4,753 research outputs found
Encrypted control for networked systems -- An illustrative introduction and current challenges
Cloud computing and distributed computing are becoming ubiquitous in many
modern control systems such as smart grids, building automation, robot swarms
or intelligent transportation systems. Compared to "isolated" control systems,
the advantages of cloud-based and distributed control systems are, in
particular, resource pooling and outsourcing, rapid scalability, and high
performance. However, these capabilities do not come without risks. In fact,
the involved communication and processing of sensitive data via public networks
and on third-party platforms promote, among other cyberthreats, eavesdropping
and manipulation of data. Encrypted control addresses this security gap and
provides confidentiality of the processed data in the entire control loop. This
paper presents a tutorial-style introduction to this young but emerging field
in the framework of secure control for networked dynamical systems.Comment: The paper is a preprint of an accepted paper in the IEEE Control
Systems Magazin
Contextualizing Alternative Models of Secret Sharing
A secret sharing scheme is a means of distributing information to a set of players such that any authorized subset of players can recover a secret and any unauthorized subset does not learn any information about the secret. In over forty years of research in secret sharing, there has been an emergence of new models and extended capabilities of secret sharing schemes. In this thesis, we study various models of secret sharing and present them in a consistent manner to provide context for each definition. We discuss extended capabilities of secret sharing schemes, including a comparison of methods for updating secrets via local computations on shares and an analysis of approaches to reproducing/repairing shares. We present an analysis of alternative adversarial settings which have been considered in the area of secret sharing. In this work, we present a formalization of a deniability property which is inherent to some classical secret sharing schemes. We provide new, game-based definitions for different notions of verifiability and robustness. By using consistent terminology and similar game-based definitions, we are able to demystify the subtle differences in each notion raised in the literature
Digital certificates and threshold cryptography
This dissertation discusses the use of secret sharing cryptographic protocols for distributing and sharing of secret documents, in our case PDF documents.
We discuss the advantages and uses of such a system in the context of collaborative environments.
Description of the cryptographic protocol involved and the necessary Public Key Infrastructure (PKI) shall be presented. We also provide an implementation of this framework as a “proof of concept” and fundament the use of a certificate extension as the basis for threshold cryptography.
Details of the shared secret distribution protocol and shared secret recovery protocol shall be given as well as the associated technical implementation details.
The actual secret sharing algorithm implemented at this stage is based on an existing well known secret sharing scheme that uses polynomial interpolation over a finite field.
Finally we conclude with a practical assessment of our prototype
- …