kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Privacy-preserving set-based estimation using partially homomorphic encryption
Constructor Univ, Sch Comp Sci & Engn, Bremen, Germany..
Tech Univ Munich, Dept Comp Engn, Munich, Germany..
KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Decision and Control Systems (Automatic Control).ORCID iD: 0000-0002-5744-1371
Ain Shams Univ, Dept Comp Engn, Cairo, Egypt..
Show others and affiliations
2023 (English)In: European Journal of Control, ISSN 0947-3580, E-ISSN 1435-5671, Vol. 71, p. 100786-, article id 100786Article in journal (Refereed) Published
Abstract [en]

The set-based estimation has gained a lot of attention due to its ability to guarantee state enclosures for safety-critical systems. However, collecting measurements from distributed sensors often requires out-sourcing the set-based operations to an aggregator node, raising many privacy concerns. To address this problem, we present set-based estimation protocols using partially homomorphic encryption that pre-serve the privacy of the measurements and sets bounding the estimates. We consider a linear discrete-time dynamical system with bounded modeling and measurement uncertainties. Sets are represented by zonotopes and constrained zonotopes as they can compactly represent high-dimensional sets and are closed under linear maps and Minkowski addition. By selectively encrypting parameters of the set repre-sentations, we establish the notion of encrypted sets and intersect sets in the encrypted domain, which enables guaranteed state estimation while ensuring privacy. In particular, we show that our protocols achieve computational privacy using the cryptographic notion of computational indistinguishability. We demonstrate the efficiency of our approach by localizing a real mobile quadcopter using ultra-wideband wireless devices.

Place, publisher, year, edition, pages
Elsevier BV , 2023. Vol. 71, p. 100786-, article id 100786
Keywords [en]
Set-based estimation, Homomorphic encryption, Zonotopes, Constrained zonotopes
National Category
Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-326585DOI: 10.1016/j.ejcon.2023.100786ISI: 000967698800001Scopus ID: 2-s2.0-85151403204OAI: oai:DiVA.org:kth-326585DiVA, id: diva2:1755330
Note

QC 20230508

Available from: 2023-05-08 Created: 2023-05-08 Last updated: 2023-05-08Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

He, XingkangSandberg, HenrikJohansson, Karl H.

Search in DiVA

By author/editor
He, XingkangSandberg, HenrikJohansson, Karl H.
By organisation
Decision and Control Systems (Automatic Control)
In the same journal
European Journal of Control
Control Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 183 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf