] \boldsymbol{0}&\cdots&-\boldsymbol{E}_{N_{a}}\\[2.84526pt] \boldsymbol{K}_{1}&\cdots&\boldsymbol{K}_{N_{a}}\\[2.84526pt] \boldsymbol{U}_{1}&\cdots&\boldsymbol{U}_{N_{a}}\\ \end{array}\right],\boldsymbol{\mathbb{B}}=\left[\begin{array}[]{c}\ \,\,\boldsymbol{G}_{1}^{+}\\[1.42262pt] \ \,\,\vdots\\[1.42262pt] \ \,\,\boldsymbol{G}_{N_{a}}^{+}\\[1.42262pt] -\boldsymbol{G}_{1}^{-}\\[1.42262pt] \ \,\,\vdots\\[1.42262pt] -\boldsymbol{G}_{N_{a}}^{-}\\[1.42262pt] \ \,\,\boldsymbol{R}_{1}^{+}\\[1.42262pt] \ \,\,\vdots\\[1.42262pt] \ \,\,\boldsymbol{R}_{N_{a}}^{+}\\[1.42262pt] -\boldsymbol{R}_{1}^{-}\\[1.42262pt] \ \,\,\vdots\\[1.42262pt] -\boldsymbol{R}_{N_{a}}^{-}\\[1.42262pt] \boldsymbol{\Upsilon}\\[1.42262pt] \boldsymbol{\Delta}\\[1.42262pt] \end{array}\right] (59)
𝔸1𝔸Na\displaystyle\quad\quad\quad\underbrace{\quad\quad}_{\Large{\boldsymbol{\mathbb{A}}_{1}}}\quad\quad\ \quad\underbrace{\quad\quad}_{\Large{\boldsymbol{\mathbb{A}}_{N_{a}}}}

II-D Confidentiality Issues

Ideally, to formulate (P0)(\rm P_{0}), each regional ISO or a centralized entity should first form 𝑸\boldsymbol{Q}, 𝒄\boldsymbol{c}, 𝔸\boldsymbol{\mathbb{A}}, and 𝔹\boldsymbol{\mathbb{B}}. However, formulating these matrices or vectors requires knowledge of system data of the entire grid. For example, if computations are done by regional ISOs, then each of them has to collect the generation cost information of generators in other areas to form 𝑸\boldsymbol{Q} and 𝒄\boldsymbol{c}, the capacities and ramp rates of generators in other regions to build 𝔹\boldsymbol{\mathbb{B}}, the system topologies and line parameters of other regions to form 𝑼n\boldsymbol{U}_{n} (n\forall n) in 𝔸\boldsymbol{\mathbb{A}}. Such information may however be confidential.

Besides, once regional ISOs solve (P0)(\rm P_{0}), they would infer additional information from the solution, which includes the dispatchable generation of each area. This information, however, might be confidential as well.

III TE Technique with Unsolved Challenges

To tackle the confidentiality issues mentioned in the previous section, the TE technique is adopted in this paper. This technique can effectively build and solve linear programming problems while protecting the confidential information of participants from exposure [25, 26, 2]. However, there are still some unsolved challenges standing in the way of using this technique to solve CC-OPF problems (e.g., CC-OPF problems are not linear programming). Hence, this section first briefly revisits the TE technique assuming a linear programming model. After that, the unsolved challenges when using this method to solve CC-OPF problems are discussed.

III-A TE Technique

Ignoring the quadratic term in (P0\rm P0) leads to a linear programming problem (L0)(\rm{L0}):

(L0)min𝐱\displaystyle(\rm L0)\ \ \min_{\boldsymbol{x}}\quad 0=𝒄𝒙\displaystyle\mathcal{L}_{0}=\boldsymbol{c}^{\top}\!\boldsymbol{x} (60)
s.t. 𝔸𝒙𝔹\displaystyle\boldsymbol{\mathbb{A}}\boldsymbol{x}\leq\boldsymbol{\mathbb{B}} (61)

The basic idea of the TE technique is to utilize random matrices to encrypt the decision variable (i.e., dispatchable generation) of each region, which, in the meantime, also masks the confidential information of this area. Specifically, regional ISO nn first randomly generates an invertible matrix 𝑴nHn×Hn\boldsymbol{M}_{n}\in\mathfrak{R}^{H_{n}\times H_{n}}. This matrix, called the encryption matrix, is only known by ISO nn. Then, ISO nn transforms its own decision variable 𝒙n\boldsymbol{x}_{n} into the encrypted decision variable 𝒙¯nHn×1\boldsymbol{\bar{x}}_{n}\in\mathfrak{R}^{H_{n}\times 1} using 𝑴n\boldsymbol{M}_{n}. The relationship between 𝒙n\boldsymbol{x}_{n} and 𝒙¯n\boldsymbol{\bar{x}}_{n} is

𝒙n=𝑴n𝒙¯n\boldsymbol{x}_{n}=\boldsymbol{M}_{n}\boldsymbol{\bar{x}}_{n} (62)

If we define

𝑴\displaystyle\boldsymbol{M} =[𝑴100𝑴Na]H×H\displaystyle=\left[\begin{array}[]{ccc}\boldsymbol{M}_{1}&\cdots&0\\ \vdots&\ddots&\vdots\\[2.84526pt] 0&\cdots&\boldsymbol{M}_{N_{a}}\\ \end{array}\right]\in\mathfrak{R}^{H\times H} (66)

then the following equation holds:

𝒙=𝑴𝒙¯\boldsymbol{x}=\boldsymbol{M}\boldsymbol{\bar{x}} (67)

Substituting (67) into (L0)(\rm L0) yields:

min𝒙¯\displaystyle\min_{\boldsymbol{\bar{x}}}\quad ¯=[𝒄1𝑴1𝒄Na𝑴Na]𝒙¯\displaystyle\overline{\mathcal{L}}=\left[\boldsymbol{c}_{1}\boldsymbol{M}_{1}\ \ \cdots\ \ \boldsymbol{c}_{N_{a}}\boldsymbol{M}_{N_{a}}\right]^{\top}\!\boldsymbol{\bar{x}}
s.t. [𝔸1𝑴1𝔸Na𝑴Na]𝒙¯𝔹\displaystyle\left[\boldsymbol{\mathbb{A}}_{1}\boldsymbol{M}_{1}\ \ \cdots\ \ \boldsymbol{\mathbb{A}}_{N_{a}}\boldsymbol{M}_{N_{a}}\right]^{\top}\!\boldsymbol{\bar{x}}\leq\boldsymbol{\mathbb{B}}

Noticeably, after the transformation, 𝒙n\boldsymbol{x}_{n} becomes 𝒙¯n\boldsymbol{\bar{x}}_{n}. This means that, once the transformed problem is solved, only ISO nn can recover 𝒙n\boldsymbol{x}_{n} from 𝒙¯n\boldsymbol{\bar{x}}_{n} using (62). Also, the generation cost 𝒄n\boldsymbol{c}_{n} is encrypted into 𝒄n𝑴n\boldsymbol{c}_{n}\boldsymbol{M}_{n} while 𝔸n\boldsymbol{\mathbb{A}}_{n} is encrypted into 𝔸n𝑴n\boldsymbol{\mathbb{A}}_{n}\boldsymbol{M}_{n} after the transformation. Consequently, ISO nn can freely share 𝒄n𝑴n\boldsymbol{c}_{n}\boldsymbol{M}_{n} and 𝔸n𝑴n\boldsymbol{\mathbb{A}}_{n}\boldsymbol{M}_{n} with others, as no one can deduce 𝒄n\boldsymbol{c}_{n} or 𝔸n\boldsymbol{\mathbb{A}}_{n} from the exchanged information. Overall, 𝒙n\boldsymbol{x}_{n}, 𝒄n\boldsymbol{c}_{n}, and 𝔸n\boldsymbol{\mathbb{A}}_{n} in (L0)(\rm{L0}) can be effectively masked by the encryption matrix 𝑴n\boldsymbol{M}_{n}.

