[1] K. Tjell and R. Wisniewski, “Privacy in distributed computations based on real number secret sharing,” Journal of the Franklin Institute, vol. 359, no. 16, pp. 8752–8771, November 2022.
[2] C. Shamir, A. Shamir, A. Surendar, B. Binyamin, D. O. Bokov, D. Toghraie, and M. Omidi, “How to share a secret,” Journal of Thermal Science, vol. 22, no. 11, pp. 612–613, September 1979.
[3] M. J. Atallah and W. Du, "Secure multi-party computational geometry," Workshop on Algorithms and Data Structures, pp. 165–179, 2001.
[4] R. Cramer, I. Damgård, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing. Cambridge University Press, 2015.
[5] Z. Brakerski, “Fully homomorphic encryption without modulus switching from classical GapSVP,” in Proc. Annu. Cryptol. Conf., 2012, pp. 868–886.
[6] A. C. C. Yao, “How to generate and exchange secrets,” Journal of Thermal Science, vol. 31, no. 5, pp. 1663-1681, September 2022.
[7] M. S. Darup and T. Jager, “Encrypted cloud-based control using secret sharing with one-time pads,” in Proceedings of the 58th IEEE Conference on Decision and Control, 2019, pp. 7215–7221.
[8] C. Mohtadi, D. W. Clarke, and P. S. Tuffs, “Generalized predictive control—Part I. The basic algorithm,” Automatica, vol. 23, no. 2, pp. 137–148, 1987.
[9] D. Bogdanov, S. Laur, and J. Willemson, “Sharemind: A framework for fast privacy-preserving computations,” European Symposium on Research in Computer Security, Berlin, Heidelberg, pp. 192–206, 2008.
[10] T. Nishide and K. Ohta, “Multiparty computation for interval, equality, and comparison without bit-decomposition protocol,” International Workshop on Public Key Cryptography, Berlin, Heidelberg, pp. 343–360, 2007.
[11] C. E. F. Camacho and C. Bordons, “Model Predictive Control,” London, U.K.: Springer, 2007.
[12] K. Kogiso and T. Fujita, "Cyber-security enhancement of networked control systems using homomorphic encryption," Journal of Decision and Control, vol. 54, no. 1, pp. 6836–6843, December 2015.
[13] J. A. Rossiter and M. S. Aftab, “Recent developments in tuning methods for predictive functional control,” Processes, vol. 10, no. 7, p. 1398, 2022.
[14] Z. Zhang, L. Xie, S. Lu, J. A. Rossiter, and H. Su, “A low-cost pole-placement MPC algorithm for controlling complex dynamic systems,” Journal of Process Control, vol. 111, pp. 106–116, March 2022.
[15] M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted control for networked systems: An illustrative introduction and current challenges,” IEEE Control Systems Magazine, vol. 41, no. 3, pp. 58–78, June 2021.
[16] S. J. Qin and T. A. Badgwell, “A survey of industrial model predictive control technology,” Control Engineering Practice, vol. 11, no. 7, pp. 733–764, Jul. 2003.
[17] D. W. Clarke, C. Mohtadi, and P. S. Tuffs, “Generalized predictive control—Part I. The basic algorithm,” Automatica, vol. 23, no. 2, pp. 137–148, March 1987.
[18] J. A. Rossiter, Model-Based Predictive Control: A Practical Approach. Boca Raton, FL, USA: CRC Press, 2003.
[19] R. A. Gupta and M. Y. Chow, “Networked control system: Overview and research trends,” IEEE Transactions on Industrial Electronics, vol. 57, no. 7, pp. 2527–2535, July 2010.
[20] A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry, “Attacks against process control systems: Risk assessment, detection, and response,” in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS), Hong Kong, 2011, pp. 355–366.
[21] A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “Secure control systems: A quantitative risk management approach,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 24–45, February 2015.
[22] C. Murguia and J. Ruths, “On model-based detectors for linear time-invariant stochastic systems under sensor attacks,” IET Control Theory & Applications, vol. 13, no. 8, pp. 1051–1061, May 2019.
[23] C. M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted control for networked systems: An illustrative introduction and current challenges,” IEEE Control Systems Magazine, vol. 41, no. 3, pp. 58–78, 2021.
[24] K. Tjell and R. Wisniewski, “Privacy in distributed computations based on real number secret sharing,” arXiv preprin arXiv:2107.00911, 2021.
[25] Y. A. Kadakia, F. Abdullah, A. Alnajdi, and P. D. Christofides, “Encrypted distributed model predictive control of nonlinear processes,” Control Eng. Pract., vol. 145, p. 105874, 2024.
[26] J. Blevins and J. Ueda, “Encrypted model reference adaptive control with false data injection attack resilience via somewhat homomorphic encryption-based overflow trap,” IEEE Transactions on Industrial Cyber-Physical Systems, vol. 1, pp. 1–14, 2025.
[27] A. Khodaverdian, G. Wu, Z. Wu, and P. D. Christofides, “Encrypted machine learning-based model predictive control architectures for nonlinear systems,” Computers & Chemical Engineering, vol. 196, p. 109166, December 2025.
[28] C. Sui, J. Wang, W. Liu, J. Pan, L. Wang, Y. Zhao, and L. Kong, “Optimizing encrypted control algorithms for real-time secure control,” Journal of the Franklin Institute, vol. 361, no. 5, p. 106677, March 2024.
[29] C. Gentry, “Fully homomorphic encryption using ideal lattices,” Proc. ACM STOC, Bethesda, MD, USA, pp. 169–178, 2009.
[30] M. Naehrig, K. Lauter, and V. Vaikuntanathan, “Can homomorphic encryption be practical?,” Proceedings of the 3rd ACM Cloud Computing Security Workshop, Chicago, IL, USA, pp. 113–124, October 2011.
[31] P. Tabuada, “Event-triggered real-time scheduling of stabilizing control tasks,” IEEE Transactions on Automatic Control, vol. 52, no. 9, pp. 1680–1685, September 2007
[32] M. Ito, A. Saito, and T. Nishizeki, “Secret sharing scheme realizing general access structure,” Journal of Thermal Science, vol. 31, no. 5, pp. 1663–1681, September 2022.
[33] M. Schulze Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted cooperative control based on structured feedback,” IEEE Transactions on Automatic Control, vol. 66, no. 1, pp. 1–13, January 2021.
[34] Y. Mo and B. Sinopoli, “Secure control against replay attacks,” Proc. IEEE Conf. Decision Control, Shanghai, China, pp. 597–602, 2009