{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:39:31Z","timestamp":1771699171652,"version":"3.50.1"},"reference-count":28,"publisher":"Walter de Gruyter GmbH","issue":"9","funder":[{"name":"German Research Foundation (DFG) and the Daimler and Benz Foundation","award":["SCHU 2940\/4-1, SCHU 2940\/5-1, and32-08\/19"],"award-info":[{"award-number":["SCHU 2940\/4-1, SCHU 2940\/5-1, and32-08\/19"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Cooperative control is crucial for the effective operation of dynamical multi-agent systems. Especially for distributed control schemes, it is essential to exchange data between the agents. This becomes a privacy threat if the data are sensitive. Encrypted control has shown the potential to address this risk and ensure confidentiality. However, existing approaches mainly focus on cloud-based control and distributed schemes are restrictive. In this paper, we present a novel privacy-preserving cooperative control scheme based on encrypted distributed optimization. More precisely, we focus on a secure distributed solution of a general consensus problem, which has manifold applications in cooperative control, by means of the alternating direction method of multipliers (ADMM). As a unique feature of our approach, we explicitly take into account the common situation that local decision variables contain copies of quantities associated with neighboring agents and ensure the neighbor\u2019s privacy. We show the effectiveness of our method based on a numerical case study dealing with the formation of mobile robots.<\/jats:p>","DOI":"10.1515\/auto-2023-0082","type":"journal-article","created":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T10:42:19Z","timestamp":1694169739000},"page":"736-747","source":"Crossref","is-referenced-by-count":4,"title":["Towards privacy-preserving cooperative control via encrypted distributed optimization"],"prefix":"10.1515","volume":"71","author":[{"given":"Philipp","family":"Binfet","sequence":"first","affiliation":[{"name":"Department of Mechanical Engineering , TU Dortmund University , Dortmund , Germany"}]},{"given":"Janis","family":"Adamek","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering , TU Dortmund University , Dortmund , Germany"}]},{"given":"Nils","family":"Schl\u00fcter","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering , TU Dortmund University , Dortmund , Germany"}]},{"given":"Moritz","family":"Schulze Darup","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering , TU Dortmund University , Dortmund , Germany"}]}],"member":"374","published-online":{"date-parts":[[2023,9,8]]},"reference":[{"key":"2023120702422582708_j_auto-2023-0082_ref_001","doi-asserted-by":"crossref","unstructured":"C. Marcolla, V. Sucasas, M. Manzano, R. Bassoli, F. H. P. Fitzek, and N. Aaraj, \u201cSurvey on fully homomorphic encryption, theory, and applications,\u201d Proc. IEEE, vol.\u00a0110, no.\u00a010, pp.\u00a01572\u20131609, 2022.","DOI":"10.1109\/JPROC.2022.3205665"},{"key":"2023120702422582708_j_auto-2023-0082_ref_002","doi-asserted-by":"crossref","unstructured":"M. Schulze Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, \u201cEncrypted control for networked systems: an illustrative introduction and current challenges,\u201d IEEE Control Syst. Mag., vol.\u00a041, no.\u00a03, pp.