A Secure Resilient Homomorphic Encryption Scheme for Control Systems

IF 7 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Automatic Control Pub Date : 2024-12-16 DOI:10.1109/TAC.2024.3518356
Moritz Fauser;Ping Zhang
{"title":"A Secure Resilient Homomorphic Encryption Scheme for Control Systems","authors":"Moritz Fauser;Ping Zhang","doi":"10.1109/TAC.2024.3518356","DOIUrl":null,"url":null,"abstract":"Recently, the so-called resilient homomorphic encryption (RHE) scheme has been proposed by Fauser and Zhang (2021). Different from the existing homomorphic encryption schemes, the RHE scheme is able to neutralize the effect of an attack injected into the ciphertexts. Thus, a control system can still operate even if an attack takes place. In this article, the RHE scheme is further developed so that it can not only neutralize additive attacks but also satisfy the security requirement of indistinguishability under chosen plaintext attack (IND-CPA). This is achieved by choosing the modulus and the random values in the RHE scheme suitably so that the ciphertexts obtained by the secure resilient homomorphic encryption (SRHE) scheme follow the approximate greatest common divisor (AGCD) distribution. Since it can be shown that the AGCD distribution is computationally indistinguishable from the uniform distribution, the distribution of the ciphertexts obtained by the SRHE scheme is also computationally indistinguishable from the uniform distribution. Therefore, the SRHE scheme satisfies IND-CPA. An approach is given to select the parameters of the SRHE scheme systematically to guarantee the desired security level. Moreover, considering the quantization error caused by the transformation between real values and integer values, a condition for the stability of the closed-loop encrypted control system with a dynamic output feedback controller is provided. Finally, the SRHE scheme is illustrated through the well-established quadruple-tank system and analyzed with respect to the execution time of the encrypted controller, the requirement on network capacity and the usage of storage.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 6","pages":"3711-3726"},"PeriodicalIF":7.0000,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10803041/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Recently, the so-called resilient homomorphic encryption (RHE) scheme has been proposed by Fauser and Zhang (2021). Different from the existing homomorphic encryption schemes, the RHE scheme is able to neutralize the effect of an attack injected into the ciphertexts. Thus, a control system can still operate even if an attack takes place. In this article, the RHE scheme is further developed so that it can not only neutralize additive attacks but also satisfy the security requirement of indistinguishability under chosen plaintext attack (IND-CPA). This is achieved by choosing the modulus and the random values in the RHE scheme suitably so that the ciphertexts obtained by the secure resilient homomorphic encryption (SRHE) scheme follow the approximate greatest common divisor (AGCD) distribution. Since it can be shown that the AGCD distribution is computationally indistinguishable from the uniform distribution, the distribution of the ciphertexts obtained by the SRHE scheme is also computationally indistinguishable from the uniform distribution. Therefore, the SRHE scheme satisfies IND-CPA. An approach is given to select the parameters of the SRHE scheme systematically to guarantee the desired security level. Moreover, considering the quantization error caused by the transformation between real values and integer values, a condition for the stability of the closed-loop encrypted control system with a dynamic output feedback controller is provided. Finally, the SRHE scheme is illustrated through the well-established quadruple-tank system and analyzed with respect to the execution time of the encrypted controller, the requirement on network capacity and the usage of storage.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
控制系统的安全弹性同态加密方案
最近,Fauser和Zhang(2021)提出了所谓的弹性同态加密(RHE)方案。与现有的同态加密方案不同,RHE方案能够抵消注入到密文中的攻击的影响。因此,即使发生攻击,控制系统仍然可以运行。本文对RHE方案进行了进一步的发展,使其既能消除加性攻击,又能满足选择明文攻击(IND-CPA)下不可区分的安全要求。这是通过适当选择RHE方案中的模和随机值来实现的,使安全弹性同态加密(SRHE)方案获得的密文遵循近似的最大公约数(AGCD)分布。由于可以证明AGCD分布在计算上与均匀分布不可区分,因此SRHE方案获得的密文分布在计算上也与均匀分布不可区分。因此,SRHE方案满足IND-CPA。给出了一种系统地选择SRHE方案参数以保证所需安全等级的方法。此外,考虑到实值与整数值转换引起的量化误差,给出了采用动态输出反馈控制器的闭环加密控制系统稳定的条件。最后,通过完善的四缸系统对SRHE方案进行了说明,并从加密控制器的执行时间、对网络容量的要求和存储的使用等方面进行了分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Automatic Control
IEEE Transactions on Automatic Control 工程技术-工程:电子与电气
CiteScore
11.30
自引率
5.90%
发文量
824
审稿时长
9 months
期刊介绍: In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered: 1) Papers: Presentation of significant research, development, or application of control concepts. 2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions. In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.
期刊最新文献
Reaching Resilient Leader-Follower Consensus in Time-Varying Networks via Multi-Hop Relays Dynamical System Approach for Optimal Control Problems with Equilibrium Constraints Using Gap-Constraint-Based Reformulation Set-Based State Estimation for Discrete-Time Semi-Markov Jump Linear Systems Using Zonotopes Safe Event-triggered Gaussian Process Learning for Barrier-Constrained Control Energy-Gain Control of Time-Varying Systems: Receding Horizon Approximation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1