SlideShare a Scribd company logo
1 of 17
Download to read offline
Need for Controllers having Integer Coefficients
in Homomorphically Encrypted Dynamic System
Jung Hee Cheon1, Kyoohyung Han1, Hyuntae Kim2,
Junsoo Kim2, and Hyungbo Shim2
1Department of Mathematical Science, Seoul Nat’l University
2Department of Electrical and Computer Engineering, Seoul Nat’l University
LABORATORY
CONTROL & DYNAMIC SYSTEMS
LABORATORY
CONTROL & DYNAMIC SYSTEMS
@ SNU
CONTROL & DYNAMIC SYSTEMS
December 19, 2018
Conventional Control System Protected by Cryptograph
Secret key is kept inside the controller
↓
Increased vulnerability
2 / 17
Idea of Decreasing Vulnerability
Can we perform arithmetic operations over the ciphertexts?
Yes, by the “homomorphic encryption” scheme.
3 / 17
Cryptosystem (P, C, Encsk, Decsk)
An example of LWE (Learning with Error) Scheme
P: plaintext space Zp, p: integer
C: ciphertext space Zq × ZN
q , q: integer multiple of p
sk: secret key ¯s ∈ ZN
q
¯m = Encsk(m) encrypts/maps m ∈ P into C
1. generate a random vector ¯a ∈ ZN
q
2. generate a random scalar e ∈ Zq s.t. |e| < (q/p)
3. compute b = ¯aT
¯s + q
p m + e
4. Enc¯s(m) returns ¯m = (b, ¯a)
m = Decsk( ¯m) decrypts/maps ¯m ∈ C into P
Dec¯s(b, ¯a) = (b − ¯aT
¯s) ×
p
q
= m
where the rounding · eliminate e
so that
Decsk(Encsk(m)) = m for every m ∈ P
4 / 17
Homomorphic Cryptosystem
LWE is one of homomorphic cryptosystems
Homomorphic cryptosystem has the homomorphic property:
Encsk(m1) ∗C Encsk(m2) = Encsk(m1 ∗P m2)
∗P: a binary operation on plaintext space P
∗C: a binary operation on ciphertext space C
Example of addition:
Enc¯s(m1) + Enc¯s(m2)
= (¯aT
1¯s +
q
p
m1 + e1, ¯a1) + (¯aT
2¯s +
q
p
m2 + e2, ¯a2)
= (¯a1 + ¯a2)T
¯s +
q
p
(m1 + m2) + (e1 + e2), ¯a1 + ¯a2
= (¯aT
¯s +
q
p
(m1 + m2) + e, ¯a) = Enc¯s(m1 + m2)
Multiplication in LWE scheme is also possible but complicated.
5 / 17
Short History of Homomorphic Encryption (HE)
and its Application to Feedback Control
taken from [Acar et al., ACM Computing Surveys, 2018]
Concept appeared in Rivest et al. (1978).
Partially homomorphic encryption:
Multiplication only: El-Gamal (1985)
→ Kogiso & Fujita (2015, CDC)
Addition only: Paillier (1999)
→ Farokhi, Shames, Batterham (2016, IFAC NecSys)
Fully homomorphic encryption [Gentry 2009]
→ Kim, Lee, Shim, Cheon, Kim, Kim, Song (2016, IFAC NecSys)
6 / 17
Application of HE to Feedback Control
is not yet mature, not ready for real-time streaming
data, and there are many issues.
One of the critical issues in all the previous results is that
the arithmetic operations on ciphertexts
for non-integer real number can be done only finite number of times
7 / 17
Problem: Multiplication of Non-integer Real Values
1. Non-integer real number can be handled by the
“floating-point” idea (maintaining two variables for
significand=mantissa and exponent),
as done in [Cheon, Kim, Kim, Song, ASIACRYPT 2017]
2. Floating-point arithmetic can discard LSB(least significant
bits) of mantissa:
3. It is impossible to perform an infinite number
of discarding LSB of mantissa on ciphertexts.
→ Explosion of mantissa for repeated operations.
8 / 17
How to Avoid Explosion of Mantissa?
1. If operation is not recursive, scaling is enough:
for example, in the case of static feedback
u = gy with g = 1.2 and y = 3.4
do the following:
¯y = Enc( Sy·y ) → ¯u = SM·g ·¯y → u =
1
SMSy
Dec(¯u)
with SM = Sy = 10,
¯y = Enc(34) → ¯u = 12 · ¯y → u =
1
102
Dec(¯u)
Idea: Use static feedbacks (as in [Farokhi (2016)])
or FIR(finite-impulse-reponse) filters
¯u(k) =
L
i=0
gi¯y(k − i)
9 / 17
How to Avoid Explosion of Mantissa?
2 If operation is recursive like in a dynamic controller
x(k + 1) = Ax(k) + By(k)
u(k) = Cx(k) + Dy(k)
then the scaling doesn’t help when A is non-integer:
e.g., with B = 0 and x(0) being integer
¯x(k + 1) = SM · A · ¯x(k) ⇒ ¯x(k) = SM · A k
· ¯x(0)
the mantissa of ¯x(k) explodes even if x(k) is bounded.
Note: Rounding A may not be a solution.
P(z) =
2.4
z + 1.4
is stable with C(z) =
1
z − 1.01
but not with C(z) =
1
z − 1
10 / 17
Dynamic Controller with A having Integer Elements
Controller: x(k + 1) = Ax(k) + By(k)
u(k) = Cx(k) + Dy(k)
A has integer elements
B, C, D, and y can be non-integer, and |y(k)| is bounded
Operation can be performed on ciphertexts:
¯x(k + 1) = A · ¯x(k) + SM · B · ¯y(k)
¯u(k) = SM · C · ¯x(k) + SM · D · ¯y(k)
and finally
x(k) =
1
SMSy
Dec(¯x(k)), u(k) =
1
S2
MSy
Dec(¯u(k))
Theorem: Arithmetic operation can be performed infinite times
under closed-loop stability.
11 / 17
What If The Matrix A is Non-integer?
First observation: if denominators are integers
C(z) =
bn−1zn−1 + · · · + b0
zn + an−1zn−1 + · · · + a0
then it has a realization
x(k + 1) =