\u00a058\u201378, 2021. https:\/\/doi.org\/10.1109\/mcs.2021.3062956.","DOI":"10.1109\/MCS.2021.3062956"},{"key":"2023120702422582708_j_auto-2023-0082_ref_003","doi-asserted-by":"crossref","unstructured":"F. Farokhi, I. Shames, and B. Nathan, \u201cSecure and private control using semi-homomorphic encryption,\u201d Control Eng. Pract., vol.\u00a067, pp.\u00a013\u201320, 2017. https:\/\/doi.org\/10.1016\/j.conengprac.2017.07.004.","DOI":"10.1016\/j.conengprac.2017.07.004"},{"key":"2023120702422582708_j_auto-2023-0082_ref_004","doi-asserted-by":"crossref","unstructured":"J. Kim, H. Shim, and K. Han, \u201cDynamic controller that operates over homomorphically encrypted data for infinite time horizon,\u201d IEEE Trans. Autom. Control, vol.\u00a068, no.\u00a02, pp.\u00a0660\u2013672, 2023. https:\/\/doi.org\/10.1109\/tac.2022.3142124.","DOI":"10.1109\/TAC.2022.3142124"},{"key":"2023120702422582708_j_auto-2023-0082_ref_005","doi-asserted-by":"crossref","unstructured":"K. Kogiso and T. Fujita, \u201cCyber-security enhancement of networked control systems using homomorphic encryption,\u201d in Proc. of the 54th Conference on Decision and Control, 2015, pp.\u00a06836\u20136843.","DOI":"10.1109\/CDC.2015.7403296"},{"key":"2023120702422582708_j_auto-2023-0082_ref_006","doi-asserted-by":"crossref","unstructured":"A. B. Alexandru, M. Morari, and G. J. Pappas, \u201cCloud-based MPC with encrypted data,\u201d in Proc. of the 57th Conference on Decision and Control, 2018, pp.\u00a05014\u20135019.","DOI":"10.1109\/CDC.2018.8619835"},{"key":"2023120702422582708_j_auto-2023-0082_ref_007","doi-asserted-by":"crossref","unstructured":"M. Schulze Darup, A. Redder, I. Shames, F. Farokhi, and D. E. Quevedo, \u201cTowards encrypted MPC for linear constrained systems,\u201d IEEE Control Syst. Lett., vol.\u00a02, no.\u00a02, pp.\u00a0195\u2013200, 2018. https:\/\/doi.org\/10.1109\/lcsys.2017.2779473.","DOI":"10.1109\/LCSYS.2017.2779473"},{"key":"2023120702422582708_j_auto-2023-0082_ref_008","doi-asserted-by":"crossref","unstructured":"A. Maneesha and K. Shanti Swarup, \u201cA survey on applications of alternating direction method of multipliers in smart power grids,\u201d Renew. Sust. Energy Rev., vol.\u00a0152, p.\u00a0111687, 2021. https:\/\/doi.org\/10.1016\/j.rser.2021.111687.","DOI":"10.1016\/j.rser.2021.111687"},{"key":"2023120702422582708_j_auto-2023-0082_ref_009","doi-asserted-by":"crossref","unstructured":"K.-K. Oh, M.-C. Park, and H.-S. Ahn, \u201cA survey of multi-agent formation control,\u201d Automatica, vol.\u00a053, pp.\u00a0424\u2013440, 2015. https:\/\/doi.org\/10.1016\/j.automatica.2014.10.022.","DOI":"10.1016\/j.automatica.2014.10.022"},{"key":"2023120702422582708_j_auto-2023-0082_ref_010","doi-asserted-by":"crossref","unstructured":"R. Van Parys and G. Pipeleers, \u201cDistributed MPC for multi-vehicle systems moving in formation,\u201d Robot. Auton. Syst., vol.\u00a097, pp.\u00a0144\u2013152, 2017. https:\/\/doi.org\/10.1016\/j.robot.2017.08.009.","DOI":"10.1016\/j.robot.2017.08.009"},{"key":"2023120702422582708_j_auto-2023-0082_ref_011","doi-asserted-by":"crossref","unstructured":"S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, \u201cDistributed optimization and statistical learning via the alternating direction method of multipliers,\u201d Found. Trends Mach. Learn., vol.\u00a03, no.\u00a01, pp.