Multi-party computation for secure polynomial control

03/30/2021
by   Sebastian Schlor, et al.
0

Encrypted control systems allow to evaluate feedback laws on external servers without revealing private information about state and input data, the control law, or the plant. While there are a number of encrypted control schemes available for linear feedback laws, only few results exist for the evaluation of more general control laws. Recently, an approach to encrypted polynomial control was presented, relying on two-party secret sharing and an inter-server communication protocol using homomorphic encryption. As homomorphic encryptions are much more computationally demanding than secret sharing, they make up for a tremendous amount of the overall computational demand of this scheme. For this reason, in this paper, we investigate schemes for secure polynomial control based solely on secret sharing. We introduce a novel secure three-party control scheme based on three-party computation. Further, we propose a novel n-party control scheme to securely evaluate polynomial feedback laws of arbitrary degree without inter-server communication. The latter property makes it easier to realize the necessary requirement regarding non-collusion of the servers, with which perfect security can be guaranteed. Simulations suggest that the presented control schemes are many times less computationally demanding than the two-party scheme mentioned above.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/11/2022

Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption

Encrypted control has been introduced to protect controller data by encr...
research
03/01/2021

Multi-Party Proof Generation in QAP-based zk-SNARKs

Zero-knowledge succinct non-interactive argument of knowledge (zkSNARK) ...
research
04/23/2021

Encrypted Distributed Lasso for Sparse Data Predictive Control

The least squares problem with L1-regularized regressors, called Lasso, ...
research
02/12/2020

Efficient Cloud-based Secret Shuffling via Homomorphic Encryption

When working with joint collections of confidential data from multiple s...
research
06/20/2023

A Survey of Multivariate Polynomial Commitment Schemes

A commitment scheme is a cryptographic tool that allows one to commit to...
research
01/10/2019

INTERPOL: Information Theoretically Verifiable Polynomial Evaluation

We study the problem of verifiable polynomial evaluation in the user-ser...
research
05/24/2023

Confidential Truth Finding with Multi-Party Computation (Extended Version)

Federated knowledge discovery and data mining are challenged to assess t...

Please sign up or login with your details

Forgot password? Click here to reset