−an−1 · · · −a1 −a0
1 · · · 0 0
...
...
...
...
0 · · · 1 0





x(k) +





1
0
...
0





y(k)
u(k) = bn−1 · · · b1 b0 x(t)
that has integer elements of A.
12 / 17
What If The Matrix A is Non-integer?
Therefore, if the coefficients {ai} are non-integers
C(z) =
bn−1zn−1 + · · · + b0
zn + an−1zn−1 + · · · + a0
,
find a higher order approximation that preserves closed-loop stability
For example,
C(z) =
1
z − 1.01
=
(z + 0.01)
(z − 1.01)(z + 0.01)
=
(z + 0.01)
z2 − z − 0.0101
↓
˜C(z) =
(z + 0.01)
(z − 1.01)(z + 0.01) + 0.0101
=
(z + 0.01)
z2 − z
both C(z) and ˜C(z) make the closed-loop stable
0.0101 is small s.t. C(z) ≈ ˜C(z)
z + 0.01 is stable
13 / 17
Example of Finding ˜C(z) by Optimization
C(z) =
1
z − a
→ ˜C(z) =
σ(z)
(z − a)σ(z) + ∆
=
σ(z)
zn+1 + Inzn + · · · + I0
|∆| < 1 ( it just makes I0 integer)
Coefficients of stable σ(z) = Πn
i=1(z − λi) are bounded.
→ Coefficient of (z − a)σ(z) + ∆ are bounded.
→ Searching space S for Ii is bounded.
Therefore, pick n and solve
minimize
I0,··· ,In∈S
|∆| = |an+1
+ Inan
+ · · · + I0|
subject to σ(z) is stable
14 / 17
If the minimum |∆| is sufficiently small, stability of the
closed-loop is preserved with C(z) replaced by ˜C(z).
Lemma: The closed-loop system with P(z) and ˜C(z) is stable if
σ(z) is stable, and
with P(z) = N(z)/D(z)
|∆| <
min|z|=1 |σ(z) ((z − a)D(z) + N(z))|
max|z|=1 |D(z)|
So, if the closed-loop is not stable with the optimal ∆, increase n
and solve the optimization again.
15 / 17
Simulation Result by LWE Scheme
(P, C, Encsk, Decsk) = (Z290 , Z5
2120 , Enc¯s, Dec¯s)
P(z) =
2.4
z + 1.4
and C(z) =
1
z − 1.01
the proposed optimization yields
˜C(z) =
σ(z)
(z − 1.01)σ(z) + ∆
=
σ(z)
z5 − 3z4 + 3z3 − z2
with the error ∆ = 1.01E − 6
500 600 700 800 900 1000
Step
0.09
0.095
0.1
0.105
0.11
y
Output y(k) with C(z) and ˜C(z) for step r(k) = 0.1
→
Encrypted
controller
˜C(z) can go
infinite time
horizon!
16 / 17
Conclusion
discussed the problem of finite time operation in
homomorphically encrypted dynamic controller
highlighted that an encrypted LTI controller can operate for
infinite time horizon if A has integer elements
proposed a method to convert non-integer coefficients
controller to integer coefficients without losing stability
Thank you!
Presenter: Hyuntae Kim (htkim@cdsl.kr)
17 / 17

