Secure Control of Linear Controllers Using Fully Homomorphic Encryption

被引:2
作者
Pan, Jingshan [1 ,2 ,3 ,4 ,5 ]
Sui, Tongtong [4 ]
Liu, Wen [3 ,5 ]
Wang, Jizhi [2 ,4 ,5 ]
Kong, Lingrui [4 ]
Zhao, Yue [4 ]
Wei, Zhiqiang [1 ]
机构
[1] Ocean Univ China, Coll Informat Sci & Engn, Qingdao 266100, Peoples R China
[2] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Shandong Prov Key Lab Comp Networks, Jinan 250014, Peoples R China
[3] Jinan Inst Supercomp Technol, Jinan 250301, Peoples R China
[4] Qilu Univ Technol, Fac Comp Sci & Technol, Shandong Acad Sci, Jinan 250353, Peoples R China
[5] Quancheng Lab, Jinan 250100, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 24期
关键词
encrypted controller; networked control system; fully homomorphic; BFV encryption; CRYPTOSYSTEM; SYSTEMS; MPC;
D O I
10.3390/app132413071
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In actual operation, there are security risks to the data of the network control system, mainly in the form of possible eavesdropping of signals in the transmission channel and parameters in the controller leading to data leakage. In this paper, we propose a scheme for encrypting linear controllers using fully homomorphic encryption, which effectively removes these security risks and substantially improves the security of networked control systems. Meanwhile, this paper uses precomputation to handle data encryption, which eliminates the encryption time and solves the drawback of fully homomorphic encryption that it is difficult to apply due to the efficiency problem. Compared to previous schemes with precomputation, for the first time, we propose two methods to mitigate the problem of the slight security degradation caused by precomputation, which makes our scheme more secure. Finally, we provide numerical simulation results to support our scheme, and the data show that the encrypted controller achieves normal control and improves safety and efficiency.
引用
收藏
页数:15
相关论文
共 35 条
[1]  
Alexandru A.B., 2018, P 2018 IEEE C DECISI
[2]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[3]   Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J].
Brakerski, Zvika .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :868-886
[4]   Efficient Fully Homomorphic Encryption from (Standard) LWE [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :97-106
[5]   Encrypted MPC based on ADMM real-time iterations [J].
Darup, Moritz Schulze .
IFAC PAPERSONLINE, 2020, 53 (02) :3508-3514
[6]   Encrypted Control for Networked Systems AN ILLUSTRATIVE INTRODUCTION AND CURRENT CHALLENGES [J].
Darup, Moritz Schulze ;
Alexandru, Andreea B. ;
Quevedo, Daniel E. ;
Pappas, George J. .
IEEE CONTROL SYSTEMS MAGAZINE, 2021, 41 (03) :58-78
[7]   Encrypted cloud-based MPC for linear systems with input constraints [J].
Darup, Moritz Schulze ;
Redder, Adrian ;
Quevedo, Daniel E. .
IFAC PAPERSONLINE, 2018, 51 (20) :535-542
[8]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[9]  
Fan Junfeng, 2012, Cryptology
[10]   Secure and private control using semi-homomorphic encryption [J].
Farokhi, Farhad ;
Shames, Iman ;
Batterham, Nathan .
CONTROL ENGINEERING PRACTICE, 2017, 67 :13-20