Encrypted dynamic control with unlimited operating time via FIR filters
暂无分享,去创建一个
[1] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[2] Farhad Farokhi,et al. Towards Encrypted MPC for Linear Constrained Systems , 2018, IEEE Control Systems Letters.
[3] Takahiro Fujita,et al. Cyber-security enhancement of networked control systems using homomorphic encryption , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[4] George J. Pappas,et al. Encrypted Control for Networked Systems: An Illustrative Introduction and Current Challenges , 2020, IEEE Control Systems.
[5] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[6] Hyungbo Shim,et al. Need for Controllers Having Integer Coefficients in Homomorphically Encrypted Dynamic System , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[7] Hyungbo Shim,et al. Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems* , 2016 .
[8] Iman Shames,et al. Secure and private control using semi-homomorphic encryption , 2017 .
[9] Farhad Farokhi,et al. Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption , 2018, IEEE Transactions on Automatic Control.
[10] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[11] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[12] Robert R. Bitmead,et al. The Nehari shuffle: FIR(q) filter design with guaranteed error bounds , 1992, IEEE Trans. Signal Process..
[13] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[14] Nils Schluter,et al. On the stability of linear dynamic controllers with integer coefficients , 2021, IEEE Transactions on Automatic Control.
[15] B. Anderson,et al. Optimizing FIR approximation for discrete-time IIR filters , 2003, IEEE Signal Processing Letters.
[16] Encrypted MPC based on ADMM real-time iterations , 2020 .
[17] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[18] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[19] Martin R. Albrecht,et al. On the concrete hardness of Learning with Errors , 2015, J. Math. Cryptol..
[20] Eduardo A. B. da Silva,et al. Digital Signal Processing: System Analysis and Design , 2002 .
[21] Manfred Morari,et al. Cloud-Based MPC with Encrypted Data , 2018, 2018 IEEE Conference on Decision and Control (CDC).