2019
DOI: 10.1016/j.ifacol.2019.12.171
|View full text |Cite
|
Sign up to set email alerts
|

Control-theoretic Approach to Malleability Cancellation by Attacked Signal Normalization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…In the first step of Definition 3.1, the malicious inputs a t can be injected properly even though control inputs are encrypted by updatable homomorphic encryption because, in general, an encryption scheme and a public key are public information. Furthermore, even if an adversary does not know a public key, the adversary can falsify ciphertexts using malleability [17][18][19][20].…”
Section: Threat Modelmentioning
confidence: 99%
“…In the first step of Definition 3.1, the malicious inputs a t can be injected properly even though control inputs are encrypted by updatable homomorphic encryption because, in general, an encryption scheme and a public key are public information. Furthermore, even if an adversary does not know a public key, the adversary can falsify ciphertexts using malleability [17][18][19][20].…”
Section: Threat Modelmentioning
confidence: 99%
“…Although eavesdropping attacks can be prevented, the direct manipulation of signals or controller parameters enables the degradation of control performance or compromises it to break in the worst case. Encrypted control systems are vulnerable to attacks that use the malleability of the homomorphic encryption scheme [25], which means an attacker can manipulate encrypted signals and parameters to adjust controlled outputs without decrypting them. To reduce the vulnerability to attacks, there are related studies that consider countermeasures such as homomorphic authentication [26], obfuscation of controller parameters [25], and cancellation and detection by a modified somewhat homomorphic encryption [27], [28], which uses the malleability of a homomorphic encryption scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Encrypted control systems are vulnerable to attacks that use the malleability of the homomorphic encryption scheme [25], which means an attacker can manipulate encrypted signals and parameters to adjust controlled outputs without decrypting them. To reduce the vulnerability to attacks, there are related studies that consider countermeasures such as homomorphic authentication [26], obfuscation of controller parameters [25], and cancellation and detection by a modified somewhat homomorphic encryption [27], [28], which uses the malleability of a homomorphic encryption scheme. However, these studies could hardly identify an attacked component within signals and control parameters.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…1. In particular, we ignore the malleability risks [22] inherent to the considered HE scheme, which is beyond the scope of this paper. In our context, Syn(Enc(•)) can be thought of as a ciphertext domain implementation of RL algorithms.…”
Section: Encrypted Learning Over the Cloud A Cloud-based Reinforcemen...mentioning
confidence: 99%