2023
DOI: 10.1109/lcsys.2023.3234004
|View full text |Cite
|
Sign up to set email alerts
|

Model-Free Undetectable Attacks on Linear Systems Using LWE-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…To implement (10) over (Z, +, ×), recall that its state matrix F k ∈ R n×n needs to be converted to integers. Assuming that now re-encryption of u(t) is available at t = 0, k, 2k, .…”
Section: B Methods For Intermittent Re-encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…To implement (10) over (Z, +, ×), recall that its state matrix F k ∈ R n×n needs to be converted to integers. Assuming that now re-encryption of u(t) is available at t = 0, k, 2k, .…”
Section: B Methods For Intermittent Re-encryptionmentioning
confidence: 99%
“…Stability of such dynamic systems having state matrix as integers has been studied in [8]. Furthermore, the limitation on operation with HE has also been considered and handled; in data-driven methods [9], [10], protocols for privacy in multi-agent systems This paper is supported by Seoul National University of Science and Technology.…”
Section: Introductionmentioning
confidence: 99%
“…However, the homomorphic encryption used by an encrypted control system has a vulnerability called malleability [52]. Attacks that exploit malleability are difficult to detect because they do not produce white noise and thus can cause serious damage to encrypted control systems [53][54][55].…”
Section: Conventional Studiesmentioning
confidence: 99%
“…The falsification attack detection is inherited from the feature that allows the decryption and evaluation algorithms of the underlying KH-PKE scheme to output an error symbol when tampering occurs. The proposed encrypted control system benefits from the feature that enables the identification of attacked components within signals and control parameters, which constitutes a significant advantage over the conventional studies [10], [11], [12], [13], [15], [16], [17], [18], [19], [20], [21]. Moreover, a novel efficient quantizer is presented for constructing the encrypted control system, which is developed by modifying a conventional quantizer [16].…”
Section: A Our Contributionsmentioning
confidence: 99%
“…Furthermore, encrypted control systems using fully homomorphic encryption (FHE) [24], which can perform both addition and multiplication, have been proposed [12]. Some recent studies have considered encrypted control systems using AHE or leveled FHE based on learning with errors [20], [21]. Only the signal of the control system is encrypted when using AHE, whereas MHE and FHE enable the encryption of signals and controller parameters.…”
Section: Related Workmentioning
confidence: 99%