Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Other literature type . 2025
License: CC BY
Data sources: ZENODO
ZENODO
Conference object . 2025
License: CC BY
Data sources: Datacite
ZENODO
Conference object . 2025
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Adversarial Encrypted Data Alternation Detection in \\Homomorphically Encrypted Process Control

Authors: Dzurková, Diana; Kaluz, Martin; Čirka, Ľuboš;

Adversarial Encrypted Data Alternation Detection in \\Homomorphically Encrypted Process Control

Abstract

Encryption within process control is a well-established phenomenon that provides data security during various operational procedures. While more common encryption types primarily ensure data safety during transmission, homomorphic encryption provides protection within the evaluation phase, preserving data privacy. Despite the strong privacy protection, security vulnerabilities are still present in cloud-based environments. A critical yet often overlooked issue is the potential for ciphertext modifications, which can be caused by various factors. In our research, we aim to analyze these security challenges by identifying potential vulnerabilities and propose an algorithm for the CKKS cryptosystem, as it is the most commonly used in process control applications, that can detect unauthorized alterations to encrypted data. Our approach enhances the safety of encrypted process control systems, ensuring that computation results remain trustworthy despite potential threats in the cloud environment. We demonstrate the effectiveness of our method in safeguarding homomorphic encryption applications from unauthorized ciphertext manipulation using punctual analysis and experimental validation.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Funded by