However, 𝑴n\boldsymbol{M}_{n} cannot obscure the information in 𝔹\boldsymbol{\mathbb{B}}. But the way to protect each ISO’s confidential data in 𝔹\boldsymbol{\mathbb{B}} is straightforward. For instance, to protect 𝑮n+\boldsymbol{G}_{n}^{+} in 𝔹\boldsymbol{\mathbb{B}} from disclosure, ISO nn can equivalently modify the corresponding inequality constraint from 𝑱n𝒙n𝑮n+\boldsymbol{J}_{n}\boldsymbol{x}_{n}\leq\boldsymbol{G}^{+}_{n} to:

𝑱¯n𝒙n𝑮¯n+\displaystyle\boldsymbol{\bar{J}}_{n}\boldsymbol{x}_{n}\leq\boldsymbol{\bar{G}}^{+}_{n} (68)

where 𝑱¯n=𝝋n𝑱n\boldsymbol{\bar{J}}_{n}=\boldsymbol{\varphi}_{n}\boldsymbol{J}_{n} and 𝑮¯n+=𝝋n𝑮n+\boldsymbol{\bar{G}}^{+}_{n}=\boldsymbol{\varphi}_{n}\boldsymbol{G}^{+}_{n}. Matrix 𝝋nHn×Hn\boldsymbol{\varphi}_{n}\in\mathfrak{R}^{H_{n}\times H_{n}}, randomly generated and privately hold by ISO nn, is a diagonal matrix whose non-zero elements are positive. After introducing 𝑴n\boldsymbol{M}_{n}, (68) further becomes:

𝑱¯n𝑴n𝒙¯n𝑮¯n+\displaystyle\boldsymbol{\bar{J}}_{n}\boldsymbol{M}_{n}\boldsymbol{\bar{x}}_{n}\leq\boldsymbol{\bar{G}}^{+}_{n}

As a result, the capacity information of generators in region nn is encrypted into 𝑮¯n+\boldsymbol{\bar{G}}^{+}_{n}. Similar operations can be done to 𝑮n\boldsymbol{G}^{-}_{n}, 𝑹n+\boldsymbol{R}^{+}_{n}, and 𝑹n\boldsymbol{R}^{-}_{n} to encrypt them into 𝑮¯n\boldsymbol{\bar{G}}^{-}_{n}, 𝑹¯n+\boldsymbol{\bar{R}}^{+}_{n}, and 𝑹¯n\boldsymbol{\bar{R}}^{-}_{n}, respectively. Simultaneously, 𝑱n\boldsymbol{J}_{n} and 𝑬n\boldsymbol{E}_{n}, i.e., the coefficients in the corresponding inequality constraints, are also modified to 𝑱¯n\boldsymbol{\bar{J}}_{n} and 𝑬¯n\boldsymbol{\bar{E}}_{n}, respectively. For distinction, this paper uses 𝔸¯\boldsymbol{\bar{\mathbb{A}}} and 𝔹¯\boldsymbol{\bar{\mathbb{B}}} to separately denote 𝔸\boldsymbol{\mathbb{A}} and 𝔹\boldsymbol{\mathbb{B}} after the above modifications.

Finally, the original linear problem (L0)(\rm L0) is transformed into its encrypted but equivalent version (L1)(\rm L1):

(L1)min𝐱¯\displaystyle(\rm L1)\ \ \min_{\boldsymbol{\bar{x}}}\quad 1=[𝒄1𝑴1𝒄Na𝑴Na]𝒙¯\displaystyle\mathcal{L}_{1}=\left[\boldsymbol{c}_{1}\boldsymbol{M}_{1}\cdots\boldsymbol{c}_{N_{a}}\boldsymbol{M}_{N_{a}}\right]^{\top}\!\boldsymbol{\bar{x}}
s.t. [𝔸¯1𝑴1𝔸¯Na𝑴Na]𝒙¯𝔹¯\displaystyle\left[\boldsymbol{\bar{\mathbb{A}}}_{1}\boldsymbol{M}_{1}\cdots\boldsymbol{\bar{\mathbb{A}}}_{N_{a}}\boldsymbol{M}_{N_{a}}\right]^{\top}\!\boldsymbol{\bar{x}}\leq\boldsymbol{\bar{\mathbb{B}}}

Consequently, ISO nn can share its encrypted information, including 𝒄n𝑴n\boldsymbol{c}_{n}\boldsymbol{M}_{n}, 𝔸¯n𝑴n\boldsymbol{\bar{\mathbb{A}}}_{n}\boldsymbol{M}_{n}, 𝑮¯n+\boldsymbol{\bar{G}}^{+}_{n}, 𝑮¯n\boldsymbol{\bar{G}}^{-}_{n}, 𝑹¯n+\boldsymbol{\bar{R}}^{+}_{n}, and 𝑹¯n\boldsymbol{\bar{R}}^{-}_{n}, with other ISOs to allow each to build (L1)(\rm L1). Once (L1)(\rm L1) is solved, only ISO nn can derive its desired optimal solution, 𝒙n\boldsymbol{x}_{n}^{*}, from the encrypted optimal solution 𝒙¯\boldsymbol{\bar{x}}^{*}. Clearly, no confidential data is leaked.

III-B Unsolved Challenges

Although the TE technique is a confidentiality-preserving optimization method without parameter tunings, this method cannot be directly applied to the CC-OPF problem, i.e., (P0)(\rm P_{0}). More specifically, there are three unsolved challenges standing in the way:

  1. 1.

    As mentioned earlier, the TE technique is only proven to be effective for linear programming so far, but (P0)(\rm P0) is a quadratic programming problem. Hence, the first challenge is to prove the method’s effective application to quadratic problems.

  2. 2.

    To use the TE technique, ISO nn must know 𝔸¯n\boldsymbol{\bar{\mathbb{A}}}_{n}. In (P0)(\rm P0), however, ISO nn is unable to generate the complete 𝔸¯n\boldsymbol{\bar{\mathbb{A}}}_{n} independently, because the sub matrix 𝑼n\boldsymbol{U}_{n} in 𝔸¯n\boldsymbol{\bar{\mathbb{A}}}_{n}, known as the coupled coefficient matrix among dispatchable generations across regions, consists of the mapping coefficients that map nodal power injections to all the system states. These mapping coefficients are not locally obtainable unless global information, including the system topology and line parameters, is known. ISO nn does not have the global information, making 𝑼n\boldsymbol{U}_{n} unobtainable and thereby the TE technique unusable. Given this, how to enable ISO nn to obtain 𝑼n\boldsymbol{U}_{n} under the protection of regions’ confidentiality, is the second unsolved challenge.

  3. 3.

    Both 𝚼\boldsymbol{\Upsilon} and 𝚫\boldsymbol{\Delta} in 𝔹¯\boldsymbol{\bar{\mathbb{B}}} are aggregations of the regions’ confidential information, including load data, line parameters, etc. Hence, the third challenge is to allow ISO nn to acquire 𝚼\boldsymbol{\Upsilon} and 𝚫\boldsymbol{\Delta} without having access to other ISOs’ confidential data.

The next section will address these challenges and provide solutions to each of them.

IV Solutions to Unsolved Challenges

In response to the three unsolved challenges mentioned above, this section first proves the TE technique’s adaptability to quadratic programming. Then, a fast distributed algorithm for solving linear equation systems in a confidentiality-preserving manner is proposed, for the aim of helping ISO nn obtain 𝑼n\boldsymbol{U}_{n}. Finally, this section provides a distributed way to allow ISO nn to acquire 𝚼\boldsymbol{\Upsilon} and 𝚫\boldsymbol{\Delta} without any need for confidential information.

IV-A Adaptability Proof

After introducing the encryptions mentioned in (67) and (68), the original CC-OPF problem (P0)(\rm P0), a typical quadratic programming problem, is transformed into the encrypted version (P1)(\rm P1):

(P1)min𝐱¯\displaystyle(\rm P1)\ \ \min_{\boldsymbol{\bar{x}}}\quad 1=12𝒙¯𝑸¯𝒙¯+𝒄𝑴𝒙¯\displaystyle\mathcal{F}_{1}=\frac{1}{2}\boldsymbol{\bar{x}}^{\top}\!\boldsymbol{\bar{Q}}\boldsymbol{\bar{x}}+\boldsymbol{c}^{\top}\!\boldsymbol{M}\boldsymbol{\bar{x}}
s.t. 𝔸¯𝑴𝒙¯𝔹¯\displaystyle\boldsymbol{\bar{\mathbb{A}}}\boldsymbol{M}\boldsymbol{\bar{x}}\leq\boldsymbol{\bar{\mathbb{B}}}

where

𝑸¯=𝑴𝑸𝑴=[𝑴1𝚲1𝑴10000𝑴Na𝚲Na𝑴Na]\boldsymbol{\bar{Q}}=\boldsymbol{M}^{\top}\!\boldsymbol{Q}\boldsymbol{M}=\left[\begin{array}[]{ccc}\boldsymbol{M}_{1}^{\top}\boldsymbol{\Lambda}_{1}\boldsymbol{M}_{1}&\cdots&0\\[2.84526pt] 0&\ddots&0\\[2.84526pt] 0&\cdots&\boldsymbol{M}_{N_{a}}^{\top}\boldsymbol{\Lambda}_{N_{a}}\boldsymbol{M}_{N_{a}}\\ \end{array}\right]

Proving the TE technique’s adaptability to (P0)(\rm P0), is equivalent to proving the following two propositions.

Proposition 1. There exists a global optimal solution of (P1\rm P1).

