{"id":"https://openalex.org/W4224045955","doi":"https://doi.org/10.1109/lcsys.2022.3188944","title":"Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization","display_name":"Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization","publication_year":2022,"publication_date":"2022-07-06","ids":{"openalex":"https://openalex.org/W4224045955","doi":"https://doi.org/10.1109/lcsys.2022.3188944"},"language":"en","primary_location":{"id":"doi:10.1109/lcsys.2022.3188944","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcsys.2022.3188944","pdf_url":"https://ieeexplore.ieee.org/ielx7/7782633/9828546/09816051.pdf","source":{"id":"https://openalex.org/S4306422535","display_name":"IEEE Control Systems Letters","issn_l":"2475-1456","issn":["2475-1456"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Control Systems Letters","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ieeexplore.ieee.org/ielx7/7782633/9828546/09816051.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054929872","display_name":"Matteo Marcantoni","orcid":"https://orcid.org/0000-0002-3821-5213"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Matteo Marcantoni","raw_affiliation_strings":["Bernoulli Institute, Faculty of Science and Engineering, University of Groningen, Groningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Bernoulli Institute, Faculty of Science and Engineering, University of Groningen, Groningen, The Netherlands","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023001118","display_name":"Bayu Jayawardhana","orcid":"https://orcid.org/0000-0003-0987-0347"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Bayu Jayawardhana","raw_affiliation_strings":["Engineering and Technology Institute Groningen, Faculty of Science and Engineering, University of Groningen, Groningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Engineering and Technology Institute Groningen, Faculty of Science and Engineering, University of Groningen, Groningen, The Netherlands","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046174312","display_name":"Mariano Perez Chaher","orcid":"https://orcid.org/0000-0003-4048-1905"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Mariano Perez Chaher","raw_affiliation_strings":["Engineering and Technology Institute Groningen, Faculty of Science and Engineering, University of Groningen, Groningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Engineering and Technology Institute Groningen, Faculty of Science and Engineering, University of Groningen, Groningen, The Netherlands","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030298766","display_name":"Kerstin Bunte","orcid":"https://orcid.org/0000-0002-2930-6172"},"institutions":[{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Kerstin Bunte","raw_affiliation_strings":["Bernoulli Institute, Faculty of Science and Engineering, University of Groningen, Groningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Bernoulli Institute, Faculty of Science and Engineering, University of Groningen, Groningen, The Netherlands","institution_ids":["https://openalex.org/I169381384"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054929872"],"corresponding_institution_ids":["https://openalex.org/I169381384"],"apc_list":null,"apc_paid":null,"fwci":2.8388,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.90684054,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"395","last_page":"400"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10249","display_name":"Distributed Control Multi-Agent Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6697777509689331},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6392037272453308},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5518180727958679},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.46741461753845215},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.46564018726348877},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.4550510346889496},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4516836106777191},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4362800419330597},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.42161834239959717},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.40845349431037903},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40726664662361145},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23698100447654724},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20506352186203003}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6697777509689331},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6392037272453308},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5518180727958679},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.46741461753845215},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.46564018726348877},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.4550510346889496},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4516836106777191},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4362800419330597},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.42161834239959717},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.40845349431037903},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40726664662361145},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23698100447654724},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20506352186203003},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/lcsys.2022.3188944","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcsys.2022.3188944","pdf_url":"https://ieeexplore.ieee.org/ielx7/7782633/9828546/09816051.pdf","source":{"id":"https://openalex.org/S4306422535","display_name":"IEEE