Presentation | 2022-03-11 [Invited Talk] Fundamentals and Security of Encrypted Control Systems Kiminao Kogiso, Kaoru Teranishi, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Networked control systems are constantly exposed to the threat of cyberattacks by malicious third parties. Cyberattacks against a control system that are difficult to deal with only by protecting data over communication links have been reported, such as falsifying and spoofing data inside a control device by unauthorized access. This talk introduces an encrypted control that aims to protect the data over the communication links and inside a controller in the control system. The encrypted control is realized by reconfiguring (encrypting) the controller using homomorphic encryption, which can lead to a discussion of the security of the encrypted control system from the viewpoint of cryptographic theory. Considering a cyberattack scenario in which the encrypted controller (parameters of functions) is estimated from the input and output signals in a ciphertext, this talk discusses the relationship between the security under the cyberattack scenario and the IND-CPA (Indistinguishability under Chosen Plaintext Attack) security. Finally, it provides the importance and prospects of incorporating theoretically provable security concepts into control problems to generalize the control system security. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | encrypted control system / provable security / homomorphic encryption |
Paper # | IT2021-110,ISEC2021-75,WBS2021-78,RCC2021-85 |
Date of Issue | 2022-03-03 (IT, ISEC, WBS, RCC) |
Conference Information | |
Committee | IT / ISEC / RCC / WBS |
---|---|
Conference Date | 2022/3/10(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Online |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Joint Meeting of ISEC, IT, RCC, and WBS |
Chair | Tadashi Wadayama(Nagoya Inst. of Tech.) / Tetsuya Izu(Fujitsu Labs.) / HUAN-BANG LI(NICT) / Masanori Hamamura(Kochi Univ. of Tech.) |
Vice Chair | Tetsuya Kojima(Tokyo Kosen) / Noboru Kunihiro(Tsukuba Univ.) / Goichiro Hanaoka(AIST) / Shunichi Azuma(Nagoya Univ.) / Koji Ishii(Kagawa Univ.) / Takashi Shono(INTEL) / Masahiro Fujii(Utsunomiya Univ.) |
Secretary | Tetsuya Kojima(Saitamai Univ.) / Noboru Kunihiro(Yamaguchi Univ.) / Goichiro Hanaoka(Fujitsu Labs.) / Shunichi Azuma(Ibaraki Univ.) / Koji Ishii(CRIEPI) / Takashi Shono(Osaka Univ.) / Masahiro Fujii(National Defence Academy) |
Assistant | Masanori Hirotomo(Saga Univ.) / Takahiro Matsuda(AIST) / SHAN LIN(NICT) / Masaki Ogura(Osaka Univ.) / Masayuki Kinoshita(Chiba Univ. of Tech.) / Sun Ran(Ibaraki Univ.) |
Paper Information | |
Registration To | Technical Committee on Information Theory / Technical Committee on Information Security / Technical Committee on Reliable Communication and Control / Technical Committee on Wideband System |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | [Invited Talk] Fundamentals and Security of Encrypted Control Systems |
Sub Title (in English) | |
Keyword(1) | encrypted control system |
Keyword(2) | provable security |
Keyword(3) | homomorphic encryption |
1st Author's Name | Kiminao Kogiso |
1st Author's Affiliation | The University of Electro-Communications(UEC) |
2nd Author's Name | Kaoru Teranishi |
2nd Author's Affiliation | The University of Electro-Communications(UEC) |
Date | 2022-03-11 |
Paper # | IT2021-110,ISEC2021-75,WBS2021-78,RCC2021-85 |
Volume (vol) | vol.121 |
Number (no) | IT-428,ISEC-429,WBS-430,RCC-431 |
Page | pp.pp.161-161(IT), pp.161-161(ISEC), pp.161-161(WBS), pp.161-161(RCC), |
#Pages | 1 |
Date of Issue | 2022-03-03 (IT, ISEC, WBS, RCC) |