, Energy rating Uci: Machine learning repository, 2016.

R. Agrawal and R. Srikant, Privacy-preserving data mining, ACM SIGMOD Record, vol.29, issue.2, pp.439-450, 2000.
DOI : 10.1145/335191.335438

R. Bayardo and R. Agrawal, Data privacy through optimal kanonymization, Proceedings 21st International Conference on Data Engineering, pp.217-228, 2005.

R. Bost, R. Popa, S. Tu, and S. Goldwasser, Machine Learning Classification over Encrypted Data, Proceedings 2015 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2015.23241

Z. Brakerski, C. Gentry, and V. Vaikuntanathan, Fully homomorphic encryption without bootstrapping, Cryptology ePrint Archive Report, vol.277, 2011.

D. Catalano and D. Fiore, Boosting linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data, Cryptology ePrint Archive, vol.813813, 2014.

A. Cavoukian, J. Polonetsky, and C. Wolf, SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation, Identity in the Information Society, vol.3, issue.2, pp.275-294, 2010.
DOI : 10.1007/s12394-010-0046-y

, Pack de conformite sur les compteurs communicants, CNIL, 2012.

D. Silva, D. Yu, X. Alahakoon, D. Holmes, and G. , A Data Mining Framework for Electricity Consumption Analysis From Meter Data, IEEE Transactions on Industrial Informatics, vol.7, issue.3, pp.399-407, 2011.
DOI : 10.1109/TII.2011.2158844

G. Gentry, A. Sahai, and B. Waters, Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based, CRYPTO, pp.75-92, 2013.
DOI : 10.1007/978-3-642-40041-4_5

S. Goldwasser and S. Micali, Probabilistic encryption & how to play mental poker keeping secret all partial information, Proceedings of the fourteenth annual ACM symposium on Theory of computing , STOC '82, pp.365-377, 1982.
DOI : 10.1145/800070.802212

T. Graepel, K. Lauter, and M. Naehrig, ML Confidential: Machine Learning on Encrypted Data, IACR Cryptology ePrint Archive, p.323, 2012.
DOI : 10.1007/978-3-642-37682-5_1

S. Halevi, Helib -an implementation of homomorphic encryption. https://github, 2013.

M. Kantarcioglu and C. Clifton, Privately Computing a Distributed k-nn Classifier, Proceedings of the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, PKDD '04, pp.279-290, 2004.
DOI : 10.1007/978-3-540-30116-5_27

H. Kim, M. Marwah, M. Arlitt, G. Lyon, and J. Han, Unsupervised Disaggregation of Low Frequency Power Measurements, 2010.
DOI : 10.1137/1.9781611972818.64

URL : http://www.cs.uiuc.edu/%7Ehanj/pdf/sdm11_hkim.pdf

F. Li, B. Luo, and P. Liu, Secure Information Aggregation for Smart Grids Using Homomorphic Encryption, 2010 First IEEE International Conference on Smart Grid Communications, pp.327-332, 2010.
DOI : 10.1109/SMARTGRID.2010.5622064

Y. Lindell and B. Pinkas, Privacy preserving data mining, In JOURNAL OF CRYPTOLOGY, pp.36-54, 2000.

J. B. Macqueen, Some methods for classification and analysis of multivariate observations, Proceedings of the fifth Berkeley Symposium on Mathematical Statistics and Probability, pp.281-297, 1967.

T. Nikolaou, D. Kolokotsa, G. Stavrakakis, A. Apostolou, and C. Munteanu, Review and state of the art on methodologies of buildings' energyefficiency classification, Managing Indoor Environments and Energy in Buildings with Integrated Intelligent Systems, pp.13-31, 2015.

, Guidelines for smar grid cyber security, NIST, 2010.

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT 99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

B. Samanthula, Y. Elmehdwi, and W. Jiang, <italic>k</italic>-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data, IEEE Transactions on Knowledge and Data Engineering, vol.27, issue.5, 2014.
DOI : 10.1109/TKDE.2014.2364027

N. P. Smart and F. Vercauteren, Fully homomorphic SIMD operations, Designs, Codes and Cryptography, vol.4296, issue.250???267, pp.57-81, 2014.
DOI : 10.1007/11927587_5

S. V. Verdu, M. Garcia, C. , S. Marin, A. G. Franco et al., Classification, Filtering, and Identification of Electrical Customer Load Patterns Through the Use of Self-Organizing Maps, IEEE Transactions on Power Sys- tems, 2006.
DOI : 10.1109/TPWRS.2006.881133

B. Vetter, O. Ugus, D. Westhoff, and C. Sorge, Homomorphic primitives for a privacy -friendly smart metering architecture, SECRYPT, pp.102-112, 2012.

M. Zirm and M. Niedermeier, The future of homomorphic cryptography in smart grid applications, Procedeedings of the 3rd IEEE Germany Student Conference, 2012.