Proof. As described earlier, 𝑸\boldsymbol{Q} is a diagonal matrix whose non-zero elements are all positive. Hence, 𝑸\boldsymbol{Q} is a positive definite matrix. According to the definition of being positive definite, the following equation holds:

𝒙𝑸𝒙>0,𝒙𝟎\boldsymbol{x}^{\top}\boldsymbol{Q}\boldsymbol{x}>0,\ \forall\boldsymbol{x}\neq\boldsymbol{0}

Since

𝒙𝑸𝒙=𝒙¯𝑴𝑸𝑴𝒙¯=𝒙¯𝑸¯𝒙¯\boldsymbol{x}^{\top}\boldsymbol{Q}\boldsymbol{x}=\boldsymbol{\bar{x}}^{\top}\!\boldsymbol{M}^{\top}\!\boldsymbol{Q}\boldsymbol{M}\boldsymbol{\bar{x}}=\boldsymbol{\bar{x}}^{\top}\boldsymbol{\bar{Q}}\boldsymbol{\bar{x}}

it follows that

𝒙¯𝑸¯𝒙¯>0,𝒙𝟎\displaystyle\boldsymbol{\bar{x}}^{\top}\boldsymbol{\bar{Q}}\boldsymbol{\bar{x}}>0,\ \forall\boldsymbol{x}\neq\boldsymbol{0} (69)

Note that 𝑸\boldsymbol{Q} is also a real symmetric matrix, hence

𝑸¯=𝑴𝑸𝑴=𝑴𝑸𝑴=𝑸¯\boldsymbol{\bar{Q}}^{\top}\!=\boldsymbol{M}^{\top}\!\boldsymbol{Q}^{\top}\boldsymbol{M}=\boldsymbol{M}^{\top}\!\boldsymbol{Q}\boldsymbol{M}=\boldsymbol{\bar{Q}}

holds, i.e., 𝑸¯\boldsymbol{\bar{Q}} is a real symmetric matrix as well.

As 𝑴n\boldsymbol{M}_{n} is invertible, we can form

𝑴1\displaystyle\boldsymbol{M}^{-1} =[𝑴11000𝑴Na1]\displaystyle=\left[\begin{array}[]{ccc}\boldsymbol{M}_{1}^{-1}&\cdots&0\\ \vdots&\ddots&0\\[2.84526pt] 0&\cdots&\boldsymbol{M}_{N_{a}}^{-1}\\ \end{array}\right] (73)

meaning that 𝑴\boldsymbol{M} is also invertible. Accordingly, rank(𝐌1)=H\rm rank(\boldsymbol{M}^{-1})=\textit{H} holds, where rank()\rm rank(\cdot) denotes the rank function. Therefore, in the space of H×1\mathfrak{R}^{H\times 1}, matrix 𝑴1\boldsymbol{M}^{-1} fully maps 𝒙𝟎\forall\boldsymbol{x}\neq\boldsymbol{0} to 𝒙¯𝟎\forall\boldsymbol{\bar{x}}\neq\boldsymbol{0} using the relationship 𝒙¯=𝑴1𝒙\boldsymbol{\bar{x}}=\boldsymbol{M}^{-1}\boldsymbol{x}. That is to say, 𝒙𝟎\forall\boldsymbol{x}\neq\boldsymbol{0} yields 𝒙¯𝟎\forall\boldsymbol{\bar{x}}\neq\boldsymbol{0}. As a result, (69) is equivalent to

𝒙¯𝑸¯𝒙¯>0,𝒙¯𝟎\displaystyle\boldsymbol{\bar{x}}^{\top}\boldsymbol{\bar{Q}}\boldsymbol{\bar{x}}>0,\forall\boldsymbol{\bar{x}}\neq\boldsymbol{0} (74)

To summarize, 𝑸¯\boldsymbol{\bar{Q}} is a real symmetric matrix and (74) holds. Then, according to the definition of being positive definite, 𝑸¯\boldsymbol{\bar{Q}} is a positive definite matrix. Consequently, (P1\rm P1) is strictly convex, thereby ensuring the existence of a unique global optimal solution.\hfill\blacksquare

Proposition 2. If 𝒙¯\boldsymbol{\bar{x}}^{*} is the global optimal solution of (P1\rm P1), then 𝒙=𝑴𝒙¯\boldsymbol{x}^{*}=\boldsymbol{M}\boldsymbol{\bar{x}}^{*} is the global optimal solution of (P0\rm P0), and vice versa.

Proof. We start by introducing the semi-encrypted problem (P2\rm P2) as follows:

(P2)min𝐱\displaystyle(\rm P2)\ \ \min_{\boldsymbol{x}}\quad 0=12𝒙𝑸𝒙+𝒄𝒙\displaystyle\mathcal{F}_{0}=\frac{1}{2}\boldsymbol{x}^{\top}\!\boldsymbol{Q}\boldsymbol{x}+\boldsymbol{c}^{\top}\!\boldsymbol{x}
s.t. 𝔸¯𝒙𝔹¯\displaystyle\boldsymbol{\bar{\mathbb{A}}}\boldsymbol{x}\leq\boldsymbol{\bar{\mathbb{B}}}

Compared to (P0\rm P0), (P2\rm P2) is formulated with the equivalently-modified 𝔸¯\boldsymbol{\bar{\mathbb{A}}} and 𝔹¯\boldsymbol{\bar{\mathbb{B}}}. In other words, (P0\rm P0) and (P2\rm P2) are equivalent.

If 𝒙¯\boldsymbol{\bar{x}}^{*} is the global optimal solution of (P1\rm P1), then 𝒙¯\boldsymbol{\bar{x}}^{*} satisfies the Karush-Kuhn-Tucker (KKT) condition of (P1\rm P1):

{𝑴(𝑸𝑴𝒙¯+𝒄+𝔸¯𝝀𝑳)=0𝔸¯𝑴𝒙¯𝔹¯𝝀𝑳0𝝀𝑳𝔸¯𝑴𝒙¯𝝀𝑳𝔹¯=0\left\{\begin{split}&\boldsymbol{M}^{\top}\!(\boldsymbol{Q}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}+\boldsymbol{c}+\boldsymbol{\bar{\mathbb{A}}}^{\top}\!\boldsymbol{\boldsymbol{\lambda}_{L}})=0\\ &\boldsymbol{\bar{\mathbb{A}}}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}\leq\boldsymbol{\bar{\mathbb{B}}}\\ &\boldsymbol{\boldsymbol{\lambda}_{L}}\geq 0\\ &\boldsymbol{\boldsymbol{\lambda}_{L}}^{\top}\!\boldsymbol{\bar{\mathbb{A}}}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}-\boldsymbol{\boldsymbol{\lambda}_{L}}^{\top}\boldsymbol{\bar{\mathbb{B}}}=0\end{split}\right. (75)

where 𝝀L\boldsymbol{\lambda}_{L} is the vector of lagrangian multipliers. Note that 𝑴\boldsymbol{M} is invertible, hence 𝑴(𝑸𝑴𝒙¯+𝒄+𝔸¯𝝀𝑳)=0\boldsymbol{M}^{\top}\!(\boldsymbol{Q}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}+\boldsymbol{c}+\boldsymbol{\bar{\mathbb{A}}}^{\top}\!\boldsymbol{\boldsymbol{\lambda}_{L}})=0 in (75) is equivalent to:

𝑸𝑴𝒙¯+𝒄+𝔸¯𝝀𝑳=0\boldsymbol{Q}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}+\boldsymbol{c}+\boldsymbol{\bar{\mathbb{A}}}^{\top}\!\boldsymbol{\boldsymbol{\lambda}_{L}}=0 (76)

Substituting 𝒙¯=𝑴1𝒙\boldsymbol{\bar{x}}^{*}=\boldsymbol{M}^{-1}\boldsymbol{x}^{*} into (75) and (76) leads to

{𝑸𝒙+𝒄+𝔸¯𝝀𝑳=0𝔸¯𝒙𝔹¯𝝀𝑳0𝝀𝑳𝔸¯𝒙𝝀𝑳𝔹¯=0\left\{\begin{split}&\boldsymbol{Q}\boldsymbol{x}^{*}+\boldsymbol{c}+\boldsymbol{\bar{\mathbb{A}}}^{\top}\!\boldsymbol{\boldsymbol{\lambda}_{L}}=0\\ &\boldsymbol{\bar{\mathbb{A}}}\boldsymbol{x}^{*}\leq\boldsymbol{\bar{\mathbb{B}}}\\ &\boldsymbol{\boldsymbol{\lambda}_{L}}\geq 0\\ &\boldsymbol{\boldsymbol{\lambda}_{L}}^{\top}\!\boldsymbol{\bar{\mathbb{A}}}\boldsymbol{x}^{*}-\boldsymbol{\boldsymbol{\lambda}_{L}}^{\top}\boldsymbol{\bar{\mathbb{B}}}=0\end{split}\right. (77)

Noticeably, (77) are exactly the KKT conditions of (P2\rm P2). Most importantly, 𝒙\boldsymbol{x}^{*} satisfies this KKT conditions, thereby making 𝒙\boldsymbol{x}^{*} the global optimal solution of (P2\rm P2).

