“…On the other hand, PDR aims to perturb released data such that the original data can not be inferred from the perturbed data, and simultaneously, the perturbed data can still enable certain utilities [27], which is similar to the codingdecoding technology [33]. The coding-decoding technology has been investigated in the existing literature (see [4], [12], [21], [22] for single-integrator MASs, [23], [25] for double-integrator MASs, [17], [20], [32] for general linear MASs and [7] for nonlinear MASs) with the aim of designing a pair of encoder-decoder appropriately such that at each time instant, the decoding error is possibly small with the minimum size of the released data. Based on the above analysis, in this paper, we propose a novel encryption-decryption scheme combining CED and PDR technologies, where 1) the CED technology is employed to ensure the high security of the system; and 2) the PDR technology, realized by the coding-decoding technology, is employed to reduce the size of the released data, thereby reducing the heavy calculations that will be imposed on the CED algorithm.…”