Research Article
Privacy-Preserving Industrial Control System Anomaly Detection Platform
Protocol 2
Constant-round evaluation protocol.
| Initialization: | | for eachdo | | and agree on the same random seed ; | | end | | Preparing: | | ; | | foreachdo | | generates ; | | generates keys for ; | | sends to , to ; | | end | | for eachdo | | for eachdo | | ; | | ;//feature selection | | Run 3-party shared OT protocol to get ; | | ;//comparison | | end | | ; | | Send to ; | | end | | for each do | | receives from , from ; | | for eachdo | | ; | | ; | | ;//path evaluation | | ; | | end | | ; | | fordo | | Sum up the share of edge costs along -th leaf node’s path; | | ; | | , ; | | ; | | end | | , ; | | Send to | | end | | receives from , from ; | | for eachdo | | ifthen | | ; | | for point function ; | | Send to , to ; | | Return ; | | end | | end | | for eachdo | | receives ; | | ; | | ; | | Return ; | | end |
|