Cooperative secure parameter identification of multi-participant ARX systems — a threshold Paillier cryptosystem-based least-squares identification algorithm

被引:0
|
作者
Tan J. [1 ,2 ]
Wang J. [3 ]
Zhang J. [1 ,2 ]
机构
[1] Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing
[2] School of Mathematical Sciences, University of Chinese Academy of Sciences, Beijing
[3] School of Automation and Electrical Engineering, University of Science and Technology Beijing, Beijing
关键词
least squares method; multi-participant ARX system; privacy security; system identification; threshold Paillier cryptosystem;
D O I
10.1360/SSI-2023-0140
中图分类号
学科分类号
摘要
In this paper, the cooperative secure parameter identification problem of stochastic linear systems with multiple participants is studied, and a threshold Paillier cryptosystem-based secure multiparty least-squares identification algorithm is proposed. Specifically, by encoding positive and negative integers properly, the encryption object and homomorphic properties of the (threshold) Paillier cryptosystem are extended from nonnegative integers to integers. Using the threshold Paillier cryptosystem and the method for data segmentation along the time axis, the corresponding secure multiparty parameter identification algorithm is designed. The condition of plaintext space size required for correct encryption and decryption, the condition of the time slicing length to ensure privacy security, and the quantitative relationship between estimation error and encryption quantization error under certain conditions are given. We prove that as long as an appropriate length for time slicing is chosen, the specific private information of any given participant still cannot be obtained, even if all other participants colluded. Finally, the efficiency of the algorithm is verified using a numerical example. © 2023 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:2472 / 2492
页数:20
相关论文
共 26 条
  • [1] Chen T M., Stuxnet, the real start of cyber warfare?, IEEE Network, 24, pp. 2-3, (2010)
  • [2] Fidler D P., Was Stuxnet an act of war? Decoding a cyberattack, IEEE Secur Privacy Mag, 9, pp. 56-59, (2011)
  • [3] Zhou K, Doyle J C, Glover K., Robust and Optimal Control, (1996)
  • [4] Chen H, Guo L., Identification and Stochastic Adaptive Control, Stochastics & Stochastic Reports, pp. 123-128, (1991)
  • [5] Guan X H, Shen C, Liu T., Data security is the foundation of cyberspace security, China Netw Inform, 1, pp. 233-236, (2022)
  • [6] Zhang J F, Tan J W, Wang J M., Privacy security in control systems, Sci China Inf Sci, 64, (2021)
  • [7] Ny J L, Pappas G J., Differentially Private Filtering, IEEE Trans Automat Contr, 59, pp. 341-354, (2012)
  • [8] Wang J M, Tan J W, Zhang J F., Differentially private distributed parameter estimation, J Syst Sci Complex, 36, pp. 187-204, (2023)
  • [9] Zhu M, Lu Y., On confidentiality preserving monitoring of linear dynamic networks against inference attacks, Proceedings of American Control Conference, pp. 359-364, (2015)
  • [10] Katz J, Lindell Y., Introduction to Modern Cryptography, (2020)