5 research outputs found

    λ™μ μ œμ–΄κ³„ μ œμ–΄μ‹ ν˜Έμ˜ 인증된 계산

    Get PDF
    ν•™μœ„λ…Όλ¬Έ (석사) -- μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› : μžμ—°κ³Όν•™λŒ€ν•™ μˆ˜λ¦¬κ³Όν•™λΆ€, 2020. 8. μ²œμ •ν¬.Significant concerns on networked control system are security problems caused by the network or the controller, since a compromise on them can cause a devastating behavior or entire failure of the system. In this paper, we first propose a fundamental solution to this problem by exploiting the verifiable computation to prevent malicious behavior of controller. First, we propose a new authenticated computation to check the matrix-vector multiplications---the main arithmetic of a controller---and to check the updates on the states of the controller. It enables a plant-side not only to check computations of a controller with much less computational cost than that required for the computations itself, but also to detect any compromise on the network or the controller. In addition, the proposed authenticated computation can be applied to linear dynamic systems without any additional asymptotic computational overhead on the actuator and the controller, since the verification cost of the actuator is independent from the dimension of the states. To further reduce the cost of the actuator, we also propose a batch verification and multi-exponentiation method. These methods dramatically reduce the constant overhead of the controller so that the performance estimation of the proposed scheme demonstrates its applicability in practice.μ œμ–΄κΈ°λ‚˜ λ„€νŠΈμ›Œν¬μ— λŒ€ν•œ μœ„μ‘°λŠ” μœ„ν—˜ν•œ μƒνƒœλ‚˜ μ²΄κ³„μ˜ 정지λ₯Ό μ•ΌκΈ°ν•  수 μžˆκΈ°μ—, μ œμ–΄κΈ° 및 λ„€νŠΈμ›Œν¬μ— λŒ€ν•œ λ³΄μ•ˆ λ¬Έμ œλŠ” λ„€νŠΈμ›Œν¬ν™”λœ μ œμ–΄μ²΄κ³„κ°€ 가진 큰 우렀라 ν•  수 μžˆλ‹€.\\ λ³Έ ν•™μœ„ λ…Όλ¬Έμ—μ„œλŠ” 이런 μ•…μ˜μ μΈ μ œμ–΄κΈ° 문제λ₯Ό 근본적으둜 ν•΄κ²°ν•˜κΈ° μœ„ν•΄ 검증가λŠ₯ν•œ 계산을 처음으둜 λ„μž…ν•œλ‹€. μš°μ„ , μ œμ–΄κΈ°μ˜ μ£Ό 연산인 ν–‰λ ¬-벑터간 κ³±μ…ˆμ„ ν™•μΈν•˜κ³  μ œμ–΄κΈ°μ˜ μƒνƒœ 갱신을 ν™•μΈν•˜κΈ° μœ„ν•΄ 인증된 계산을 μƒˆλ‘œμ΄ μ œμ‹œν•œλ‹€. μ΄λŠ” ν”ŒλžœνŠΈ 츑으둜 ν•˜μ—¬κΈˆ μ œμ–΄κΈ°μ˜ 계산을 μ œμ–΄κΈ°κ°€ ν–‰ν•˜λŠ” κ³„μ‚°λŸ‰λ³΄λ‹€ 더 적은 κ³„μ‚°λŸ‰μœΌλ‘œ ν™•μΈν•˜κ²Œ ν•  뿐만 μ•„λ‹ˆλΌ, μ œμ–΄κΈ°λ‚˜ λ„€νŠΈμ›Œν¬μ— μœ„μ‘°κ°€ μžˆλŠ”μ§€λ„ 확인 κ°€λŠ₯ν•˜κ²Œ ν•΄ μ€€λ‹€.\\ λ˜ν•œ μ œμ–΄κΈ° μƒνƒœμ˜ 차원과 μ•‘μΈ„μ—μ΄ν„°μ˜ 검증 μ‹œ κ³„μ‚°λŸ‰μ€ 독립적이기에, 인증된 계산은 μ•‘μΈ„μ—μ΄ν„°λ‚˜ μ œμ–΄κΈ°μ— 점근적으둜 κ³„μ‚°λŸ‰μ„ μΆ”κ°€ν•˜μ§€ μ•Šμ€ 채 μ„ ν˜•λ™μ μ œμ–΄κ³„μ— λ„μž…ν•  수 μžˆλ‹€.\\ 이와 λ”λΆˆμ–΄ μ•‘μΈ„μ—μ΄ν„°μ˜ κ³„μ‚°λŸ‰μ„ 쀄이기 μœ„ν•΄ λ³Έ λ…Όλ¬Έμ—μ„œλŠ” 묢음 검증과 닀쀑 곱연산을 λ„μž…ν•˜μ˜€λ‹€. 이런 κ°œλ…λ“€μ€ μ œμ–΄κΈ°μ˜ μΌμ •ν•œ κ³„μ‚°λŸ‰μ„ 크게 μ€„μ—¬μ£Όμ–΄μ„œ, 이 체계가 μ‹€μ œμ— λ°˜μ˜ν•  수 μžˆμ„ μ •λ„λ‘œ μ„±λŠ₯ 예츑이 κ°€λŠ₯해지도둝 ν•˜μ˜€λ‹€.1 Introduction 1 2 Problem Formulation and Preliminaries 5 2.1 Notation 5 2.2 Problem Formulation 6 2.3 Conversion of Real-valued Parameters to Integers 7 2.4 Verifiable Computation 9 2.5 Freivalds Algorithm: Verifying Matrix Multiplication 10 2.6 Discrete Logarithm Assumption on Finite Group 11 3 Verification of Controller Computation 13 3.1 Four points of proposed VC Scheme 14 3.1.1 Randomized Verification 14 3.1.2 Compressed Commitments 15 3.1.3 Knowledge of Exponent 15 3.1.4 Proof of Equality 16 3.2 VC schemes for linear dynamic system 17 3.3 Security of the proposed VC 19 3.4 Efficiency of the proposed VC 21 3.5 Improving Efficiency 23 3.6 Performance Estimation of proposed scheme 25 4 Conclusions 27 Appendix 32 4.1 Proof of Lemma 2 32 4.2 Necessity of Alternative Random Vector 33 4.3 Algorithms: Batch Verification 34 4.4 Algorithms: Multi-exponentiation 35 Abstract (in Korean) 37 Acknowledgement (in Korean) 38Maste

    Homomorphic authenticated encryption secure against chosen-ciphertext attack

    Get PDF
    We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authenticity, and investigate relations between them. In particular, we show that it is possible to give a natural definition of IND-CCA for homomorphic authenticated encryption, unlike the case of homomorphic encryption. Also, we construct a simple homomorphic authenticated encryption scheme supporting arithmetic circuits, which is chosen-ciphertext secure both for privacy and authenticity. Our scheme is based on the error-free approximate GCD assumption

    Verifiable Encodings for Secure Homomorphic Analytics

    Full text link
    Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is not ensured. We propose two error detection encodings and build authenticators that enable practical client-verification of cloud-based homomorphic computations under different trade-offs and without compromising on the features of the encryption algorithm. Our authenticators operate on top of trending ring learning with errors based fully homomorphic encryption schemes over the integers. We implement our solution in VERITAS, a ready-to-use system for verification of outsourced computations executed over encrypted data. We show that contrary to prior work VERITAS supports verification of any homomorphic operation and we demonstrate its practicality for various applications, such as ride-hailing, genomic-data analysis, encrypted search, and machine-learning training and inference.Comment: update authors, typos corrected, scheme update
    corecore