“…The falsification attack detection is inherited from the feature that allows the decryption and evaluation algorithms of the underlying KH-PKE scheme to output an error symbol when tampering occurs. The proposed encrypted control system benefits from the feature that enables the identification of attacked components within signals and control parameters, which constitutes a significant advantage over the conventional studies [10], [11], [12], [13], [15], [16], [17], [18], [19], [20], [21]. Moreover, a novel efficient quantizer is presented for constructing the encrypted control system, which is developed by modifying a conventional quantizer [16].…”