Control Systems Letters","issn_l":"2475-1456","issn":["2475-1456"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Control Systems Letters","raw_type":"journal-article"},{"id":"pmh:oai:pure.rug.nl:openaire/9ca4bc72-964b-4aac-ab7e-cdedb3158d2f","is_oa":true,"landing_page_url":"https://research.rug.nl/en/publications/9ca4bc72-964b-4aac-ab7e-cdedb3158d2f","pdf_url":null,"source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Marcantoni, M, Jayawardhana, B, Chaher, M P & Bunte, K 2023, 'Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization', IEEE Control Systems Letters, vol. 7, pp. 395-400. https://doi.org/10.1109/LCSYS.2022.3188944","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:arXiv.org:2204.06349","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2204.06349","pdf_url":"https://arxiv.org/pdf/2204.06349","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:pure.rug.nl:publications/9ca4bc72-964b-4aac-ab7e-cdedb3158d2f","is_oa":true,"landing_page_url":"https://hdl.handle.net/11370/9ca4bc72-964b-4aac-ab7e-cdedb3158d2f","pdf_url":null,"source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Marcantoni, M, Jayawardhana, B, Chaher, M P & Bunte, K 2023, 'Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization', IEEE Control Systems Letters, vol. 7, pp. 395-400. https://doi.org/10.1109/LCSYS.2022.3188944","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1109/lcsys.2022.3188944","is_oa":true,"landing_page_url":"https://doi.org/10.1109/lcsys.2022.3188944","pdf_url":"https://ieeexplore.ieee.org/ielx7/7782633/9828546/09816051.pdf","source":{"id":"https://openalex.org/S4306422535","display_name":"IEEE Control Systems Letters","issn_l":"2475-1456","issn":["2475-1456"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Control Systems Letters","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4224045955.pdf","grobid_xml":"https://content.openalex.org/works/W4224045955.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1963660160","https://openalex.org/W1981826826","https://openalex.org/W1985825461","https://openalex.org/W1994938045","https://openalex.org/W2130532917","https://openalex.org/W2163910870","https://openalex.org/W2290211681","https://openalex.org/W2343422466","https://openalex.org/W2501131443","https://openalex.org/W2558859020","https://openalex.org/W2567189941","https://openalex.org/W2606537796","https://openalex.org/W2794596638","https://openalex.org/W2803355698","https://openalex.org/W2912044269","https://openalex.org/W2938401652","https://openalex.org/W2996072473","https://openalex.org/W3013871351","https://openalex.org/W3102096448","https://openalex.org/W3102639082","https://openalex.org/W3104716479","https://openalex.org/W4210638924","https://openalex.org/W4236301494","https://openalex.org/W4353103786"],"related_works":["https://openalex.org/W3028898974","https://openalex.org/W2969350772","https://openalex.org/W2384844478","https://openalex.org/W1755636270","https://openalex.org/W3192883662","https://openalex.org/W4386907889","https://openalex.org/W2098392677","https://openalex.org/W2362689357","https://openalex.org/W2912162584","https://openalex.org/W4388894064"],"abstract_inverted_index":{"Recent":[0],"developments":[1],"in":[2,69],"communication":[3],"technologies,":[4],"such":[5,13],"as":[6,14],"5G,":[7],"together":[8],"with":[9,72,87,91,111],"innovative":[10],"computing":[11,44],"paradigms,":[12],"edge":[15],"computing,":[16],"provide":[17],"further":[18],"possibilities":[19],"for":[20,106],"the":[21,53,70,114,154,158],"implementation":[22],"of":[23,52,126,157],"real-time":[24,116],"networked":[25],"control":[26,56,65,109,161],"systems.":[27],"However,":[28],"privacy":[29],"and":[30,41,60,74,136],"cyber-security":[31],"concerns":[32],"arise":[33],"when":[34],"sharing":[35],"private":[36],"data":[37],"between":[38],"sensors,":[39],"agents":[40],"a":[42,49,92,122,130],"third-party":[43],"facility.":[45],"In":[46],"this":[47],"letter,":[48],"secure":[50,108,160],"version":[51],"distributed":[54],"formation":[55,64],"is":[57,67,101,150],"presented,":[58,151],"analyzed":[59],"simulated,":[61],"where":[62,113],"gradient-based":[63],"law":[66],"implemented":[68],"edge,":[71],"sensor":[73],"actuator":[75],"information":[76,117],"being":[77],"secured":[78],"by":[79],"fully":[80],"homomorphic":[81],"encryption":[82],"method":[83],"based":[84],"on":[85],"learning":[86],"error":[88],"(FHE-LWE)":[89],"combined":[90],"proposed":[93],"mixed":[94],"uniform-logarithmic":[95],"quantizer":[96,100],"(MULQ).":[97],"The":[98],"novel":[99],"shown":[102],"to":[103,143],"be":[104,119,139],"suitable":[105],"realizing":[107],"systems":[110],"FHE-LWE":[112],"critical":[115],"can":[118,138],"quantized":[120],"into":[121],"prescribed":[123],"bounded":[124],"space":[125],"plaintext":[127],"while":[128],"satisfying":[129],"sector":[131],"bound":[132],"condition":[133],"whose":[134],"lower":[135],"upper-bound":[137],"made":[140],"sufficiently":[141],"close":[142],"an":[144],"identity.":[145],"An":[146],"absolute":[147],"stability":[148,156],"analysis":[149],"that":[152],"shows":[153],"asymptotic":[155],"closed-loop":[159],"system.":[162]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2025-10-10T00:00:00"}