More Related Content

What's hot

The low-rank basis problem for a matrix subspace
The low-rank basis problem for a matrix subspaceThe low-rank basis problem for a matrix subspace
The low-rank basis problem for a matrix subspaceTasuku Soma
 
HMPC for Upper Stage Attitude Control
HMPC for Upper Stage Attitude ControlHMPC for Upper Stage Attitude Control
HMPC for Upper Stage Attitude ControlPantelis Sopasakis
 
Distributed solution of stochastic optimal control problem on GPUs
Distributed solution of stochastic optimal control problem on GPUsDistributed solution of stochastic optimal control problem on GPUs
Distributed solution of stochastic optimal control problem on GPUsPantelis Sopasakis
 
Fast parallelizable scenario-based stochastic optimization
Fast parallelizable scenario-based stochastic optimizationFast parallelizable scenario-based stochastic optimization
Fast parallelizable scenario-based stochastic optimizationPantelis Sopasakis
 
Multicasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix CompletionMulticasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix CompletionTasuku Soma
 
Sloshing-aware MPC for upper stage attitude control
Sloshing-aware MPC for upper stage attitude controlSloshing-aware MPC for upper stage attitude control
Sloshing-aware MPC for upper stage attitude controlPantelis Sopasakis
 
MVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsMVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsElvis DOHMATOB
 
Linear programming in computational geometry
Linear programming in computational geometryLinear programming in computational geometry
Linear programming in computational geometryhsubhashis
 
Random Number Generators 2018
Random Number Generators 2018Random Number Generators 2018
Random Number Generators 2018rinnocente
 
Skiena algorithm 2007 lecture02 asymptotic notation
Skiena algorithm 2007 lecture02 asymptotic notationSkiena algorithm 2007 lecture02 asymptotic notation
Skiena algorithm 2007 lecture02 asymptotic notationzukun
 
Project on CFD using MATLAB
Project on CFD using MATLABProject on CFD using MATLAB
Project on CFD using MATLABRohit Avadhani
 
Lesson 5: Tangents, Velocity, the Derivative
Lesson 5: Tangents, Velocity, the DerivativeLesson 5: Tangents, Velocity, the Derivative
Lesson 5: Tangents, Velocity, the DerivativeMatthew Leingang
 
The dual geometry of Shannon information
The dual geometry of Shannon informationThe dual geometry of Shannon information
The dual geometry of Shannon informationFrank Nielsen
 

What's hot (20)

The low-rank basis problem for a matrix subspace
The low-rank basis problem for a matrix subspaceThe low-rank basis problem for a matrix subspace
The low-rank basis problem for a matrix subspace
 
HMPC for Upper Stage Attitude Control
HMPC for Upper Stage Attitude ControlHMPC for Upper Stage Attitude Control
HMPC for Upper Stage Attitude Control
 
Ece4510 notes09
Ece4510 notes09Ece4510 notes09
Ece4510 notes09
 
Distributed solution of stochastic optimal control problem on GPUs
Distributed solution of stochastic optimal control problem on GPUsDistributed solution of stochastic optimal control problem on GPUs
Distributed solution of stochastic optimal control problem on GPUs
 
Ece4510 notes10
Ece4510 notes10Ece4510 notes10
Ece4510 notes10
 
Absorbing Random Walk Centrality
Absorbing Random Walk CentralityAbsorbing Random Walk Centrality
Absorbing Random Walk Centrality
 
