Secure Two-Party Matrix Multiplication from Lattices and Its Application to Encrypted Control

📅 2026-03-24
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the challenge of efficiently performing secure two-party fixed-point matrix multiplication while preserving privacy, with applications in encrypted control systems. The authors propose the first two-party protocol that integrates lattice-based cryptography with approximate matrix multiplication, featuring single-round communication, on-demand precision adjustment, and formal security guarantees. By offloading computation strategically, the approach reduces the client’s online computational complexity below that of the original unencrypted controller, while simultaneously ensuring the confidentiality of the controller’s inputs, parameters, and outputs. Numerical experiments demonstrate that the method maintains effective control accuracy despite quantization and approximation errors, validating its practicality in real-world encrypted control scenarios.

Technology Category

Application Category

📝 Abstract
In this study, we propose a two-party computation protocol for approximate matrix multiplication of fixed-point numbers. The proposed protocol is provably secure under standard lattice-based cryptographic assumptions and enables matrix multiplication at a desired approximation level within a single round of communication. We demonstrate the feasibility of the protocol by applying it to the secure implementation of a linear control law. Our evaluation reveals that the client achieves lower online computational complexity compared to the original controller computation, while ensuring the privacy of controller inputs, outputs, and parameters. Furthermore, a numerical example confirms that the proposed method maintains sufficient precision of control inputs even in the presence of approximation and quantization errors.
Problem

Research questions and friction points this paper is trying to address.

Secure Two-Party Computation
Matrix Multiplication
Lattice-based Cryptography
Encrypted Control
Privacy-Preserving Computation
Innovation

Methods, ideas, or system contributions that make the work stand out.

secure two-party computation
lattice-based cryptography
approximate matrix multiplication
encrypted control
fixed-point arithmetic
🔎 Similar Papers
No similar papers found.