arXiv Analytics

Sign in

arXiv:2404.04727 [eess.SY]AbstractReferencesReviewsResources

A code-driven tutorial on encrypted control: From pioneering realizations to modern implementations

Nils Schlüter, Junsoo Kim, Moritz Schulze Darup

Published 2024-04-06Version 1

The growing interconnectivity in control systems due to robust wireless communication and cloud usage paves the way for exciting new opportunities such as data-driven control and service-based decision-making. At the same time, connected systems are susceptible to cyberattacks and data leakages. Against this background, encrypted control aims to increase the security and safety of cyber-physical systems. A central goal is to ensure confidentiality of process data during networked controller evaluations, which is enabled by, e.g., homomorphic encryption. However, the integration of advanced cryptographic systems renders the design of encrypted controllers an interdisciplinary challenge. This code-driven tutorial paper aims to facilitate the access to encrypted control by providing exemplary realizations based on popular homomorphic cryptosystems. In particular, we discuss the encrypted implementation of state feedback and PI controllers using the Paillier, GSW, and CKKS cryptosystem.

Related articles:
arXiv:2010.00268 [eess.SY] (Published 2020-10-01)
Encrypted control for networked systems -- An illustrative introduction and current challenges
arXiv:2109.10718 [eess.SY] (Published 2021-09-22)
Input-Output History Feedback Controller for Encrypted Control with Leveled Fully Homomorphic Encryption