Conversely, if 𝒙\boldsymbol{x}^{*} is the global optimal solution of (P2\rm P2), then 𝒙\boldsymbol{x}^{*} meets the KKT conditions of (P2\rm P2), i.e., (77). Substituting 𝒙=𝑴𝒙¯\boldsymbol{x}^{*}=\boldsymbol{M}\boldsymbol{\bar{x}}^{*} into (77) generates:

{𝑸𝑴𝒙¯+𝒄+𝔸¯𝝀𝑳=0𝔸¯𝑴𝒙¯𝔹¯𝝀𝑳0𝝀𝑳𝔸¯𝑴𝒙¯𝝀𝑳𝔹¯=0\left\{\begin{split}&\boldsymbol{Q}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}+\boldsymbol{c}+\boldsymbol{\bar{\mathbb{A}}}^{\top}\!\boldsymbol{\boldsymbol{\lambda}_{L}}=0\\ &\boldsymbol{\bar{\mathbb{A}}}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}\leq\boldsymbol{\bar{\mathbb{B}}}\\ &\boldsymbol{\boldsymbol{\lambda}_{L}}\geq 0\\ &\boldsymbol{\boldsymbol{\lambda}_{L}}^{\top}\!\boldsymbol{\bar{\mathbb{A}}}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}-\boldsymbol{\boldsymbol{\lambda}_{L}}^{\top}\boldsymbol{\bar{\mathbb{B}}}=0\end{split}\right. (78)

Since 𝑴\boldsymbol{M} is invertible, multiplying the left and right sides of the first equation in (78) by 𝑴\boldsymbol{M} yields

𝑴(𝑸𝑴𝒙¯+𝒄+𝔸¯𝝀𝑳)=0\boldsymbol{M}^{\top}\!(\boldsymbol{Q}\boldsymbol{M}\boldsymbol{\bar{x}}^{*}+\boldsymbol{c}+\boldsymbol{\bar{\mathbb{A}}}^{\top}\!\boldsymbol{\boldsymbol{\lambda}_{L}})=0 (79)

Replacing the first equation in (78) with (79) results in the KKT condition of (P1\rm P1), i.e., (75). Clearly, 𝒙¯\boldsymbol{\bar{x}}^{*} fulfills these KKT conditions, thus ensuring 𝒙¯\boldsymbol{\bar{x}}^{*} to be the global optimal solution of (P1\rm P1).

The above proves that if 𝒙¯\boldsymbol{\bar{x}}^{*} is the global optimal solution of (P1\rm P1), then 𝒙=𝑴𝒙¯\boldsymbol{x}^{*}=\boldsymbol{M}\boldsymbol{\bar{x}}^{*} is the global optimal solution of (P2\rm P2), and vice versa. Note that (P0\rm P0) and (P2\rm P2) are equivalent. Consequently, Proposition 2 holds. \hfill\blacksquare

The above two propositions guarantee the TE technique’s adaptability to quadratic programming.

IV-B Coupled Coefficient Matrix Calculation

According to (30), the coupled coefficient matrix 𝑼n\boldsymbol{U}_{n} is actually formed by 𝚽n\boldsymbol{\Phi}_{n}. The latter, defined by (25), consists of the mapping coefficients that map the dispatchable generations in region nn to the system states of the whole grid. Therefore, calculating 𝑼n\boldsymbol{U}_{n} corresponds to determining the mapping coefficients in 𝚽n\boldsymbol{\Phi}_{n}.

To this end, the DLPF model of the whole grid is needed. This model is given by

[𝑮Q,1𝑮P,1𝑮Q,Na𝑮P,Na][𝑽1𝜽1𝑽Na𝜽Na]=[𝑸~1𝑷~1𝑸~Na𝑷~Na]\displaystyle\left[\begin{array}[]{c}\boldsymbol{G}_{Q,1}\\ \boldsymbol{G}_{P,1}\\ \vdots\\ \boldsymbol{G}_{Q,{N_{a}}}\\ \boldsymbol{G}_{P,{N_{a}}}\\ \end{array}\right]\left[\begin{array}[]{c}\boldsymbol{V}_{1}\\ \boldsymbol{\theta}_{1}\\ \vdots\\ \boldsymbol{V}_{{N_{a}}}\\ \boldsymbol{\theta}_{{N_{a}}}\\ \end{array}\right]=\left[\begin{array}[]{c}\boldsymbol{\widetilde{Q}}_{1}\\ \boldsymbol{\widetilde{P}}_{1}\\ \vdots\\ \boldsymbol{\widetilde{Q}}_{N_{a}}\\ \boldsymbol{\widetilde{P}}_{N_{a}}\\ \end{array}\right] (95)

where 𝑽n\boldsymbol{V}_{n} consists of the voltage magnitudes of the PQPQ nodes in region nn, while 𝑸~n\boldsymbol{\widetilde{Q}}_{n} is formed by the reactive power injections at the same nodes. Besides, 𝜽n\boldsymbol{\theta}_{n} is composed of the voltage angles of the PQPQ and PVPV nodes in region nn, while 𝑷~n\boldsymbol{\widetilde{P}}_{n} includes the active power injections at the same nodes. In addition, 𝑮Q,n\boldsymbol{G}_{Q,n} denotes the line conductances between the PQPQ nodes in region nn and all the other nodes in the grid, while 𝑮P,n\boldsymbol{G}_{P,n} includes the corresponding line susceptances. Apparently, ISO nn only knows 𝑮Q,n\boldsymbol{G}_{Q,n} and 𝑮P,n\boldsymbol{G}_{P,n} in (95), as the related lines are either the inner lines within region nn or the tie lines between region nn and other regions.

We further define 𝑮\boldsymbol{G} as:

𝑮=[𝑮Q,1𝑮P,1𝑮Q,Na𝑮P,Na]\displaystyle\boldsymbol{G}=\left[\begin{array}[]{ccccc}\boldsymbol{G}_{Q,1}^{\top}&\boldsymbol{G}_{P,1}^{\top}&\cdots&\boldsymbol{G}_{Q,{N_{a}}}^{\top}&\boldsymbol{G}_{P,{N_{a}}}^{\top}\end{array}\right]^{\top} (97)

Then

[𝑽1,𝜽1,,𝑽Na,𝜽Na]=𝑮1[𝑸~1,𝑷~1,,𝑸~Na,𝑷~Na]\displaystyle\left[\boldsymbol{V}_{1}^{\top},\boldsymbol{\theta}_{1}^{\top},\cdots,\boldsymbol{V}_{{N_{a}}}^{\top},\boldsymbol{\theta}_{{N_{a}}}^{\top}\right]^{\top}\!\!\!=\!\boldsymbol{G}^{-1}\!\left[\boldsymbol{\widetilde{Q}}_{1}^{\top},\boldsymbol{\widetilde{P}}_{1}^{\top},\cdots,\boldsymbol{\widetilde{Q}}_{{N_{a}}}^{\top},\boldsymbol{\widetilde{P}}_{{N_{a}}}^{\top}\right]^{\top}

where 𝑮1\boldsymbol{G}^{-1} is denoted by

𝑮1=[𝑩Q,1𝑩P,1𝑩Q,Na𝑩P,Na]\displaystyle\boldsymbol{G}^{-1}=\left[\begin{array}[]{ccccc}\boldsymbol{B}_{Q,1}^{\top}&\boldsymbol{B}_{P,1}^{\top}&\cdots&\boldsymbol{B}_{Q,{N_{a}}}^{\top}&\boldsymbol{B}_{P,{N_{a}}}^{\top}\end{array}\right] (99)

Clearly, once ISO nn obtains 𝑩Q,n\boldsymbol{B}_{Q,n} and 𝑩P,n\boldsymbol{B}_{P,n}, it can directly form the desired matrix 𝚽n\boldsymbol{\Phi}_{n}. Computing 𝑩Q,n\boldsymbol{B}_{Q,n} and 𝑩P,n\boldsymbol{B}_{P,n} requires the inverse calculation of 𝑮\boldsymbol{G}. However, ISO nn only has partial information of 𝑮\boldsymbol{G}, preventing ISO nn from calculating the inverse of 𝑮\boldsymbol{G}. Actually, calculating the inverse of 𝑮\boldsymbol{G} can be considered as solving the following system of linear equations:

[𝑮Q,1𝑮P,1𝑮Q,Na𝑮P,Na][𝑩Q,1𝑩P,1𝑩Q,Na𝑩P,Na]=𝑰\left[\begin{array}[]{ccccc}\boldsymbol{G}_{Q,1}^{\top}\!\!&\!\!\boldsymbol{G}_{P,1}^{\top}\!\!&\!\!\cdots\!\!&\!\!\boldsymbol{G}_{Q,{N_{a}}}^{\top}\!\!&\!\!\boldsymbol{G}_{P,{N_{a}}}^{\top}\end{array}\right]\left[\begin{array}[]{c}\boldsymbol{B}_{Q,1}\\ \boldsymbol{B}_{P,1}\\ \vdots\\ \boldsymbol{B}_{Q,{N_{a}}}\\ \boldsymbol{B}_{P,{N_{a}}}\end{array}\right]=\boldsymbol{I} (100)

where 𝑰\boldsymbol{I} is an identity matrix with the appropriate dimension, and 𝑩Q,1𝑩P,Na\boldsymbol{B}_{Q,1}\ \cdots\boldsymbol{B}_{P,N_{a}} are the solution of this system. Note that the linear equation system in (100) has a special feature: ISO nn only knows some equations of the system, i.e., ISO nn only has 𝑮Q,n\boldsymbol{G}_{Q,n} and 𝑮P,n\boldsymbol{G}_{P,n} at hand. This is a typical problem in the field of distributed computing, which has drawn much attention recently [35]. However, the state-of-the-art methods to solve this problem usually require a lot of iterations, leading to low computational efficiency. Therefore, we propose a fast distributed method that can solve (100) in a confidentiality-preserving way.

