Privacy-Preserving Planning and Coordination Among Autonomous Systems Equipped with Resource-Constrained Devices (A31c)
One of the major challenges in any distributed computing system is the availability of proper computing devices, i.e., powerful enough to accomplish the assigned tasks. This issue might be resolved if the system is not a target of physical or cyber attacks and if it is supposed to be static meaning that the locations of components are predefined and fixed. However, if the distributed setting is highly dynamic, i.e., the topology of the components is constantly changed, it becomes extremely difficult to deploy heavy computing devices. This will be even more challenging if computations are expected to be performed in real-time and if the privacy of the input data are critical. This talk therefore focuses on design and fast implementation of privacy-preserving protocols on resource-constrained devices that are utilized in autonomous systems such as drones. We will first review some advanced cryptographic tools as candidate solutions to the aforementioned problem. We will then illustrate how these techniques can be utilized in real-world applications. Finally, we will explain the challenges that we faced.