This tutorial paper aims to facilitate the access to encrypted control by providing exemplary realizations based on popular homomorphic cryptosystems, such as Paillier, GSW, and CKKS.
The paper first provides a brief overview of homomorphic encryption (HE) and the key characteristics of the three cryptosystems used in the implementations. It then discusses the necessary controller reformulations required for an encrypted realization of linear state feedback and PI control.
The main part of the paper presents the actual implementations of the two control schemes using a custom Matlab toolbox developed by the authors. The state feedback controller is implemented in both partially and fully encrypted versions, while the PI controller is realized in a fully encrypted manner.
The numerical experiments demonstrate the closed-loop performance of the encrypted controllers for varying accuracy levels, showing that the effect of the scaling factor is minor for the studied control system. The paper also notes that while the multiplicative depth is finite for both schemes, the PI controller's recursive nature leads to an unbounded number of encrypted additions, which is nonetheless handled well due to the stabilized closed-loop.
The tutorial concludes with a summary and an outlook on potential extensions, such as considering more functionalities, performance optimizations, latency, or the integration of an actual cloud.
Til et andet sprog
fra kildeindhold
arxiv.org
Vigtigste indsigter udtrukket fra
by Nils... kl. arxiv.org 04-09-2024
https://arxiv.org/pdf/2404.04727.pdfDybere Forespørgsler