SwePub
Sök i LIBRIS databas

  Utökad sökning

WFRF:(Johansson Karl Henrik 1967 )
 

Sökning: WFRF:(Johansson Karl Henrik 1967 ) > Privacy-preserving ...

Privacy-preserving set-based estimation using partially homomorphic encryption

Alanwar, Amr (författare)
Constructor Univ, Sch Comp Sci & Engn, Bremen, Germany.
Gassmann, Victor (författare)
Tech Univ Munich, Dept Comp Engn, Munich, Germany.
He, Xingkang (författare)
KTH,Reglerteknik
visa fler...
Said, Hazem (författare)
Ain Shams Univ, Dept Comp Engn, Cairo, Egypt.
Sandberg, Henrik (författare)
KTH,Reglerteknik
Johansson, Karl H., 1967- (författare)
KTH,Reglerteknik
Althoff, Matthias (författare)
Tech Univ Munich, Dept Comp Engn, Munich, Germany.
visa färre...
Constructor Univ, Sch Comp Sci & Engn, Bremen, Germany Tech Univ Munich, Dept Comp Engn, Munich, Germany. (creator_code:org_t)
Elsevier BV, 2023
2023
Engelska.
Ingår i: European Journal of Control. - : Elsevier BV. - 0947-3580 .- 1435-5671. ; 71, s. 100786-
  • Tidskriftsartikel (refereegranskat)
Abstract Ämnesord
Stäng  
  • The set-based estimation has gained a lot of attention due to its ability to guarantee state enclosures for safety-critical systems. However, collecting measurements from distributed sensors often requires out-sourcing the set-based operations to an aggregator node, raising many privacy concerns. To address this problem, we present set-based estimation protocols using partially homomorphic encryption that pre-serve the privacy of the measurements and sets bounding the estimates. We consider a linear discrete-time dynamical system with bounded modeling and measurement uncertainties. Sets are represented by zonotopes and constrained zonotopes as they can compactly represent high-dimensional sets and are closed under linear maps and Minkowski addition. By selectively encrypting parameters of the set repre-sentations, we establish the notion of encrypted sets and intersect sets in the encrypted domain, which enables guaranteed state estimation while ensuring privacy. In particular, we show that our protocols achieve computational privacy using the cryptographic notion of computational indistinguishability. We demonstrate the efficiency of our approach by localizing a real mobile quadcopter using ultra-wideband wireless devices.

Ämnesord

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Reglerteknik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Control Engineering (hsv//eng)

Nyckelord

Set-based estimation
Homomorphic encryption
Zonotopes
Constrained zonotopes

Publikations- och innehållstyp

ref (ämneskategori)
art (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy