March 24, 2023, 1:10 a.m. | Kaoru Teranishi, Kiminao Kogiso

cs.CR updates on arXiv.org arxiv.org

A sample identifying complexity and a sample deciphering time have been
introduced in a previous study to capture an estimation error and a computation
time of system identification by adversaries. The quantities play a crucial
role in defining the security of encrypted control systems and designing a
security parameter. This study proposes an optimal security parameter for an
encrypted control system under a network eavesdropper and a malicious
controller server who attempt to identify system parameters using a least
squares …

adversaries capture complexity computation control control system control systems encrypted error identification malicious network parameter play role security server study system systems under

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Manager, Security Compliance (Customer Trust)

@ Box | Tokyo

Cyber Security Engineering Specialist

@ SITEC Consulting | St. Louis, MO, USA 63101

Technical Security Analyst

@ Spire Healthcare | United Kingdom

Embedded Threat Intelligence Team Account Manager

@ Sibylline Ltd | Austin, Texas, United States

Bank Protection Security Officer

@ Allied Universal | Portland, OR, United States