2023
DOI: 10.1109/tac.2022.3174691
|View full text |Cite
|
Sign up to set email alerts
|

Designing Optimal Key Lengths and Control Laws for Encrypted Control Systems Based on Sample Identifying Complexity and Deciphering Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
19
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(24 citation statements)
references
References 46 publications
0
19
0
Order By: Relevance
“…In [9], the authors examined the provable security of the systems and analyzed the connection between the security and a traditional cryptographic security definition. Another study [10] focused on quantifying the security level of encrypted control systems using the sample complexity and computation time of system identification, disclosing the parameters of a target system. The study also included a design for a controller that maximizes the sample complexity of the Bayes estimation for a system matrix of a closed-loop system with an encrypted controller.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…In [9], the authors examined the provable security of the systems and analyzed the connection between the security and a traditional cryptographic security definition. Another study [10] focused on quantifying the security level of encrypted control systems using the sample complexity and computation time of system identification, disclosing the parameters of a target system. The study also included a design for a controller that maximizes the sample complexity of the Bayes estimation for a system matrix of a closed-loop system with an encrypted controller.…”
Section: Introductionmentioning
confidence: 99%
“…It should be noted that the sample complexity and computation time depend on the identification algorithm and encryption scheme used, respectively. The study [11] proposed another sample complexity for applying the approach to the least squares identification of the system and input matrices of a plant controlled by an encrypted controller.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations