2014 IEEE International Workshop on Information Forensics and Security (WIFS) 2014
DOI: 10.1109/wifs.2014.7084303
|View full text |Cite
|
Sign up to set email alerts
|

State estimation using an extended Kalman filter with privacy-protected observed inputs

Abstract: In this paper, we focus on the parameter estimation of dynamic state-space models using privacy-protected data. We consider an scenario with two parties: on one side, the data owner, which provides privacy-protected observations to, on the other side, an algorithm owner, that processes them to learn the system's state vector. We combine additive homomorphic encryption and Secure Multiparty Computation protocols to develop secure functions (multiplication, division, matrix inversion) that keep all the intermedi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…We can information theoretically verify that the information leak caused by a share decreases as the numerical value of p ∈ P increases. Consider for instance P = {1, 2, 3} and t = 2, then according to (12), the shares of s are Then, assuming s, c 1 , and c 2 are independent and Gaussian distributed with mean value zero and variance σ 2 s , σ 2 c1 , and σ 2 c2 , respectively, then…”
Section: Proposed Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…We can information theoretically verify that the information leak caused by a share decreases as the numerical value of p ∈ P increases. Consider for instance P = {1, 2, 3} and t = 2, then according to (12), the shares of s are Then, assuming s, c 1 , and c 2 are independent and Gaussian distributed with mean value zero and variance σ 2 s , σ 2 c1 , and σ 2 c2 , respectively, then…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Regarding the complexities, as seen, Algorithm 5 uses 12 multiplications and one inversion, which amounts to 27 interactive operations, independent of the dimension of the matrices. [12] does not provide the complexity for their solution, thus, we provide here an underestimation of the number of interactive operations which lies around 10M + l + 1, where M is the dimension of the matrix R in (46) and l is the number of bits used to represent the numbers (which in the simulations by [12] is at least 24 bits).…”
Section: Simulationmentioning
confidence: 96%
See 3 more Smart Citations