First, ISO nn randomly generates two invertible and private matrices: 𝑾Q,n\boldsymbol{W}_{Q,n} and 𝑾P,n\boldsymbol{W}_{P,n}. These two matrices are used to adapt 𝑩Q,n\boldsymbol{B}_{Q,n} and 𝑩P,n\boldsymbol{B}_{P,n} into their encrypted versions, i.e., 𝑩¯Q,n\boldsymbol{\bar{B}}_{Q,n} and 𝑩¯P,n\boldsymbol{\bar{B}}_{P,n}:

𝑩Q,n=𝑾Q,n𝑩¯Q,n,𝑩P,n=𝑾P,n𝑩¯P,n\displaystyle\boldsymbol{B}_{Q,n}=\boldsymbol{W}_{Q,n}\boldsymbol{\bar{B}}_{Q,n},\ \ \boldsymbol{B}_{P,n}=\boldsymbol{W}_{P,n}\boldsymbol{\bar{B}}_{P,n} (101)

Further, we define 𝑾\boldsymbol{W} as:

𝑾\displaystyle\boldsymbol{W} =[𝑾Q,10000𝑾P,100000000𝑾Q,Na0000𝑾P,Na]\displaystyle=\left[\begin{array}[]{ccccc}\boldsymbol{W}_{Q,1}&0&\cdots&0&0\\[2.84526pt] 0&\boldsymbol{W}_{P,1}&\cdots&0&0\\[2.84526pt] 0&0&\ddots&0&0\\[2.84526pt] 0&0&\cdots&\boldsymbol{W}_{Q,{N_{a}}}&0\\[2.84526pt] 0&0&\cdots&0&\boldsymbol{W}_{P,{N_{a}}}\\ \end{array}\right] (107)

Then the following equation holds:

[𝑩Q,1,,𝑩P,Na]=𝑾[𝑩¯Q,1,,𝑩¯P,Na]\displaystyle\left[\boldsymbol{B}_{Q,1}^{\top},\cdots,\boldsymbol{B}_{P,{N_{a}}}^{\top}\right]^{\top}=\boldsymbol{W}\left[\boldsymbol{\bar{B}}_{Q,1}^{\top},\cdots,\boldsymbol{\bar{B}}_{P,{N_{a}}}^{\top}\right]^{\top} (108)

Substituting (108) into (100) generates

[𝑮Q,1𝑾Q,1𝑮P,Na𝑾P,Na][𝑩¯Q,1𝑩¯P,Na]=𝑰\displaystyle\left[\begin{array}[]{ccc}\boldsymbol{G}_{Q,1}^{\top}\boldsymbol{W}_{Q,1}\!\!&\!\!\cdots\!\!&\!\!\boldsymbol{G}_{P,{N_{a}}}^{\top}\boldsymbol{W}_{P,{N_{a}}}\end{array}\right]\left[\begin{array}[]{c}\boldsymbol{\bar{B}}_{Q,1}\\ \vdots\\ \boldsymbol{\bar{B}}_{P,{N_{a}}}\end{array}\right]=\boldsymbol{I} (113)

Since only ISO nn knows 𝑮Q,n\boldsymbol{G}_{Q,n}, 𝑮P,n\boldsymbol{G}_{P,n}, 𝑾Q,n\boldsymbol{W}_{Q,n}, and 𝑾Q,n\boldsymbol{W}_{Q,n}, ISO nn can freely share the masked information 𝑮Q,n𝑾Q,n\boldsymbol{G}_{Q,n}^{\top}\boldsymbol{W}_{Q,n} and 𝑮P,n𝑾P,n\boldsymbol{G}_{P,n}^{\top}\boldsymbol{W}_{P,n} with other ISOs, as none of the other ISOs can deduce 𝑮Q,n\boldsymbol{G}_{Q,n} and 𝑮P,n\boldsymbol{G}_{P,n} from the exchanged information. Once all the masked information is received from the other ISOs, each ISO can solve (113) and obtain the encrypted solution. Eventually, ISO nn can recover 𝑩Q,n\boldsymbol{B}_{Q,n} and 𝑩P,n\boldsymbol{B}_{P,n} from the encrypted solution using (101). Consequently, the whole process is confidentiality-preserving.

It is worth mentioning that in the above process, only the sharing of masked information requires communications between ISOs — the actual calculations can be implemented independently by each ISO. To make the whole process a distributed procedure, i.e. not all ISOs having to communicate with all other ISOs, an accelerated average consensus (AAC) algorithm [36] is leveraged to adapt the information sharing process into a fully distributed calculation.

The AAC algorithm is a graph-theory-based distributed method, where in the considered case ISOs are the vertices in the graph while communication lines between ISOs constitute the edges. During the iterations of this algorithm, each ISO only needs to communicate with its one-hop neighbors, yet the calculation result of every ISO will converge to the mean value of all ISOs’ initial values. Hence, to realize the information sharing between ISOs by the AAC algorithm, ISO nn should first form its initial value 𝒚n(0)\boldsymbol{y}_{n}(0) using its encrypted information:

𝒚n(0)=[0𝑮Q,n𝑾Q,n𝑮P,n𝑾P,n0]\boldsymbol{y}_{n}(0)=\begin{bmatrix}0&\cdots&\boldsymbol{G}_{Q,n}^{\top}\boldsymbol{W}_{Q,n}&\boldsymbol{G}_{P,n}^{\top}\boldsymbol{W}_{P,n}&\cdots&0\end{bmatrix}

where all elements are zero except for the (2n12n-1)-th element 𝑮Q,n𝑾Q,n\boldsymbol{G}_{Q,n}^{\top}\boldsymbol{W}_{Q,n} and the 2n2n-th element 𝑮P,n𝑾P,n\boldsymbol{G}_{P,n}^{\top}\boldsymbol{W}_{P,n}. Then, ISO nn’s initial value is updated according to:

𝒚n(k+1)\displaystyle\boldsymbol{y}_{n}(k+1) =β𝒚np(k+1)+(1β)𝒚nw(k+1)\displaystyle=\beta\boldsymbol{y}_{n}^{p}(k+1)+(1-\beta)\boldsymbol{y}_{n}^{w}(k+1) (114)
𝒚nw(k+1)\displaystyle\boldsymbol{y}_{n}^{w}(k+1) =ϖn,n𝒚n(k)+m𝛀nϖn,m𝒚m(k)\displaystyle=\varpi_{n,n}\boldsymbol{y}_{n}(k)+\sum\nolimits_{m\in\boldsymbol{\Omega}_{n}}\varpi_{n,m}\boldsymbol{y}_{m}(k)
𝒚np(k+1)\displaystyle\boldsymbol{y}_{n}^{p}(k+1) =η1𝒚nw(k+1)+η2𝒚n(k)\displaystyle=\eta_{1}\boldsymbol{y}_{n}^{w}(k+1)+\eta_{2}\boldsymbol{y}_{n}(k)

and kk is the iteration counter. All the parameters above, including β\beta, ϖn,n\varpi_{n,n}, ϖn,m\varpi_{n,m}, η1\eta_{1}, and η2\eta_{2}, can be easily set using the generalized rules mentioned in [36]. With this process, the iterative result 𝒚n(k)\boldsymbol{y}_{n}(k) of ISO nn, will converge, i.e.,

limk𝒚n(k)=1Nan=1Na𝒚n(0)\lim\limits_{k\to\infty}{\boldsymbol{y}_{n}(k)}=\frac{1}{N_{a}}\sum\nolimits_{n=1}^{N_{a}}\boldsymbol{y}_{n}(0)

Multiplying the converged result by NaN_{a}, ISO nn finally obtains

[𝑮Q,1𝑾Q,1𝑮P,1𝑾P,1𝑮Q,Na𝑾Q,Na𝑮P,Na𝑾P,Na]\begin{bmatrix}\boldsymbol{G}_{Q,1}^{\top}\boldsymbol{W}_{Q,1}\!\!\!\!&\boldsymbol{G}_{P,1}^{\top}\boldsymbol{W}_{P,1}\!\!\!\!&\cdots\!\!\!\!&\boldsymbol{G}_{Q,{N_{a}}}^{\top}\boldsymbol{W}_{Q,{N_{a}}}\!\!\!\!&\boldsymbol{G}_{P,{N_{a}}}^{\top}\boldsymbol{W}_{P,{N_{a}}}\end{bmatrix}

i.e., the masked information of all ISOs.

Overall, the proposed fast distributed method for solving the linear equation system can be summarized as three steps: (i) ISO nn formulates and shares its masked information via the AAC algorithm; (ii) ISO nn solves (113) and obtains the encrypted solution; (iii) ISO nn recovers 𝑩Q,n\boldsymbol{B}_{Q,n} and 𝑩P,n\boldsymbol{B}_{P,n} from the encrypted solution using (101). The proposed method is confidentiality-preserving, as the confidential information of ISO nn is strictly protected by the randomly-generated matrices 𝑾Q,n\boldsymbol{W}_{Q,n} and 𝑾Q,n\boldsymbol{W}_{Q,n}. Also, this method has high efficiency, since only linear algebraic computations are required for encryption and decryption, not to mention that the AAC algorithm has a fast convergence rate given its accelerated design.

