The basis of any solution must be a protocol that provides (usually without a third party) several functions:
- Consumer privacy
- Authentication from the provider's point of view
- A relatively simple and highly secure cryptographic algorithm, working with a variable key length, implementable on various HW platforms and compatible with various types of meters and providing cryptographic homomorphism with respect to aggregation
- A certain degree of universality, in case of change