Fast parallelizable scenario-based stochastic optimization
Fast parallelizable scenario-based stochastic optimizationFast parallelizable scenario-based stochastic optimization
Fast parallelizable scenario-based stochastic optimization
 
Multicasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix CompletionMulticasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix Completion
 
Sloshing-aware MPC for upper stage attitude control
Sloshing-aware MPC for upper stage attitude controlSloshing-aware MPC for upper stage attitude control
Sloshing-aware MPC for upper stage attitude control
 
Time complexity
Time complexityTime complexity
Time complexity
 
MVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsMVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priors
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Linear programming in computational geometry
Linear programming in computational geometryLinear programming in computational geometry
Linear programming in computational geometry
 
Random Number Generators 2018
Random Number Generators 2018Random Number Generators 2018
Random Number Generators 2018
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Skiena algorithm 2007 lecture02 asymptotic notation
Skiena algorithm 2007 lecture02 asymptotic notationSkiena algorithm 2007 lecture02 asymptotic notation
Skiena algorithm 2007 lecture02 asymptotic notation
 
Project on CFD using MATLAB
Project on CFD using MATLABProject on CFD using MATLAB
Project on CFD using MATLAB
 
QMC: Transition Workshop - Applying Quasi-Monte Carlo Methods to a Stochastic...
QMC: Transition Workshop - Applying Quasi-Monte Carlo Methods to a Stochastic...QMC: Transition Workshop - Applying Quasi-Monte Carlo Methods to a Stochastic...
QMC: Transition Workshop - Applying Quasi-Monte Carlo Methods to a Stochastic...
 
Lesson 5: Tangents, Velocity, the Derivative
Lesson 5: Tangents, Velocity, the DerivativeLesson 5: Tangents, Velocity, the Derivative
Lesson 5: Tangents, Velocity, the Derivative
 
The dual geometry of Shannon information
The dual geometry of Shannon informationThe dual geometry of Shannon information
The dual geometry of Shannon information
 

Similar to Need for Controllers having Integer Coefficients in Homomorphically Encrypted Dynamic System

SIAM - Minisymposium on Guaranteed numerical algorithms
SIAM - Minisymposium on Guaranteed numerical algorithmsSIAM - Minisymposium on Guaranteed numerical algorithms
SIAM - Minisymposium on Guaranteed numerical algorithmsJagadeeswaran Rathinavel
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationAlexander Litvinenko
 
Tensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantificationTensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantificationAlexander Litvinenko
 
Divergence clustering
Divergence clusteringDivergence clustering
Divergence clusteringFrank Nielsen
 
ASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfJunsoo Kim
 
Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Alexander Litvinenko
 
On approximating the Riemannian 1-center
On approximating the Riemannian 1-centerOn approximating the Riemannian 1-center
On approximating the Riemannian 1-centerFrank Nielsen
 
598Lecture12.pdf
598Lecture12.pdf598Lecture12.pdf
598Lecture12.pdf以良 方
 
Litvinenko low-rank kriging +FFT poster
Litvinenko low-rank kriging +FFT  posterLitvinenko low-rank kriging +FFT  poster
Litvinenko low-rank kriging +FFT posterAlexander Litvinenko
 
Bayesian inference on mixtures
Bayesian inference on mixturesBayesian inference on mixtures
Bayesian inference on mixturesChristian Robert
 
Murphy: Machine learning A probabilistic perspective: Ch.9
Murphy: Machine learning A probabilistic perspective: Ch.9Murphy: Machine learning A probabilistic perspective: Ch.9
Murphy: Machine learning A probabilistic perspective: Ch.9Daisuke Yoneoka
 
Joint blind calibration and time-delay estimation for multiband ranging
Joint blind calibration and time-delay estimation for multiband rangingJoint blind calibration and time-delay estimation for multiband ranging
Joint blind calibration and time-delay estimation for multiband rangingTarik Kazaz
 
Numerical integration based on the hyperfunction theory
Numerical integration based on the hyperfunction theoryNumerical integration based on the hyperfunction theory
Numerical integration based on the hyperfunction theoryHidenoriOgata
 
On learning statistical mixtures maximizing the complete likelihood
On learning statistical mixtures maximizing the complete likelihoodOn learning statistical mixtures maximizing the complete likelihood
On learning statistical mixtures maximizing the complete likelihoodFrank Nielsen
 
Digital Signal Processing
Digital Signal ProcessingDigital Signal Processing
Digital Signal Processingaj ahmed
 
