Research Article

Privacy-Preserving Industrial Control System Anomaly Detection Platform

Protocol 2

Constant-round evaluation protocol.
Initialization:
   for eachdo
     and agree on the same random seed ;
   end
Preparing:
   ;
   foreachdo
     generates ;
generates keys for ;
     sends to , to ;
   end
for eachdo
for eachdo
  ;
  ;//feature selection
  Run 3-party shared OT protocol to get ;
  ;//comparison
end
;
 Send to ;
end
for each do
receives from , from ;
for eachdo
  ;
  ;
  ;//path evaluation
;
end
;
fordo
  Sum up the share of edge costs along -th leaf node’s path;
  ;
  , ;
  ;
end
  , ;
  Send to
end
receives from , from ;
for eachdo
ifthen
  ;
   for point function ;
  Send to , to ;
  Return ;
end
end
for eachdo
receives ;
;
;
 Return ;
end