Once ISO nn obtains 𝑩Q,n\boldsymbol{B}_{Q,n} and 𝑩P,n\boldsymbol{B}_{P,n} by the proposed method, it can form 𝚽n\boldsymbol{\Phi}_{n} according to (25) and build 𝑼n\boldsymbol{U}_{n} based on (30).

IV-C Aggregation of Confidential Data

Formulating 𝚼\boldsymbol{\Upsilon} and 𝚫\boldsymbol{\Delta} in 𝔹¯\boldsymbol{\bar{\mathbb{B}}} essentially corresponds to summing the confidential data (e.g., the load data) of different regions. Although the AAC algorithm allows ISOs to achieve this summation in a distributed manner (the mean value and the summation value are interchangeable), this algorithm will leak the exchanged data to ISOs, leading to the disclosure of confidential information.

To enable ISOs to obtain the summation in both distributed and confidentiality-preserving manners, a privacy-preserving AAC (PP-AAC) algorithm proposed in [37] is adopted. This algorithm introduces noise to mask the exchanged data between ISOs, thereby protecting their information. Most importantly, the PP-AAC algorithm can still guarantee the accuracy of the summation calculation.

Specifically, ISO nn first sets its confidential data, e.g., the load data, as its initial value 𝒛n(0)\boldsymbol{z}_{n}(0). Then, ISO nn initializes 𝒚n(0)\boldsymbol{y}_{n}(0) by

𝒚n(0)=𝒛n(0)+δn(0)\boldsymbol{y}_{n}(0)=\boldsymbol{z}_{n}(0)+\delta_{n}(0)

where δn(0)\delta_{n}(0) is noise randomly selected from [σ2γ,σ2γ][-\frac{\sigma}{2}\gamma,\frac{\sigma}{2}\gamma] by ISO nn. Note that σ>0\sigma>0 and γ[0,1)\gamma\in[0,1). The iterative process using the AAC algorithm then starts. In the kk-th iteration (k1k\geq 1) of the AAC algorithm, 𝒚n(k)\boldsymbol{y}_{n}(k) will be further masked by newly generated noise:

𝒚n(k)𝒚n(k)+θn(k)θn(k)=δn(k)δn(k1)\begin{split}&\boldsymbol{y}_{n}(k)\leftarrow\boldsymbol{y}_{n}(k)+\theta_{n}(k)\\ &\theta_{n}(k)=\delta_{n}(k)-\delta_{n}(k-1)\end{split}

where δn(k)\delta_{n}(k) is randomly selected from [σ2γk+1,σ2γk+1][-\frac{\sigma}{2}\gamma^{k+1},\frac{\sigma}{2}\gamma^{k+1}] by ISO nn. Finally, 𝒚n(k)\boldsymbol{y}_{n}(k) will converge to the mean of all ISOs’ initial values, i.e., n=1Na𝒛n(0)\sum\nolimits_{n=1}^{N_{a}}\boldsymbol{z}_{n}(0), but the confidential information contained in 𝒛n(0)\boldsymbol{z}_{n}(0) is protected [37].

To summarize, for aggregating confidential data, each ISO first sets its confidential information as the initial value of the PP-AAC algorithm and then participates in the iterative process. Once converged mean results are obtained, each ISO can acquire the desired summation (i.e., 𝚼\boldsymbol{\Upsilon} and 𝚫\boldsymbol{\Delta}) with a simple multiplication.

V Distributed CC-OPF Method with Confidentiality Preservation

Since the challenges when using the TE technique have been addressed in the previous section, this section summarizes and further elaborates the application of the proposed distributed CC-OPF method with confidentiality preservation based on the TE approach.

The proposed confidentiality-preserving distributed CC-OPF method consists of five steps, namely formulating, encrypting, sharing, solving, and decrypting. Details are as follows:

1) Formulating Step — First, ISO nn forms 𝑼n\boldsymbol{U}_{n} using the proposed fast distributed method for linear equation systems. Second, ISO nn forms 𝚼\boldsymbol{\Upsilon} and 𝚫\boldsymbol{\Delta} using the PP-AAC algorithm. Third, ISO nn formulates 𝚲n\boldsymbol{\Lambda}_{n}, 𝒄n\boldsymbol{c}_{n}, 𝔸n\boldsymbol{\mathbb{A}}_{n}, 𝑮n+\boldsymbol{G}_{n}^{+}, 𝑮n\boldsymbol{G}_{n}^{-}, 𝑹n+\boldsymbol{R}_{n}^{+}, and 𝑹n+\boldsymbol{R}_{n}^{+} independently. These computations can be carried out in parallel.

2) Encrypting Step — First, ISO nn transforms 𝔸n\boldsymbol{\mathbb{A}}_{n}, 𝑮n+\boldsymbol{G}_{n}^{+}, 𝑮n\boldsymbol{G}_{n}^{-}, 𝑹n+\boldsymbol{R}_{n}^{+}, and 𝑹n+\boldsymbol{R}_{n}^{+} into 𝔸¯n\boldsymbol{\bar{\mathbb{A}}}_{n}, 𝑮¯n+\boldsymbol{\bar{G}}_{n}^{+}, 𝑮¯n\boldsymbol{\bar{G}}_{n}^{-}, 𝑹¯n+\boldsymbol{\bar{R}}_{n}^{+}, and 𝑹¯n+\boldsymbol{\bar{R}}_{n}^{+}. Second, ISO nn randomly generates encryption matrix 𝑴n\boldsymbol{M}_{n} and uses it to encrypt 𝒙n\boldsymbol{x}_{n} into 𝒙¯n\boldsymbol{\bar{x}}_{n}, simultaneously masking 𝚲n\boldsymbol{\Lambda}_{n}, 𝒄n\boldsymbol{c}_{n}, and 𝔸n\boldsymbol{\mathbb{A}}_{n} into 𝑴n𝚲n𝑴n\boldsymbol{M}_{n}^{\top}\boldsymbol{\Lambda}_{n}\boldsymbol{M}_{n}, 𝒄n𝑴n\boldsymbol{c}_{n}^{\top}\boldsymbol{M}_{n}, and 𝔸¯n𝑴n\boldsymbol{\bar{\mathbb{A}}}_{n}\boldsymbol{M}_{n}, respectively.

3) Sharing Step — ISO nn shares 𝑮¯n+\boldsymbol{\bar{G}}_{n}^{+}, 𝑮¯n\boldsymbol{\bar{G}}_{n}^{-}, 𝑹¯n+\boldsymbol{\bar{R}}_{n}^{+}, 𝑹¯n+\boldsymbol{\bar{R}}_{n}^{+}, 𝔸¯n𝑴n\boldsymbol{\bar{\mathbb{A}}}_{n}\boldsymbol{M}_{n}, 𝑴n𝚲n𝑴n\boldsymbol{M}_{n}^{\top}\boldsymbol{\Lambda}_{n}\boldsymbol{M}_{n}, and 𝒄n𝑴n\boldsymbol{c}_{n}^{\top}\boldsymbol{M}_{n} with other ISOs using the AAC algorithm.

4) Solving Step — ISO nn uses the received information to build and solve (P1)(\rm P1), thus obtaining the encrypted optimal solution 𝒙¯\boldsymbol{\bar{x}}^{*}.

5) Decrypting Step — ISO nn recovers its desired optimal solution 𝒙n\boldsymbol{x}_{n}^{*} from 𝒙¯\boldsymbol{\bar{x}}^{*} using its encryption matrix 𝑴n\boldsymbol{M}_{n}.

The above five steps constitute the concise version of the proposed method. It should be noted that this version can only handle chance constraints with respect to nodal voltages included in the OPF problem. This is because 𝑼n\boldsymbol{U}_{n} is composed of the elements in 𝑩Q,n\boldsymbol{B}_{Q,n} and 𝑩P,n\boldsymbol{B}_{P,n}, and the latter two matrices can only describe the mapping relationship between nodal voltages and power injections. To solve an OPF that includes chance constraints on line flows, an extra but small effort is needed. Specifically, after the third step aforementioned, each ISO is able to express every nodal voltage (both magnitude and angle) as a function of the encrypted dispatchable generations. Since each line flow can be determined by the nodal voltages at both ends of the corresponding line, ISO nn can formulate the line flows within its area as functions of the encrypted dispatchable generations. After that, ISO nn can share these line flow expressions with others, which allows them to build the corresponding encrypted but equivalent line flow chance constraints. To protect line parameters from disclosure, ISO nn can randomly but equivalently modify the parameters in line flow expressions before sharing them.

The proposed distributed CC-OPF method has the following three main advantages:

1) The method is fully distributed. Only neighborhood communications between adjacent ISOs are required. This is because all the calculations are either implemented individually by each ISO or performed with the aid of distributed algorithms. Such a distributed structure suits the multi-party environment, e.g., a MIG with multiple regional ISOs.

2) The method strictly protects the confidential information of different regions, due to the multi-layer encryption introduced by the TE technique and the PP-AAC algorithm. This feature makes the proposed method appealing to regional ISOs, because the risk of disclosing confidential information is avoided. This can promote active and effective cooperation between areas.

3) The method does not require any manual parameter tuning. Besides, unlike traditional distributed optimization methods, convergence is not a concern for the proposed method, as every ISO eventually solves a complete problem (encrypted though) instead of a sub-problem. It should be emphasized that, although the AAC and PP-AAC algorithms embedded in the proposed method require iterative calculations, they have robust convergence; most importantly, their parameters can be directly set via generalized rules.

VI Case Study

This section verifies the performance of the proposed methods, including the fast distributed method for solving linear equation systems and the distributed CC-OPF method with confidentiality-preservation. Since their confidentiality-preserving features have already been discussed earlier and guaranteed theoretically, this section mainly verifies the accuracy and efficiency of these two methods.

In the following, the IEEE 39-bus system (Na=5N_{a}=5) and the IEEE 118-bus system (Na=9N_{a}=9) are used for testing. In each test system, the communication topology among regional ISOs is a ring, i.e., each ISO only has two neighbors in terms of information exchange. Wind farms have been added to both test systems, and the joint probability distribution of wind power is assumed to be known.

Besides, the risk limit ϵb\epsilon_{b} in (2) is set as 10410^{-4}. The chance constraints in (3) are line flow chance constraints; the corresponding lines are those who directly link to wind farms. The probability limit of (3) is set to 1αS=0.951-\alpha_{S}=0.95. The parameters of the AAC algorithm are the same as those in [36], while the extra parameters in the PP-AAC algorithm are specified as σ=2\sigma=2 and γ=0.4\gamma=0.4.

All the experiments are implemented and run on a personal laptop with i5-7267u processor and 8 GB memory. The software environment is MATLAB 2017A, and the optimization solver is the built-in function quadprog()\rm quadprog(\cdot) that calls the interior point method.

VI-A Verifications of the Fast Distributed Method for Solving Linear Equation Systems

For accuracy and efficiency verifications, the proposed fast distributed method is compared with a state-of-the-art approach, namely the accelerated projection-based consensus (APC) method [35]. The APC method has been proven to outperform a number of distributed approaches of the same type, including the distributed gradient descent, distributed versions of Nesterov’s accelerated gradient descent and heavy-ball method, the block Cimmino method, and ADMM [35].

For comparison, we do not use the two test systems introduced in the previous section but generate random square matrices of different dimensions (e.g., 45, 90, 135, 180), representing different sizes of the matrix G in order to simulate the performance for matrices of different scales. We assume nine parties, i.e. regional ISOs, and a ring as the communication topology. Each ISO only has information about partial rows of 𝑮\boldsymbol{G}. For simplicity, the numbers of rows owned by different ISOs are assumed to be identical. These ISOs respectively use the proposed method and the APC method to compute the inverse of 𝑮\boldsymbol{G} and therefore obtain the desired sub-matrix from 𝑮1\boldsymbol{G}^{-1}, i.e., ISO nn obtains 𝑩Q,n\boldsymbol{B}_{Q,n} and 𝑩P,n\boldsymbol{B}_{P,n}. The average relative errors of these two methods compared to the true value of 𝑮1\boldsymbol{G}^{-1} are given in Table II. Clearly, the proposed method outperforms the APC algorithm for these generic test cases.

TABLE II: Average Relative Errors and Computational Time (unit: seconds) of the Proposed Method and the APC Method
Dimension of 𝑮\boldsymbol{G} Error Time
APC Proposed APC Proposed
45 4.78×104\times 10^{-4} 1.22×1011\times 10^{-11} 5.75 0.08
90 8.74×104\times 10^{-4} 1.87×1011\times 10^{-11} 25.17 0.14
135 3.34×104\times 10^{-4} 9.36×1012\times 10^{-12} 182.48 0.24
180 7.18×104\times 10^{-4} 3.49×109\times 10^{-9} 295.79 0.41

It should be mentioned that in the above comparison, the stopping criterion for the APC method is chosen such that if the maximal deviation between the updated values in two adjacent iterations is lower than 10410^{-4}, then the iteration stops. But this threshold is set as 101010^{-10} for the AAC and PP-AAC algorithms. We did not deliberately set a greater threshold for the APC method. In fact, if the stopping criterion is chosen smaller, the APC algorithm requires an unacceptable number of iterations, e.g. for 10510^{-5} it will only stop after 20,000 iterations with long run-time. Also, even if we set the threshold for the AAC and PP-AAC algorithms to 10410^{-4}, the same as the APC, the relative error of the proposed method is 3.35×1063.35\times 10^{-6} when the dimension of 𝑮\boldsymbol{G} is 180, which is still significantly less than the corresponding error of the APC algorithm.

Table II also provides the computational time of the evaluated methods. As can be seen, even if the stopping tolerance of the APC algorithm is set to 10410^{-4}, the time consumed by the APC method is still by dimensions longer than the time required by the proposed method, independent of the size of 𝑮\boldsymbol{G}.

VI-B Verifications of the Distributed CC-OPF Method

To verify the accuracy of the proposed distributed CC-OPF method, both IEEE test cases described in Section VI-A are used, where TT for each case is set to 24 to simulate the day-ahead dispatch. We compare the results of the proposed method to its benchmark, i.e., solving (P0)(\rm P0) in a centralized manner with access to the global information.

Fig. 1 shows the generator outputs obtained by the proposed and benchmark methods. Due to space limitation, only the generator outputs in area 1 from the IEEE 39-bus system is shown in this figure, where generators 2 and 3 reach their maximal output from the very beginning and generator 4 hits its maximum from t=9t=9. As can be observed, the optimal solutions computed by the proposed method ideally coincide with the corresponding benchmarks.

Refer to caption
Figure 1: Generator outputs of area 1 obtained by the proposed method and the benchmark method
TABLE III: Objective Value Obtained by the Proposed Method and the Benchmark Method
Test Case Benchmark Proposed Method Relative Error
IEEE-39 110958.06 110958.13 6.03×107\times 10^{-7}
IEEE-118 8799.39124 8799.39122 2.12×109\times 10^{-9}
TABLE IV: Efficiency Comparison between the Proposed Method and Its Benchmark (unit: second)
Test Case NaN_{a} Benchmark Proposed Method
Formulating Solving Total Formulating and Encrypting Sharing Solving and Decrypting Total
IEEE-39 5 0.74 1.38 2.12 5.93 1.72 3.29 10.94
IEEE-118 9 6.11 24.84 30.95 51.16 45.78 145.07 242.01

Further, the optimal objective function values obtained by the proposed method and its benchmark are listed in Table III for both test cases. To avoid repetitive illustration, only the objective function values obtained by ISO 1 using the proposed method are shown. Table III indicates that, the proposed method has very high accuracy — yielding relative errors of less than 7×1077\times 10^{-7}. These small deviations might be all numerical, yet they might also be caused by other possible reasons, e.g.,

  1. 1.

    Although the encrypted problem (P1)(\rm P1) is proved to be equivalent to (P0)(\rm P0) mathematically, they might be different from the view of commercial solvers. For example, most of the constraints in (P0)(\rm P0) are uncoupled, while the encryption tightly couples the constraints in (P1)(\rm P1). As a result, the commercial solver can easily identify and eliminate redundant constraints in (P0)(\rm P0) before solving it, but fails to identify redundant constraint in (P1)(\rm P1). This may lead to different start points when solving (P0)(\rm P0) and (P1)(\rm P1), thereby possibly yielding slightly different final solutions.

  2. 2.

    The information exchange between ISOs is realized by the consensus-based algorithms, whose asymptotic convergence properties may introduce small error into the final results.

To verify the efficiency of the proposed distributed CC-OPF method, the computational time of each step in this method is measured and summarized in Table IV. Note that for the formulating, encrypting, and sharing steps, the time indicated is the overall computational time incurred by all ISOs, as they need cooperation to accomplish these steps. However, for the solving and decrypting steps, the time indicated is the maximal computational time incurred by an individual ISO, because these steps can be conducted by each ISO independently. The time consumed by the benchmark method is also listed in Table IV. This Table shows that the total computational time of the proposed method is always greater than that of its benchmark. Apparently, this is the price for enabling the distributed and confidentiality-preserving features. Nevertheless, the resulting overhead is acceptable for day-ahead dispatches.

VII Conclusion

This paper proposes a confidentiality-preserving distributed CC-OPF method on the basis of the TE technique. To this end, this paper first proves the TE technique’s adaptability to quadratic programming. Then, a fast distributed method for solving linear equation systems is developed, which enables regional ISOs to compute the coupled coefficients in chance constraints when they do not have the global information. Finally, the distributed CC-OPF method with confidentiality preservation is proposed. This distributed method can ensure that regional ISOs obtain and only obtain the accurate optimal dispatchable generations within their own regions without disclosing their confidential data.

