{"id":"https://openalex.org/W4415159050","doi":"https://doi.org/10.23919/ecc65951.2025.11186994","title":"Encrypted Control Systems with Fully Homomorphic Encryption","display_name":"Encrypted Control Systems with Fully Homomorphic Encryption","publication_year":2025,"publication_date":"2025-06-24","ids":{"openalex":"https://openalex.org/W4415159050","doi":"https://doi.org/10.23919/ecc65951.2025.11186994"},"language":"en","primary_location":{"id":"doi:10.23919/ecc65951.2025.11186994","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ecc65951.2025.11186994","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 European Control Conference (ECC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006425653","display_name":"Jos\u00e9 Barbosa","orcid":"https://orcid.org/0000-0003-3151-6686"},"institutions":[{"id":"https://openalex.org/I73114660","display_name":"University of Applied Sciences Kaiserslautern","ror":"https://ror.org/05dkqa017","country_code":"DE","type":"education","lineage":["https://openalex.org/I73114660"]},{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jose Barbosa","raw_affiliation_strings":["University of Kaiserslautern-Landau,Institute of Automatic Control,Kaiserslautern,Germany,67663"],"affiliations":[{"raw_affiliation_string":"University of Kaiserslautern-Landau,Institute of Automatic Control,Kaiserslautern,Germany,67663","institution_ids":["https://openalex.org/I153267046","https://openalex.org/I73114660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000873881","display_name":"Ping Zhang","orcid":"https://orcid.org/0000-0002-9620-8193"},"institutions":[{"id":"https://openalex.org/I73114660","display_name":"University of Applied Sciences Kaiserslautern","ror":"https://ror.org/05dkqa017","country_code":"DE","type":"education","lineage":["https://openalex.org/I73114660"]},{"id":"https://openalex.org/I153267046","display_name":"University of Kaiserslautern","ror":"https://ror.org/04zrf7b53","country_code":"DE","type":"education","lineage":["https://openalex.org/I153267046"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ping Zhang","raw_affiliation_strings":["University of Kaiserslautern-Landau,Institute of Automatic Control,Kaiserslautern,Germany,67663"],"affiliations":[{"raw_affiliation_string":"University of Kaiserslautern-Landau,Institute of Automatic Control,Kaiserslautern,Germany,67663","institution_ids":["https://openalex.org/I153267046","https://openalex.org/I73114660"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5006425653"],"corresponding_institution_ids":["https://openalex.org/I153267046","https://openalex.org/I73114660"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30246856,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"161","last_page":"166"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8622999787330627},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7946000099182129},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5446000099182129},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4404999911785126},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.3822999894618988},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.3483999967575073},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.32989999651908875},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.3287999927997589}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8622999787330627},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7946000099182129},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6578999757766724},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5446000099182129},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4404999911785126},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.3822999894618988},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.3483999967575073},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32989999651908875},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.3287999927997589},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.32589998841285706},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.32409998774528503},{"id":"https://openalex.org/C69254412","wikidata":"https://www.wikidata.org/wiki/Q6554302","display_name":"Link encryption","level":4,"score":0.3131999969482422},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.31130000948905945},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3003000020980835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.296099990606308},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29510000348091125},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.28839999437332153},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28630000352859497},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.26820001006126404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/ecc65951.2025.11186994","is_oa":false,"landing_page_url":"https://doi.org/10.23919/ecc65951.2025.11186994","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 European Control Conference (ECC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W1979120705","https://openalex.org/W2007466965","https://openalex.org/W2032732517","https://openalex.org/W2098290658","https://openalex.org/W2150436340","https://openalex.org/W2156186849","https://openalex.org/W2290211681","https://openalex.org/W2567189941","https://openalex.org/W2768174108","https://openalex.org/W2811182211","https://openalex.org/W2996072473","https://openalex.org/W3121102701","https://openalex.org/W3184400911","https://openalex.org/W4214737008","https://openalex.org/W4285445889","https://openalex.org/W4378697376","https://openalex.org/W4387350601","https://openalex.org/W4389438372","https://openalex.org/W4396753584","https://openalex.org/W4396941530","https://openalex.org/W4403674727"],"related_works":[],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,18],"improve":[3],"cyber":[4],"security,":[5],"encrypted":[6,95],"control":[7,64,96],"systems":[8,97],"have":[9],"attracted":[10],"much":[11],"attention":[12],"recently.":[13],"Homomorphic":[14],"encryption":[15,31],"allows":[16],"calculations":[17],"be":[19,44,69],"performed":[20],"directly":[21],"based":[22],"on":[23,71],"ciphertexts.":[24],"Especially":[25],"by":[26],"means":[27],"of":[28,52],"fully":[29],"homomorphic":[30],"(FHE)":[32],"schemes":[33,56],"both":[34],"signals":[35],"transmitted":[36],"over":[37],"the":[38,63,72,76,81,89,93,99],"network":[39],"and":[40,80,98],"controller":[41],"parameters":[42],"can":[43],"encrypted.":[45],"This":[46],"paper":[47],"gives":[48],"a":[49],"brief":[50],"overview":[51],"some":[53],"prevalent":[54],"FHE":[55,94],"as":[57,59],"well":[58],"their":[60],"applications":[61],"in":[62],"field.":[65],"The":[66],"focus":[67],"will":[68],"put":[70],"Brakerski/Fan-Vaikuntanathan":[73],"(BFV)":[74],"scheme,":[75],"Cheon-Kim-Kim-Song":[77],"(CKKS)":[78],"scheme":[79],"Gentry-Sahai-Waters":[82],"(GSW)":[83],"scheme.":[84],"A":[85],"simulation":[86],"study":[87],"with":[88],"quadruple-tank":[90],"system":[91],"illustrates":[92],"computational":[100],"aspects.":[101]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-14T00:00:00"}
