5 research outputs found
λμ μ μ΄κ³ μ μ΄μ νΈμ μΈμ¦λ κ³μ°
νμλ
Όλ¬Έ (μμ¬) -- μμΈλνκ΅ λνμ : μμ°κ³Όνλν μ리과νλΆ, 2020. 8. μ²μ ν¬.Significant concerns on networked control system are security problems caused by the network or the controller, since a compromise on them can cause a devastating behavior or entire failure of the system.
In this paper, we first propose a fundamental solution to this problem by exploiting the verifiable computation to prevent malicious behavior of controller.
First, we propose a new authenticated computation to check the matrix-vector multiplications---the main arithmetic of a controller---and to check the updates on the states of the controller.
It enables a plant-side not only to check computations of a controller with much less computational cost than that required for the computations itself, but also to detect any compromise on the network or the controller.
In addition, the proposed authenticated computation can be applied to linear dynamic systems without any additional asymptotic computational overhead on the actuator and the controller, since the verification cost of the actuator is independent from the dimension of the states.
To further reduce the cost of the actuator, we also propose a batch verification and multi-exponentiation method. These methods dramatically reduce the constant overhead of the controller so that the performance estimation of the proposed scheme demonstrates its applicability in practice.μ μ΄κΈ°λ λ€νΈμν¬μ λν μμ‘°λ μνν μνλ 체κ³μ μ μ§λ₯Ό μΌκΈ°ν μ μκΈ°μ, μ μ΄κΈ° λ° λ€νΈμν¬μ λν 보μ λ¬Έμ λ λ€νΈμν¬νλ μ μ΄μ²΄κ³κ° κ°μ§ ν° μ°λ €λΌ ν μ μλ€.\\
λ³Έ νμ λ
Όλ¬Έμμλ μ΄λ° μ
μμ μΈ μ μ΄κΈ° λ¬Έμ λ₯Ό κ·Όλ³Έμ μΌλ‘ ν΄κ²°νκΈ° μν΄ κ²μ¦κ°λ₯ν κ³μ°μ μ²μμΌλ‘ λμ
νλ€. μ°μ , μ μ΄κΈ°μ μ£Ό μ°μ°μΈ νλ ¬-벑ν°κ° κ³±μ
μ νμΈνκ³ μ μ΄κΈ°μ μν κ°±μ μ νμΈνκΈ° μν΄ μΈμ¦λ κ³μ°μ μλ‘μ΄ μ μνλ€. μ΄λ νλνΈ μΈ‘μΌλ‘ νμ¬κΈ μ μ΄κΈ°μ κ³μ°μ μ μ΄κΈ°κ° ννλ κ³μ°λλ³΄λ€ λ μ μ κ³μ°λμΌλ‘ νμΈνκ² ν λΏλ§ μλλΌ, μ μ΄κΈ°λ λ€νΈμν¬μ μμ‘°κ° μλμ§λ νμΈ κ°λ₯νκ² ν΄ μ€λ€.\\
λν μ μ΄κΈ° μνμ μ°¨μκ³Ό μ‘μΈμμ΄ν°μ κ²μ¦ μ κ³μ°λμ λ
립μ μ΄κΈ°μ, μΈμ¦λ κ³μ°μ μ‘μΈμμ΄ν°λ μ μ΄κΈ°μ μ κ·Όμ μΌλ‘ κ³μ°λμ μΆκ°νμ§ μμ μ± μ νλμ μ μ΄κ³μ λμ
ν μ μλ€.\\
μ΄μ λλΆμ΄ μ‘μΈμμ΄ν°μ κ³μ°λμ μ€μ΄κΈ° μν΄ λ³Έ λ
Όλ¬Έμμλ λ¬Άμ κ²μ¦κ³Ό λ€μ€ κ³±μ°μ°μ λμ
νμλ€. μ΄λ° κ°λ
λ€μ μ μ΄κΈ°μ μΌμ ν κ³μ°λμ ν¬κ² μ€μ¬μ£Όμ΄μ, μ΄ μ²΄κ³κ° μ€μ μ λ°μν μ μμ μ λλ‘ μ±λ₯ μμΈ‘μ΄ κ°λ₯ν΄μ§λλ‘ νμλ€.1 Introduction 1
2 Problem Formulation and Preliminaries 5
2.1 Notation 5
2.2 Problem Formulation 6
2.3 Conversion of Real-valued Parameters to Integers 7
2.4 Verifiable Computation 9
2.5 Freivalds Algorithm: Verifying Matrix Multiplication 10
2.6 Discrete Logarithm Assumption on Finite Group 11
3 Verification of Controller Computation 13
3.1 Four points of proposed VC Scheme 14
3.1.1 Randomized Verification 14
3.1.2 Compressed Commitments 15
3.1.3 Knowledge of Exponent 15
3.1.4 Proof of Equality 16
3.2 VC schemes for linear dynamic system 17
3.3 Security of the proposed VC 19
3.4 Efficiency of the proposed VC 21
3.5 Improving Efficiency 23
3.6 Performance Estimation of proposed scheme 25
4 Conclusions 27
Appendix 32
4.1 Proof of Lemma 2 32
4.2 Necessity of Alternative Random Vector 33
4.3 Algorithms: Batch Verification 34
4.4 Algorithms: Multi-exponentiation 35
Abstract (in Korean) 37
Acknowledgement (in Korean) 38Maste
Homomorphic authenticated encryption secure against chosen-ciphertext attack
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authenticity, and investigate relations between them. In particular, we show that it is possible to give a natural definition of IND-CCA for homomorphic authenticated encryption, unlike the case of homomorphic encryption. Also, we construct a simple homomorphic authenticated encryption scheme supporting arithmetic circuits, which is chosen-ciphertext secure both for privacy and authenticity. Our scheme is based on the error-free approximate GCD assumption
Verifiable Encodings for Secure Homomorphic Analytics
Homomorphic encryption, which enables the execution of arithmetic operations
directly on ciphertexts, is a promising solution for protecting privacy of
cloud-delegated computations on sensitive data. However, the correctness of the
computation result is not ensured. We propose two error detection encodings and
build authenticators that enable practical client-verification of cloud-based
homomorphic computations under different trade-offs and without compromising on
the features of the encryption algorithm. Our authenticators operate on top of
trending ring learning with errors based fully homomorphic encryption schemes
over the integers. We implement our solution in VERITAS, a ready-to-use system
for verification of outsourced computations executed over encrypted data. We
show that contrary to prior work VERITAS supports verification of any
homomorphic operation and we demonstrate its practicality for various
applications, such as ride-hailing, genomic-data analysis, encrypted search,
and machine-learning training and inference.Comment: update authors, typos corrected, scheme update