Publications

Detailed Information

Comparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption

DC Field Value Language
dc.contributor.authorKim, Junsoo-
dc.contributor.authorKim, Dongwoo-
dc.contributor.authorSong, Yongsoo-
dc.contributor.authorShim, Hyungbo-
dc.contributor.authorSandberg, Henrik-
dc.contributor.authorJohansson, Karl H.-
dc.date.accessioned2024-05-08T06:36:59Z-
dc.date.available2024-05-08T06:36:59Z-
dc.date.created2023-10-30-
dc.date.issued2022-
dc.identifier.citationAnnual Reviews in Control, Vol.54, pp.200-218-
dc.identifier.issn1367-5788-
dc.identifier.urihttps://hdl.handle.net/10371/201195-
dc.description.abstractEncrypted control has been introduced to protect controller data by encryption at the stage of computation and communication, by performing the computation directly on encrypted data. In this article, we first review and categorize recent relevant studies on encrypted control. Approaches based on homomorphic encryption, multi-party computation, and secret sharing are introduced, compared, and then discussed with respect to computational complexity, communication load, enabled operations, security, and research directions. We proceed to discuss a current challenge in the application of homomorphic encryption to dynamic systems, where arithmetic operations other than integer addition and multiplication are limited. We also introduce a Learning With Errors based homomorphic cryptosystem called Gentry-Sahai-Waters scheme and discuss its benefits that allow for recursive multiplication of encrypted dynamic systems, without use of computationally expensive bootstrapping techniques.-
dc.language영어-
dc.publisherPergamon Press Ltd.-
dc.titleComparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption-
dc.typeArticle-
dc.identifier.doi10.1016/j.arcontrol.2022.10.002-
dc.citation.journaltitleAnnual Reviews in Control-
dc.identifier.wosid000883623400010-
dc.identifier.scopusid2-s2.0-85141308684-
dc.citation.endpage218-
dc.citation.startpage200-
dc.citation.volume54-
dc.description.isOpenAccessN-
dc.contributor.affiliatedAuthorSong, Yongsoo-
dc.contributor.affiliatedAuthorShim, Hyungbo-
dc.type.docTypeReview-
dc.description.journalClass1-
dc.subject.keywordPlusNETWORKED CONTROL-SYSTEMS-
dc.subject.keywordPlusMULTIPARTY COMPUTATION-
dc.subject.keywordPlusSECURE-
dc.subject.keywordPlusEQUALITY-
dc.subject.keywordAuthorEncrypted control-
dc.subject.keywordAuthorHomomorphic encryption-
dc.subject.keywordAuthorBootstrapping-
dc.subject.keywordAuthorMulti-party computation-
dc.subject.keywordAuthorSecret sharing-
dc.subject.keywordAuthorDynamic system over encrypted data-
dc.subject.keywordAuthorLearning With Errors-
Appears in Collections:
Files in This Item:
There are no files associated with this item.

Related Researcher

  • College of Engineering
  • Dept. of Computer Science and Engineering
Research Area Cryptography, Privacy, Security

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share