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMSSOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMSTahia ZERIZER
 
Hybrid dynamics in large-scale logistics networks
Hybrid dynamics in large-scale logistics networksHybrid dynamics in large-scale logistics networks
Hybrid dynamics in large-scale logistics networksMKosmykov
 
Tensor train to solve stochastic PDEs
Tensor train to solve stochastic PDEsTensor train to solve stochastic PDEs
Tensor train to solve stochastic PDEsAlexander Litvinenko
 

Similar to Need for Controllers having Integer Coefficients in Homomorphically Encrypted Dynamic System (20)

SIAM - Minisymposium on Guaranteed numerical algorithms
SIAM - Minisymposium on Guaranteed numerical algorithmsSIAM - Minisymposium on Guaranteed numerical algorithms
SIAM - Minisymposium on Guaranteed numerical algorithms
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty Quantification
 
Tensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantificationTensor Train data format for uncertainty quantification
Tensor Train data format for uncertainty quantification
 
MUMS: Bayesian, Fiducial, and Frequentist Conference - Coverage of Credible I...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Coverage of Credible I...MUMS: Bayesian, Fiducial, and Frequentist Conference - Coverage of Credible I...
MUMS: Bayesian, Fiducial, and Frequentist Conference - Coverage of Credible I...
 
stochastic processes assignment help
stochastic processes assignment helpstochastic processes assignment help
stochastic processes assignment help
 
Divergence clustering
Divergence clusteringDivergence clustering
Divergence clustering
 
ASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdfASCC2022_JunsooKim_220530_.pdf
ASCC2022_JunsooKim_220530_.pdf
 
Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics
 
On approximating the Riemannian 1-center
On approximating the Riemannian 1-centerOn approximating the Riemannian 1-center
On approximating the Riemannian 1-center
 
598Lecture12.pdf
598Lecture12.pdf598Lecture12.pdf
598Lecture12.pdf
 
Litvinenko low-rank kriging +FFT poster
Litvinenko low-rank kriging +FFT  posterLitvinenko low-rank kriging +FFT  poster
Litvinenko low-rank kriging +FFT poster
 
Bayesian inference on mixtures
Bayesian inference on mixturesBayesian inference on mixtures
Bayesian inference on mixtures
 
Murphy: Machine learning A probabilistic perspective: Ch.9
Murphy: Machine learning A probabilistic perspective: Ch.9Murphy: Machine learning A probabilistic perspective: Ch.9
Murphy: Machine learning A probabilistic perspective: Ch.9
 
Joint blind calibration and time-delay estimation for multiband ranging
Joint blind calibration and time-delay estimation for multiband rangingJoint blind calibration and time-delay estimation for multiband ranging
Joint blind calibration and time-delay estimation for multiband ranging
 
Numerical integration based on the hyperfunction theory
Numerical integration based on the hyperfunction theoryNumerical integration based on the hyperfunction theory
Numerical integration based on the hyperfunction theory
 
On learning statistical mixtures maximizing the complete likelihood
On learning statistical mixtures maximizing the complete likelihoodOn learning statistical mixtures maximizing the complete likelihood
On learning statistical mixtures maximizing the complete likelihood
 
Digital Signal Processing
Digital Signal ProcessingDigital Signal Processing
Digital Signal Processing
 
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMSSOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
 
Hybrid dynamics in large-scale logistics networks
Hybrid dynamics in large-scale logistics networksHybrid dynamics in large-scale logistics networks
Hybrid dynamics in large-scale logistics networks
 
Tensor train to solve stochastic PDEs
Tensor train to solve stochastic PDEsTensor train to solve stochastic PDEs
Tensor train to solve stochastic PDEs
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Need for Controllers having Integer Coefficients in Homomorphically Encrypted Dynamic System

