z-logo
Premium
Encrypted polynomial control based on tailored two‐party computation
Author(s) -
Schulze Darup Moritz
Publication year - 2020
Publication title -
international journal of robust and nonlinear control
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.361
H-Index - 106
eISSN - 1099-1239
pISSN - 1049-8923
DOI - 10.1002/rnc.5003
Subject(s) - encryption , homomorphic encryption , computer science , computation , homomorphic secret sharing , cryptography , polynomial , controller (irrigation) , theoretical computer science , secure multi party computation , algorithm , computer network , mathematics , mathematical analysis , agronomy , biology
Summary Encrypted control enables confidential controller evaluations in cloud‐based or networked control systems. Roughly speaking, an encrypted controller is a modified control algorithms that is capable of computing encrypted control actions based on encrypted system states. Encrypted control has been realized using different tools from cryptography such as homomorphic encryption, secret sharing, and multiparty computation. However, the vast majority of existing encrypted controllers is linear or makes intensive use of encrypted linear operations. In this article, we present a novel and flexible method for the encrypted implementation of arbitrary polynomial controllers. Technically, our approach builds on tailored two‐party computation combined with secret sharing and additively homomorphic encryption.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here