• Corpus ID: 237592554

Input-Output History Feedback Controller for Encrypted Control with Leveled Fully Homomorphic Encryption

  title={Input-Output History Feedback Controller for Encrypted Control with Leveled Fully Homomorphic Encryption},
  author={Kaoru Teranishi and Tomonori Sadamoto and Kiminao Kogiso},
Protecting the parameters, states, and input/output signals of a dynamic controller is essential for securely outsourcing its computation to an untrusted third party. Although a fully homomorphic encryption scheme allows the evaluation of controller operations with encrypted data, an encrypted dynamic controller with the encryption scheme destabilizes a closed-loop system or degrades the control performance due to overflow. This paper presents a novel controller representation based on… 

Figures and Tables from this paper


Design Procedure for Dynamic Controllers based on LWE-based Homomorphic Encryption to Operate for Infinite Time Horizon
In this paper, a design procedure for encrypted linear dynamic controllers is presented, providing a guideline for choosing the parameters of the cryptosystem as well as quantization, which guarantees both the desired level of security and performance.
Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems*
This paper introduces the fully homomorphic encryption (FHE) , which is an advanced cryptography that has enabled arithmetic operations directly on the encrypted variables without decryption, and introduces several new issues that have not been studied for conventional controllers.
Cyber-security enhancement of networked control systems using homomorphic encryption
This paper presents how to encrypt a linear controller using modified homomorphic encryption schemes based on public-key RSA and ElGamal encryption systems and confirms that only the scrambled parameters and signals can be seen in the controller device of the security-enhanced networked control system.
Secure and private control using semi-homomorphic encryption
It is shown that the problem of figuring out the state measurements of the neighbouring agents of a compromised agent upon using the proposed algorithm is numerically intractable.
Encrypted Value Iteration and Temporal Difference Learning over Leveled Homomorphic Encryption
This study considers an architecture of confidential cloud-based control synthesis based on Homomorphic Encryption based on Reinforcement Learning (RL) architecture over Leveled HomomorphicEncryption (LHE) to achieve more flexibility and less computational overhead.
Controller encryption for discrete event systems
A controller encryption scheme for discrete event systems is presented that secures the communication and the information inside the controller by adapting a somewhat homomorphic encryption scheme to encrypt the controller parameters and variables.
Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption
This article presents a secure and private implementation of linear time-invariant dynamic controllers using Paillier's encryption, a semihomomorphic encryption method to ensure stability and optimize performance of the closed-loop system with encrypted controller.
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
The basics of HE and the details of the well-known Partially Homomorphic Encryption and Somewhat HomomorphicEncryption, which are important pillars of achieving FHE, are presented and the main FHE families, which have become the base for the other follow-up FHE schemes are presented.
Stability Analysis and Dynamic Quantizer for Controller Encryption
The proposed quantizers achieve asymptotic stability of networked control systems with the encrypted controller by changing a scaling parameter and confidentiality of the encrypted control systems is maintained even if they use the proposed dynamic quantizer.
Encrypted Cooperative Control Based on Structured Feedback
This work proposes a novel encrypted control scheme that ensures privacy of the individual agents’ data not only during transmission but also during controller evaluations at neighboring agents.