  • 1. Need for Controllers having Integer Coefficients in Homomorphically Encrypted Dynamic System Jung Hee Cheon1, Kyoohyung Han1, Hyuntae Kim2, Junsoo Kim2, and Hyungbo Shim2 1Department of Mathematical Science, Seoul Nat’l University 2Department of Electrical and Computer Engineering, Seoul Nat’l University LABORATORY CONTROL & DYNAMIC SYSTEMS LABORATORY CONTROL & DYNAMIC SYSTEMS @ SNU CONTROL & DYNAMIC SYSTEMS December 19, 2018
  • 2. Conventional Control System Protected by Cryptograph Secret key is kept inside the controller ↓ Increased vulnerability 2 / 17
  • 3. Idea of Decreasing Vulnerability Can we perform arithmetic operations over the ciphertexts? Yes, by the “homomorphic encryption” scheme. 3 / 17
  • 4. Cryptosystem (P, C, Encsk, Decsk) An example of LWE (Learning with Error) Scheme P: plaintext space Zp, p: integer C: ciphertext space Zq × ZN q , q: integer multiple of p sk: secret key ¯s ∈ ZN q ¯m = Encsk(m) encrypts/maps m ∈ P into C 1. generate a random vector ¯a ∈ ZN q 2. generate a random scalar e ∈ Zq s.t. |e| < (q/p) 3. compute b = ¯aT ¯s + q p m + e 4. Enc¯s(m) returns ¯m = (b, ¯a) m = Decsk( ¯m) decrypts/maps ¯m ∈ C into P Dec¯s(b, ¯a) = (b − ¯aT ¯s) × p q = m where the rounding · eliminate e so that Decsk(Encsk(m)) = m for every m ∈ P 4 / 17
  • 5. Homomorphic Cryptosystem LWE is one of homomorphic cryptosystems Homomorphic cryptosystem has the homomorphic property: Encsk(m1) ∗C Encsk(m2) = Encsk(m1 ∗P m2) ∗P: a binary operation on plaintext space P ∗C: a binary operation on ciphertext space C Example of addition: Enc¯s(m1) + Enc¯s(m2) = (¯aT 1¯s + q p m1 + e1, ¯a1) + (¯aT 2¯s + q p m2 + e2, ¯a2) = (¯a1 + ¯a2)T ¯s + q p (m1 + m2) + (e1 + e2), ¯a1 + ¯a2 = (¯aT ¯s + q p (m1 + m2) + e, ¯a) = Enc¯s(m1 + m2) Multiplication in LWE scheme is also possible but complicated. 5 / 17
  • 6. Short History of Homomorphic Encryption (HE) and its Application to Feedback Control taken from [Acar et al., ACM Computing Surveys, 2018] Concept appeared in Rivest et al. (1978). Partially homomorphic encryption: Multiplication only: El-Gamal (1985) → Kogiso & Fujita (2015, CDC) Addition only: Paillier (1999) → Farokhi, Shames, Batterham (2016, IFAC NecSys) Fully homomorphic encryption [Gentry 2009] → Kim, Lee, Shim, Cheon, Kim, Kim, Song (2016, IFAC NecSys) 6 / 17
  • 7. Application of HE to Feedback Control is not yet mature, not ready for real-time streaming data, and there are many issues. One of the critical issues in all the previous results is that the arithmetic operations on ciphertexts for non-integer real number can be done only finite number of times 7 / 17
  • 8. Problem: Multiplication of Non-integer Real Values 1. Non-integer real number can be handled by the “floating-point” idea (maintaining two variables for significand=mantissa and exponent), as done in [Cheon, Kim, Kim, Song, ASIACRYPT 2017] 2. Floating-point arithmetic can discard LSB(least significant bits) of mantissa: 3. It is impossible to perform an infinite number of discarding LSB of mantissa on ciphertexts. → Explosion of mantissa for repeated operations. 8 / 17
  • 9. How to Avoid Explosion of Mantissa? 1. If operation is not recursive, scaling is enough: for example, in the case of static feedback u = gy with g = 1.2 and y = 3.4 do the following: ¯y = Enc( Sy·y ) → ¯u = SM·g ·¯y → u = 1 SMSy Dec(¯u) with SM = Sy = 10, ¯y = Enc(34) → ¯u = 12 · ¯y → u = 1 102 Dec(¯u) Idea: Use static feedbacks (as in [Farokhi (2016)]) or FIR(finite-impulse-reponse) filters ¯u(k) = L i=0 gi¯y(k − i) 9 / 17
