Login / Signup
Revealing Parameters of Control Policies Encrypted using Multiplicative Homomorphic Encryption Schemes.
Rachna Kedigehalli
Rachapudi Maruthi Sriram
Supreeth Varadarajan
Srinivas Vivek
Sachit Rao
Published in:
CCTA (2022)
Keyphrases
</>
encryption scheme
control policies
standard model
security analysis
ciphertext
public key
secret key
data sharing
encryption key
optimal policy
hash functions
motion control
expectation maximization
encryption algorithm
control policy
lossless compression
state space
chosen plaintext attack