all InfoSec news
Multi-party computation enables secure polynomial control based solely on secret-sharing. (arXiv:2103.16335v2 [eess.SY] UPDATED)
Jan. 14, 2022, 2:20 a.m. | Sebastian Schlor, Michael Hertneck, Stefan Wildhagen, Frank Allgöwer
cs.CR updates on arXiv.org arxiv.org
Encrypted control systems allow to evaluate feedback laws on external servers
without revealing private information about state and input data, the control
law, or the plant. While there are a number of encrypted control schemes
available for linear feedback laws, only few results exist for the evaluation
of more general control laws. Recently, an approach to encrypted polynomial
control was presented, relying on two-party secret sharing and an inter-server
communication protocol using homomorphic encryption. As homomorphic encryptions
are much more …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Security Engineer (Vienna) - (m/f/d)
@ Sportradar | Wien, Poland
DevSecOps Engineer - U.S. Citizenship Required
@ Ardent MC | Remote
Head of AML, Regulatory and Compliance
@ Delivery Hero | Athens, Greece
Cybersecurity professional Mid-Senior level
@ Ethics Code | El Salvador - Remote
Senior Information Security Specialist
@ TRISTAR | 1801 Liberty Drive, Bloomington, IN, USA
SOC Analyst Level 2
@ Inbox Business Technologies | Islamabad, Islamabad Capital Territory, Pakistan