  • 10. How to Avoid Explosion of Mantissa? 2 If operation is recursive like in a dynamic controller x(k + 1) = Ax(k) + By(k) u(k) = Cx(k) + Dy(k) then the scaling doesn’t help when A is non-integer: e.g., with B = 0 and x(0) being integer ¯x(k + 1) = SM · A · ¯x(k) ⇒ ¯x(k) = SM · A k · ¯x(0) the mantissa of ¯x(k) explodes even if x(k) is bounded. Note: Rounding A may not be a solution. P(z) = 2.4 z + 1.4 is stable with C(z) = 1 z − 1.01 but not with C(z) = 1 z − 1 10 / 17
  • 11. Dynamic Controller with A having Integer Elements Controller: x(k + 1) = Ax(k) + By(k) u(k) = Cx(k) + Dy(k) A has integer elements B, C, D, and y can be non-integer, and |y(k)| is bounded Operation can be performed on ciphertexts: ¯x(k + 1) = A · ¯x(k) + SM · B · ¯y(k) ¯u(k) = SM · C · ¯x(k) + SM · D · ¯y(k) and finally x(k) = 1 SMSy Dec(¯x(k)), u(k) = 1 S2 MSy Dec(¯u(k)) Theorem: Arithmetic operation can be performed infinite times under closed-loop stability. 11 / 17
  • 12. What If The Matrix A is Non-integer? First observation: if denominators are integers C(z) = bn−1zn−1 + · · · + b0 zn + an−1zn−1 + · · · + a0 then it has a realization x(k + 1) =      −an−1 · · · −a1 −a0 1 · · · 0 0 ... ... ... ... 0 · · · 1 0      x(k) +      1 0 ... 0      y(k) u(k) = bn−1 · · · b1 b0 x(t) that has integer elements of A. 12 / 17
  • 13. What If The Matrix A is Non-integer? Therefore, if the coefficients {ai} are non-integers C(z) = bn−1zn−1 + · · · + b0 zn + an−1zn−1 + · · · + a0 , find a higher order approximation that preserves closed-loop stability For example, C(z) = 1 z − 1.01 = (z + 0.01) (z − 1.01)(z + 0.01) = (z + 0.01) z2 − z − 0.0101 ↓ ˜C(z) = (z + 0.01) (z − 1.01)(z + 0.01) + 0.0101 = (z + 0.01) z2 − z both C(z) and ˜C(z) make the closed-loop stable 0.0101 is small s.t. C(z) ≈ ˜C(z) z + 0.01 is stable 13 / 17
  • 14. Example of Finding ˜C(z) by Optimization C(z) = 1 z − a → ˜C(z) = σ(z) (z − a)σ(z) + ∆ = σ(z) zn+1 + Inzn + · · · + I0 |∆| < 1 ( it just makes I0 integer) Coefficients of stable σ(z) = Πn i=1(z − λi) are bounded. → Coefficient of (z − a)σ(z) + ∆ are bounded. → Searching space S for Ii is bounded. Therefore, pick n and solve minimize I0,··· ,In∈S |∆| = |an+1 + Inan + · · · + I0| subject to σ(z) is stable 14 / 17
  • 15. If the minimum |∆| is sufficiently small, stability of the closed-loop is preserved with C(z) replaced by ˜C(z). Lemma: The closed-loop system with P(z) and ˜C(z) is stable if σ(z) is stable, and with P(z) = N(z)/D(z) |∆| < min|z|=1 |σ(z) ((z − a)D(z) + N(z))| max|z|=1 |D(z)| So, if the closed-loop is not stable with the optimal ∆, increase n and solve the optimization again. 15 / 17
  • 16. Simulation Result by LWE Scheme (P, C, Encsk, Decsk) = (Z290 , Z5 2120 , Enc¯s, Dec¯s) P(z) = 2.4 z + 1.4 and C(z) = 1 z − 1.01 the proposed optimization yields ˜C(z) = σ(z) (z − 1.01)σ(z) + ∆ = σ(z) z5 − 3z4 + 3z3 − z2 with the error ∆ = 1.01E − 6 500 600 700 800 900 1000 Step 0.09 0.095 0.1 0.105 0.11 y Output y(k) with C(z) and ˜C(z) for step r(k) = 0.1 → Encrypted controller ˜C(z) can go infinite time horizon! 16 / 17
  • 17. Conclusion discussed the problem of finite time operation in homomorphically encrypted dynamic controller highlighted that an encrypted LTI controller can operate for infinite time horizon if A has integer elements proposed a method to convert non-integer coefficients controller to integer coefficients without losing stability Thank you! Presenter: Hyuntae Kim (htkim@cdsl.kr) 17 / 17