2020
DOI: 10.1016/j.automatica.2020.109253
|View full text |Cite
|
Sign up to set email alerts
|

A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
37
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(38 citation statements)
references
References 29 publications
0
37
0
1
Order By: Relevance
“…In our next statement, we investigate whether a malicious agent can derive the local reference value of an agent if it knows condition (13) and all the transmitted messages to and from the agent.…”
Section: Theorem 34 (A Necessary Condition On Admissible Perturbation...mentioning
confidence: 99%
See 2 more Smart Citations
“…In our next statement, we investigate whether a malicious agent can derive the local reference value of an agent if it knows condition (13) and all the transmitted messages to and from the agent.…”
Section: Theorem 34 (A Necessary Condition On Admissible Perturbation...mentioning
confidence: 99%
“…Let the interaction topology G of the agents implementing algorithm (9) with ∆ ∈ (0, min{2, ∆}), initialized at x i (0) ∈ R and v i (0) = 0, i ∈ V, be strongly connected and weight-balanced digraph. Suppose agents are implementing locally chosen admissible perturbation signals that satisfy (13), and let the knowledge set of malicious agent 1 be as in Definition 1. If agent 1 is the in-neighbor of agent i ∈ V\{1} and all its out-neighbors, then agent 1 can employ the observer…”
Section: Theorem 34 (A Necessary Condition On Admissible Perturbation...mentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], the authors proposed an interesting privacy-preserving consensus algorithm, which adds edge-based perturbations. There are also some other methods to preserve privacy, such as the state decomposition [19], output masking [20], hotpluggable methods [21] and observability based methods [22], [23], [24].…”
Section: Introductionmentioning
confidence: 99%
“…Frequently used methods include isomorphic (linear or affine) transformation, homomorphic encryption schemes (e.g., RSA, ElGamal, and Paillier), and time-varying transformation [5]. Although some encryption schemes like Paillier and ElGamal can transform (encrypt) one plaintext into different ciphertexts by selecting a different random parameter, the inverse transformation (decryption) maps those ciphertexts back on to the same plaintext again.…”
mentioning
confidence: 99%