References

  • [1] H. L. van Soest, M. G. J. den Elzen, and D. P. van Vuuren, “Net-zero emission targets for major emitting countries consistent with the Paris Agreement,” Nature Communications, vol. 12, no. 1, p. 2140, 2021. [Online]. Available: https://doi.org/10.1038/s41467-021-22294-x
  • [2] L. Wu, “A transformation-based multi-area dynamic economic dispatch approach for preserving information privacy of individual areas,” IEEE Transactions on Smart Grid, vol. 10, no. 1, pp. 722–731, 2019.
  • [3] L. Roald and G. Andersson, “Chance-constrained ac optimal power flow: Reformulations and efficient algorithms,” IEEE Transactions on Power Systems, vol. 33, no. 3, pp. 2906–2918, 2018.
  • [4] M. Lubin, Y. Dvorkin, and S. Backhaus, “A Robust Approach to Chance Constrained Optimal Power Flow With Renewable Generation,” IEEE Transactions on Power Systems, vol. 31, no. 5, pp. 3840–3849, Sep. 2016.
  • [5] L. Roald, S. Misra, T. Krause, and G. Andersson, “Corrective Control to Handle Forecast Uncertainty: A Chance Constrained Optimal Power Flow,” IEEE Transactions on Power Systems, vol. 32, no. 2, pp. 1626–1637, Mar. 2017.
  • [6] Y. Zhang, S. Shen, and J. L. Mathieu, “Distributionally Robust Chance-Constrained Optimal Power Flow With Uncertain Renewables and Uncertain Reserves Provided by Loads,” IEEE Transactions on Power Systems, vol. 32, no. 2, pp. 1378–1388, Mar. 2017.
  • [7] J. Schmidli, L. Roald, S. Chatzivasileiadis, and G. Andersson, “Stochastic AC optimal power flow with approximate chance-constraints,” in 2016 IEEE Power and Energy Society General Meeting (PESGM), Jul. 2016, pp. 1–5.
  • [8] M. Lubin, Y. Dvorkin, and L. Roald, “Chance Constraints for Improving the Security of AC Optimal Power Flow,” IEEE Transactions on Power Systems, vol. 34, no. 3, pp. 1908–1917, May 2019, arXiv: 1803.08754.
  • [9] K. Baker and B. Toomey, “Efficient relaxations for joint chance constrained AC optimal power flow,” Electric Power Systems Research, vol. 148, pp. 230–236, Jul. 2017.
  • [10] K. Baker and A. Bernstein, “Joint Chance Constraints in AC Optimal Power Flow: Improving Bounds through Learning,” IEEE Transactions on Smart Grid, pp. 1–1, 2019.
  • [11] M. Jia, G. Hug, and C. Shen, “Iterative decomposition of joint chance constraints in opf,” IEEE Transactions on Power Systems, pp. 1–1, 2021.
  • [12] A. Pena-Ordieres, D. K. Molzahn, L. Roald, and A. Waechter, “Dc optimal power flow with joint chance constraints,” IEEE Trans. Power Syst., pp. 1–1, 2020.
  • [13] Z. Wang, C. Shen, F. Liu, X. Wu, C. Liu, and F. Gao, “Chance-Constrained Economic Dispatch With Non-Gaussian Correlated Wind Power Uncertainty,” IEEE Transactions on Power Systems, vol. 32, no. 6, pp. 4880–4893, Nov. 2017.
  • [14] F. Ge, Y. Ju, Z. Qi, and Y. Lin, “Parameter Estimation of a Gaussian Mixture Model for Wind Power Forecast Error by Riemann L-BFGS Optimization,” IEEE Access, vol. 6, pp. 38 892–38 899, 2018.
  • [15] Z. Wang, C. Shen, F. Liu, J. Wang, and X. Wu, “An Adjustable Chance-Constrained Approach for Flexible Ramping Capacity Allocation,” IEEE Transactions on Sustainable Energy, vol. 9, no. 4, pp. 1798–1811, Oct. 2018.
  • [16] S. Mao, Y. Tang, Z. Dong, K. Meng, Z. Y. Dong, and F. Qian, “A privacy preserving distributed optimization algorithm for economic dispatch over time-varying directed networks,” IEEE Transactions on Industrial Informatics, vol. 17, no. 3, pp. 1689–1701, 2021.
  • [17] M. Adibi and J. v. d. Woude, “Distributed learning control for economic power dispatch: A privacy preserved approach,” in 2020 IEEE 29th International Symposium on Industrial Electronics (ISIE), 2020, pp. 821–826.
  • [18] P.J.M. Amended. (2017) Restated operating agreement of pjm interconnection. Brussels. [Online]. Available: http://pjm.com/-/media/documents/agreements/oa.ashx
  • [19] P.J.M. (2014) Generator operational requirements: Generator data confidentiality procedures. [Online]. Available: https://pjm.com/~/media/committees-groups/committees/oc/20140818/20140818-m14d-section-11-revisions-red-lined-version.ashx
  • [20] S. Sridhar and M. Govindarasu, “Model-based attack detection and mitigation for automatic generation control,” IEEE Transactions on Smart Grid, vol. 5, no. 2, pp. 580–591, 2014.
  • [21] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against state estimation in electric power grids,” ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, pp. 1–33, 2011.
  • [22] K. Chatterjee, V. Padmini, and S. Khaparde, “Review of cyber attacks on power system operations,” in 2017 IEEE Region 10 Symposium (TENSYMP).   IEEE, 2017, pp. 1–6.
  • [23] A. Ahmadi-Khatir, A. J. Conejo, and R. Cherkaoui, “Multi-area unit scheduling and reserve allocation under wind power uncertainty,” IEEE Transactions on Power Systems, vol. 29, no. 4, pp. 1701–1710, 2014.
  • [24] Z. Li, W. Wu, B. Zhang, and B. Wang, “Decentralized multi-area dynamic economic dispatch using modified generalized benders decomposition,” IEEE Transactions on Power Systems, vol. 31, no. 1, pp. 526–538, 2016.
  • [25] H. Li, Z. Tan, and W. Li, “Privacy-preserving vertically partitioned linear program with nonnegativity constraints,” Optimization Letters, vol. 7, no. 8, pp. 1725–1731, 2013.
  • [26] W. Li, H. Li, and C. Deng, “Privacy-preserving horizontally partitioned linear programs with inequality constraints,” Optimization Letters, vol. 7, no. 1, pp. 137–144, 2013.
  • [27] Z. Li and M. Shahidehpour, “Privacy-preserving collaborative operation of networked microgrids with the local utility grid based on enhanced benders decomposition,” IEEE Transactions on Smart Grid, vol. 11, no. 3, pp. 2638–2651, 2020.
  • [28] Y. Zhao, J. Yu, M. Ban, Y. Liu, and Z. Li, “Privacy-preserving economic dispatch for an active distribution network with multiple networked microgrids,” IEEE Access, vol. 6, pp. 38 802–38 819, 2018.
  • [29] Z. Shi, H. Liang, S. Huang, and V. Dinavahi, “Distributionally robust chance-constrained energy management for islanded microgrids,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 2234–2244, 2019.
  • [30] T. Guesmi, A. Farah, I. Marouani, B. Alshammari, and H. H. Abdallah, “Chaotic sine–cosine algorithm for chance-constrained economic emission dispatch problem including wind energy,” IET Renewable Power Generation, vol. 14, no. 10, pp. 1808–1821, 2020.
  • [31] Y. Wang, S. Zhao, Z. Zhou, A. Botterud, Y. Xu, and R. Chen, “Risk adjustable day-ahead unit commitment with wind power based on chance constrained goal programming,” IEEE Trans. Sustain. Energy, vol. 8, no. 2, pp. 530–541, 2017.
  • [32] J. Yang, N. Zhang, C. Kang, and Q. Xia, “A state-independent linear power flow model with accurate estimation of voltage magnitude,” IEEE Transactions on Power Systems, vol. 32, no. 5, pp. 3607–3617, 2017.
  • [33] H. Shuai, J. Fang, X. Ai, Y. Tang, J. Wen, and H. He, “Stochastic optimization of economic dispatch for microgrid based on approximate dynamic programming,” IEEE Transactions on Smart Grid, vol. 10, no. 3, pp. 2440–2452, May 2019.
  • [34] J. Zhan, W. Liu, and C. Y. Chung, “Stochastic transmission expansion planning considering uncertain dynamic thermal rating of overhead lines,” IEEE Transactions on Power Systems, vol. 34, no. 1, pp. 432–443, Jan 2019.
  • [35] N. Azizan-Ruhi, F. Lahouti, A. S. Avestimehr, and B. Hassibi, “Distributed solution of large-scale linear systems via accelerated projection-based consensus,” IEEE Transactions on Signal Processing, vol. 67, no. 14, pp. 3806–3817, 2019.
  • [36] T. C. Aysal, B. N. Oreshkin, and M. J. Coates, “Accelerated distributed average consensus via localized node state prediction,” IEEE Transactions on signal processing, vol. 57, no. 4, pp. 1563–1576, 2008.
  • [37] M. Jia, Y. Wang, C. Shen, and G. Hug, “Privacy-preserving distributed clustering for electrical load profiling,” IEEE Transactions on Smart Grid, vol. 12, no. 2, pp. 1429–1444, 2021.