{"id":"https://openalex.org/W4399154328","doi":"https://doi.org/10.1109/lcsys.2024.3407636","title":"A Verifiable Computing Scheme for Encrypted Control Systems","display_name":"A Verifiable Computing Scheme for Encrypted Control Systems","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4399154328","doi":"https://doi.org/10.1109/lcsys.2024.3407636"},"language":"en","primary_location":{"id":"doi:10.1109/lcsys.2024.3407636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcsys.2024.3407636","pdf_url":null,"source":{"id":"https://openalex.org/S4306422535","display_name":"IEEE Control Systems Letters","issn_l":"2475-1456","issn":["2475-1456"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Control Systems Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098938978","display_name":"Francesca Stabile","orcid":null},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesca Stabile","raw_affiliation_strings":["DIMEG, Universit&#x00E0; della Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"DIMEG, Universit&#x00E0; della Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084252716","display_name":"Walter L\u00facia","orcid":"https://orcid.org/0000-0003-3776-8331"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Walter Lucia","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085765243","display_name":"Amr Youssef","orcid":"https://orcid.org/0000-0002-4284-8646"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amr Youssef","raw_affiliation_strings":["Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, Canada"],"affiliations":[{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Concordia Institute for Information Systems Engineering (CIISE), Concordia University, Montreal, Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042242478","display_name":"Giuseppe Franz\u00e8","orcid":"https://orcid.org/0000-0002-6712-9066"},"institutions":[{"id":"https://openalex.org/I45204951","display_name":"University of Calabria","ror":"https://ror.org/02rc97e94","country_code":"IT","type":"education","lineage":["https://openalex.org/I45204951"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe Franz\u00e8","raw_affiliation_strings":["DIMEG, Universit&#x00E0; della Calabria, Rende, Italy"],"affiliations":[{"raw_affiliation_string":"DIMEG, Universit&#x00E0; della Calabria, Rende, Italy","institution_ids":["https://openalex.org/I45204951"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5098938978"],"corresponding_institution_ids":["https://openalex.org/I45204951"],"apc_list":null,"apc_paid":null,"fwci":0.7274,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74078725,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"8","issue":null,"first_page":"1096","last_page":"1101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8041335940361023},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7837443351745605},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7678611278533936},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7476427555084229},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6032799482345581},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6023101210594177},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5285051465034485},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.514328122138977},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.41431093215942383},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4110926389694214},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.41079992055892944},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2635881304740906},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1568441390991211},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11878839135169983},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1163763701915741},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07682853937149048}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8041335940361023},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7837443351745605},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7678611278533936},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7476427555084229},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6032799482345581},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6023101210594177},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5285051465034485},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.514328122138977},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.41431093215942383},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4110926389694214},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41079992055892944},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2635881304740906},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1568441390991211},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11878839135169983},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1163763701915741},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07682853937149048},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcsys.2024.3407636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcsys.2024.3407636","pdf_url":null,"source":{"id":"https://openalex.org/S4306422535","display_name":"IEEE Control Systems Letters","issn_l":"2475-1456","issn":["2475-1456"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Control Systems Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G873206710","display_name":null,"funder_award_id":"IT34199","funder_id":"https://openalex.org/F4320322675","funder_display_name":"Mitacs"}],"funders":[{"id":"https://openalex.org/F4320322675","display_name":"Mitacs","ror":"https://ror.org/00cjrc276"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1563556756","https://openalex.org/W2101687784","https://openalex.org/W2132172731","https://openalex.org/W2139386481","https://openalex.org/W2158469273","https://openalex.org/W2252150191","https://openalex.org/W2296724465","https://openalex.org/W2567189941","https://openalex.org/W2803355698","https://openalex.org/W2883748642","https://openalex.org/W3023051856","https://openalex.org/W3120332139","https://openalex.org/W3165039296","https://openalex.org/W3198318201","https://openalex.org/W3201743586","https://openalex.org/W4245271156","https://openalex.org/W4285149630","https://openalex.org/W4312778370","https://openalex.org/W4388784481","https://openalex.org/W4391020477","https://openalex.org/W6680671244"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W1667647204","https://openalex.org/W2365629437","https://openalex.org/W2404647514","https://openalex.org/W4247536566","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928"],"abstract_inverted_index":{"The":[0,119],"proliferation":[1],"of":[2,57,85,150],"cloud":[3,33],"computing":[4,111],"technologies":[5],"has":[6],"paved":[7],"the":[8,27,36,47,55,58,63,88,115,123,128,132,139,145,151],"way":[9],"for":[10],"deploying":[11],"networked":[12,135],"encrypted":[13,133],"control":[14,28,59,98,140],"systems,":[15],"offering":[16],"high":[17],"performance,":[18],"remote":[19],"accessibility":[20],"and":[21,79,90,147],"privacy.":[22],"However,":[23],"in":[24,75,96],"scenarios":[25],"where":[26],"algorithms":[29],"run":[30],"on":[31,46],"third-party":[32],"service":[34],"providers,":[35],"control\u2019s":[37],"logic":[38],"might":[39],"be":[40],"changed":[41],"by":[42,114,131],"a":[43,106,157],"malicious":[44],"agent":[45],"cloud.":[48,64],"Consequently,":[49],"it":[50],"is":[51],"imperative":[52],"to":[53,126],"verify":[54],"correctness":[56],"signals":[60],"received":[61],"from":[62],"Traditional":[65],"verification":[66],"methods,":[67],"like":[68],"zero-knowledge":[69],"proof":[70,77],"techniques,":[71],"are":[72,94],"computationally":[73,108],"demanding":[74],"both":[76],"generation":[78],"verification,":[80],"may":[81],"require":[82],"several":[83],"rounds":[84],"interactions":[86],"between":[87],"prover":[89],"verifier":[91],"and,":[92],"consequently,":[93],"inapplicable":[95],"real-time":[97,148],"system":[99],"applications.":[100],"In":[101],"this":[102],"paper,":[103],"we":[104],"present":[105],"novel":[107],"inexpensive":[109],"verifiable":[110,153],"solution":[112],"inspired":[113],"probabilistic":[116],"cut-and-choose":[117],"approach.":[118],"proposed":[120,152],"scheme":[121,155],"allows":[122],"plant\u2019s":[124],"actuator":[125],"validate":[127],"computations":[129],"accomplished":[130],"cloud-based":[134],"controller":[136],"without":[137],"compromising":[138],"scheme\u2019s":[141],"performance.":[142],"We":[143],"showcase":[144],"effectiveness":[146],"applicability":[149],"computation":[154],"using":[156],"remotely":[158],"controlled":[159],"Khepera-IV":[160],"differential-drive":[161],"robot.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