\u00a01\u2013122, 2011. https:\/\/doi.org\/10.1561\/2200000016.","DOI":"10.1561\/2200000016"},{"key":"2023120702422582708_j_auto-2023-0082_ref_012","doi-asserted-by":"crossref","unstructured":"Y. Lindell, \u201cSecure multiparty computation,\u201d Commun. ACM., vol. 64, no. 1, pp. 86\u201396, 2020.","DOI":"10.1145\/3387108"},{"key":"2023120702422582708_j_auto-2023-0082_ref_013","doi-asserted-by":"crossref","unstructured":"M. U. Hassan, M. H. Rehmani, and J. Chen, \u201cDifferential privacy techniques for cyber physical systems: a survey,\u201d IEEE Commun. Surv. Tutor., vol.\u00a022, no.\u00a01, pp.\u00a0746\u2013789, 2019. https:\/\/doi.org\/10.1109\/comst.2019.2944748.","DOI":"10.1109\/COMST.2019.2944748"},{"key":"2023120702422582708_j_auto-2023-0082_ref_014","doi-asserted-by":"crossref","unstructured":"E. Nozari, P. Tallapragada, and J. Cort\u00e9s, \u201cDifferentially private distributed convex optimization via objective perturbation,\u201d in 2016 American control conference (ACC), pages 2061\u20132066, IEEE, 2016.","DOI":"10.1109\/ACC.2016.7525222"},{"key":"2023120702422582708_j_auto-2023-0082_ref_015","doi-asserted-by":"crossref","unstructured":"N. Tian, Q. Guo, H. Sun, and X. Zhou, \u201cFully privacy-preserving distributed optimization in power systems based on secret sharing,\u201d iEnergy, vol.\u00a01, no.\u00a03, pp.\u00a0351\u2013362, 2022. https:\/\/doi.org\/10.23919\/ien.2022.0045.","DOI":"10.23919\/IEN.2022.0045"},{"key":"2023120702422582708_j_auto-2023-0082_ref_016","doi-asserted-by":"crossref","unstructured":"K. Tjell and R. Wisniewski, \u201cPrivacy preservation in distributed optimization via dual decomposition and ADMM,\u201d in 2019 IEEE 58th Conference on Decision and Control (CDC), 2019, pp.\u00a07203\u20137208.","DOI":"10.1109\/CDC40024.2019.9028969"},{"key":"2023120702422582708_j_auto-2023-0082_ref_017","doi-asserted-by":"crossref","unstructured":"C. Zhang, M. Ahmad, and Y. Wang, \u201cADMM based privacy-preserving decentralized optimization,\u201d IEEE Trans. Inf. Forensics Secur., vol.\u00a014, no.\u00a03, pp.\u00a0565\u2013580, 2019. https:\/\/doi.org\/10.1109\/tifs.2018.2855169.","DOI":"10.1109\/TIFS.2018.2855169"},{"key":"2023120702422582708_j_auto-2023-0082_ref_018","doi-asserted-by":"crossref","unstructured":"M. Schulze Darup, A. Redder, and D. E. Quevedo, \u201cEncrypted cooperative control based on structured feedback,\u201d IEEE Control Syst. Lett., vol.\u00a03, no.\u00a01, pp.\u00a037\u201342, 2019. https:\/\/doi.org\/10.1109\/lcsys.2018.2851152.","DOI":"10.1109\/LCSYS.2018.2851152"},{"key":"2023120702422582708_j_auto-2023-0082_ref_019","doi-asserted-by":"crossref","unstructured":"A. B. Alexandru, M. Schulze Darup, and G. J. Pappas, \u201cEncrypted cooperative control revisited,\u201d in Proc. of the 58th IEEE Conference on Decision and Control, 2019, pp.\u00a07196\u20137202.","DOI":"10.1109\/CDC40024.2019.9030124"},{"key":"2023120702422582708_j_auto-2023-0082_ref_020","doi-asserted-by":"crossref","unstructured":"M. Marcantoni, B. Jayawardhana, M. Perez Chaher, and K. Bunte, \u201cSecure formation control via edge computing enabled by fully homomorphic encryption and mixed uniform-logarithmic quantization,\u201d IEEE Control Syst. Lett., vol.\u00a07, pp.\u00a0395\u2013400, 2023. https:\/\/doi.org\/10.1109\/lcsys.2022.3188944.","DOI":"10.1109\/LCSYS.2022.3188944"},{"key":"2023120702422582708_j_auto-2023-0082_ref_021","doi-asserted-by":"crossref","unstructured":"P. Paillier, \u201cPublic-key cryptosystems based on composite degree residuosity classes,\u201d in Advances in Cryptology \u2013 Eurocrypt \u201999, volume 1592 of Lecture Notes in Computer Science, Springer, 1999, pp.