A Fully Homomorphic Encryption Scheme for Real-Time Safe Control

被引:5
|
作者
Stobbe, Pieter [1 ]
Keijzer, Twan [1 ]
Ferrari, Riccardo M. G. [1 ]
机构
[1] Delft Univ Technol, Delft Ctr Syst & Control, Delft, Netherlands
关键词
D O I
10.1109/CDC51059.2022.9993055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fully Homomorphic Encryption (FHE) has made it possible to perform addition and multiplication operations on encrypted data. Using FHE in control thus has the advantage that control effort for a plant can be calculated remotely without ever decrypting the exchanged information. FHE in its current form is however not practically applicable for real-time control as its computational load is very high compared to traditional encryption methods. In this paper a reformulation of the Gentry FHE scheme is proposed and applied on an FPGA to solve this problem. It is shown that the resulting FHE scheme can be implemented for real-time stabilization of an inverted double pendulum using discrete time control.
引用
收藏
页码:2911 / 2916
页数:6
相关论文
共 50 条
  • [1] An efficient fully homomorphic encryption scheme
    El-Yahyaoui, Ahmed
    El Kettani, Mohamed Dafir Ech-Cherif
    [J]. International Journal of Network Security, 2019, 21 (01) : 91 - 99
  • [2] An Optimal Fully Homomorphic Encryption Scheme
    Gai, Keke
    Qiu, Meikang
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 101 - 106
  • [3] An Encryption Depth Optimization Scheme for Fully Homomorphic Encryption
    Chen, Liquan
    Ben, Hongmei
    Huang, Jie
    [J]. 2014 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI 2014), 2014, : 137 - 141
  • [4] The Implemention and Application of Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Yang, Ming
    Wang, Cai-Ling
    Xu, Shan-Shan
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 714 - 717
  • [5] Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme
    Wang, Baocang
    Zhan, Yu
    Zhang, Zhili
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1460 - 1467
  • [6] A novel method of fully homomorphic encryption scheme
    Mittal, Sonam
    Suntheya, A.K.
    Anbunathan, R.
    Ashokkumar, N.
    [J]. International Journal of Computing Science and Mathematics, 2024, 20 (03) : 228 - 242
  • [7] A retrospective analysis on fully homomorphic encryption scheme
    Mittal, Sonam
    Ramkumar, K. R.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (02) : 223 - 254
  • [8] Searchable Encryption Scheme on the Cloud Via Fully Homomorphic Encryption
    Liu, Jian
    Han, Jing-Li
    Wang, Zhao-Li
    [J]. PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 108 - 111
  • [9] A data aggregation and real-time electricity billing scheme based on homomorphic encryption in smart grid
    Zhao, Yingzhuo
    Yang, Qingyu
    Li, Donghe
    An, Dou
    [J]. PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 2545 - 2550
  • [10] Real-time Private Membership Test using Homomorphic Encryption
    Chielle, Eduardo
    Gamil, Homer
    Maniatakos, Michail
    [J]. PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1282 - 1287