Research Article

Privacy-Preserving Industrial Control System Anomaly Detection Platform

Table 1

-secret sharing.

-additive sharing in Description

(2, 2)-additive sharing, where . holds and holds
(3, 3)-additive sharing, where . holds , holds , and holds
(2, 3)-replicated sharing, where . holds , holds , and holds