Search: onr:"swepub:oai:DiVA.org:kth-326585" >
Privacy-preserving ...
Privacy-preserving set-based estimation using partially homomorphic encryption
-
- Alanwar, Amr (author)
- Constructor Univ, Sch Comp Sci & Engn, Bremen, Germany.
-
- Gassmann, Victor (author)
- Tech Univ Munich, Dept Comp Engn, Munich, Germany.
-
- He, Xingkang (author)
- KTH,Reglerteknik
-
show more...
-
- Said, Hazem (author)
- Ain Shams Univ, Dept Comp Engn, Cairo, Egypt.
-
- Sandberg, Henrik (author)
- KTH,Reglerteknik
-
- Johansson, Karl H., 1967- (author)
- KTH,Reglerteknik
-
- Althoff, Matthias (author)
- Tech Univ Munich, Dept Comp Engn, Munich, Germany.
-
show less...
-
Constructor Univ, Sch Comp Sci & Engn, Bremen, Germany Tech Univ Munich, Dept Comp Engn, Munich, Germany. (creator_code:org_t)
- Elsevier BV, 2023
- 2023
- English.
-
In: European Journal of Control. - : Elsevier BV. - 0947-3580 .- 1435-5671. ; 71, s. 100786-
- Related links:
-
https://urn.kb.se/re...
-
show more...
-
https://doi.org/10.1...
-
show less...
Abstract
Subject headings
Close
- The set-based estimation has gained a lot of attention due to its ability to guarantee state enclosures for safety-critical systems. However, collecting measurements from distributed sensors often requires out-sourcing the set-based operations to an aggregator node, raising many privacy concerns. To address this problem, we present set-based estimation protocols using partially homomorphic encryption that pre-serve the privacy of the measurements and sets bounding the estimates. We consider a linear discrete-time dynamical system with bounded modeling and measurement uncertainties. Sets are represented by zonotopes and constrained zonotopes as they can compactly represent high-dimensional sets and are closed under linear maps and Minkowski addition. By selectively encrypting parameters of the set repre-sentations, we establish the notion of encrypted sets and intersect sets in the encrypted domain, which enables guaranteed state estimation while ensuring privacy. In particular, we show that our protocols achieve computational privacy using the cryptographic notion of computational indistinguishability. We demonstrate the efficiency of our approach by localizing a real mobile quadcopter using ultra-wideband wireless devices.
Subject headings
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik -- Reglerteknik (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering -- Control Engineering (hsv//eng)
Keyword
- Set-based estimation
- Homomorphic encryption
- Zonotopes
- Constrained zonotopes
Publication and Content Type
- ref (subject category)
- art (subject category)
Find in a library
To the university's database