\u00a0223\u2013238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"2023120702422582708_j_auto-2023-0082_ref_022","doi-asserted-by":"crossref","unstructured":"O. Regev, \u201cOn lattices, learning with errors, random linear codes, and cryptography,\u201d J. ACM, vol.\u00a056, no.\u00a06, pp.\u00a01\u201340, 2009. https:\/\/doi.org\/10.1145\/1568318.1568324.","DOI":"10.1145\/1568318.1568324"},{"key":"2023120702422582708_j_auto-2023-0082_ref_023","doi-asserted-by":"crossref","unstructured":"A. Kim, Y. Polyakov, and V. Zucca, \u201cRevisiting homomorphic encryption schemes for finite fields,\u201d in Advances in Cryptology: 27th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), Part III 27, Springer, 2021, pp.\u00a0608\u2013639.","DOI":"10.1007\/978-3-030-92078-4_21"},{"key":"2023120702422582708_j_auto-2023-0082_ref_024","doi-asserted-by":"crossref","unstructured":"H. JungCheon, K. Han, A. Kim, M. Kim, and Y. Song, \u201cBootstrapping for approximate homomorphic encryption,\u201d in Advances in Cryptology \u2013 EUROCRYPT 2018, J. B. Nielsen, and R. Vincent, Eds., Cham, Springer International Publishing, 2018, pp.\u00a0360\u2013384.","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"2023120702422582708_j_auto-2023-0082_ref_025","doi-asserted-by":"crossref","unstructured":"N. Alamati and C. Peikert, \u201cThree\u2019s compromised too: circular insecurity for any cycle length from (Ring-) LWE,\u201d in Advances in Cryptology: 36th Annual International Cryptology Conference (CRYPTO), Part II, Springer, 2016, pp.\u00a0659\u2013680.","DOI":"10.1007\/978-3-662-53008-5_23"},{"key":"2023120702422582708_j_auto-2023-0082_ref_026","doi-asserted-by":"crossref","unstructured":"J. H. Cheon, A. Kim, M. Kim, and Y. Song, \u201cHomomorphic encryption for arithmetic of approximate numbers,\u201d in Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3\u20137, 2017, Proceedings, Part I, vol.\u00a023, Springer, 2017, pp.\u00a0409\u2013437.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"2023120702422582708_j_auto-2023-0082_ref_027","doi-asserted-by":"crossref","unstructured":"A. Al Badawi, J. Bates, F. Bergamaschi, et al.., \u201c\"OpenFHE: open-source fully homomorphic encryption library,\u201d In Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC'22), Association for Computing Machinery, 2022, pp. 53\u201363.","DOI":"10.1145\/3560827.3563379"},{"key":"2023120702422582708_j_auto-2023-0082_ref_028","doi-asserted-by":"crossref","unstructured":"M. R. Albrecht, R. Player, and S. Scott, \u201cOn the concrete hardness of learning with errors,\u201d J. Math. Cryptol., vol.\u00a09, no.\u00a03, pp.\u00a0169\u2013203, 2015. https:\/\/doi.org\/10.1515\/jmc-2015-0016.","DOI":"10.1515\/jmc-2015-0016"}],"container-title":["at - Automatisierungstechnik"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2023-0082\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2023-0082\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T02:43:26Z","timestamp":1701917006000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/auto-2023-0082\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":28,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9,8]]},"published-print":{"date-parts":[[2023,9,26]]}},"alternative-id":["10.1515\/auto-2023-0082"],"URL":"https:\/\/doi.org\/10.1515\/auto-2023-0082","relation":{},"ISSN":["0178-2312","2196-677X"],"issn-type":[{"value":"0178-2312","type":"print"},{"value":"2196-677X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}