Recognition: 2 theorem links
· Lean TheoremOpacity Enforcing Supervisory Control with a Priori Unknown Supervisors
Pith reviewed 2026-05-13 17:06 UTC · model grok-4.3
The pith
Opacity-enforcing supervisors can be synthesized without restrictions on observable or controllable events by reducing the problem to a safety game via an information-state structure.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Opacity-enforcing supervisors can be synthesized for discrete-event systems in the a priori unknown supervisor setting by constructing an information-state structure that embeds the supervisor's estimate of the intruder's belief, thereby reducing the synthesis problem to a safety game, with sound and complete algorithms that require no restrictions on the observable or controllable event sets.
What carries the argument
An information-state structure that embeds the supervisor's estimate of the intruder's belief, which carries the argument by enabling the reduction of the opacity synthesis problem to a safety game.
Load-bearing premise
The intruder's partial inference of supervisor behavior from online control decisions under observation-triggered and decision-triggered mechanisms can be accurately captured in a finite information-state structure that enables exact reduction to a safety game.
What would settle it
Construct a small discrete-event system example with secret states, apply the synthesis algorithm, then verify whether any run allowed by the resulting supervisor lets the intruder unambiguously determine a secret state under the defined observation and decision mechanisms.
Figures
read the original abstract
We investigate the enforcement of opacity in discrete-event systems via supervisory control. A system is said to be opaque if a passive intruder can never unambiguously infer whether the system is in a secret state through its observations. In this context, the intruder's knowledge about the supervisor plays a critical role in both problem formulation and solvability. Existing studies typically assume that the policy of the supervisor is either fully unknown to the intruder or fully known a priori, the latter leading to severe technical challenges and unresolved problems under incomparable observations. This paper investigates opacity supervisory control under a new intermediate information setting, which we refer to as the a priori unknown supervisor setting. In this setting, the supervisor's internal realization is not publicly available, but the intruder can partially infer its behavior by eavesdropping on the control decisions issued online during system execution. We formalize the intruder's information-flow under both observation-triggered and decision-triggered decision-issuance mechanisms and define the corresponding notions of opacity. We provide sound and complete algorithms for synthesizing opacity-enforcing supervisors without imposing any restrictions on the observable or controllable event sets. By constructing an information-state structure that embeds the supervisor's estimate of the intruder's belief, the synthesis problem is reduced to a safety game. Finally, we show that, under strictly finer intruder observations, the proposed setting coincides with the standard a priori known supervisor model.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces an intermediate 'a priori unknown supervisor' setting for opacity enforcement in discrete-event systems, where the supervisor's internal realization is unavailable to the intruder but its online control decisions can be observed and used for partial inference. It formalizes corresponding opacity notions under observation-triggered and decision-triggered decision-issuance mechanisms, presents sound and complete synthesis algorithms that impose no restrictions on observable or controllable event sets, reduces the problem to a safety game via an information-state structure embedding the supervisor's estimate of the intruder's belief, and proves that the new setting coincides with the standard a priori known supervisor model under strictly finer intruder observations.
Significance. If the soundness and completeness claims hold, the work provides a practical middle ground between the fully known and fully unknown supervisor models that dominate the literature, enabling opacity enforcement in settings where supervisor policies are not disclosed but decisions are eavesdroppable. The restriction-free algorithms and safety-game reduction are notable strengths, as is the explicit coincidence theorem linking the new model to existing results.
major comments (2)
- [Section 4] Definition of the information-state structure (Section 4): the state is defined to embed only the supervisor's estimate of the intruder's belief set; it is not shown to maintain an explicit component for the set of possible supervisor realizations consistent with observed decisions. Under the a priori unknown setting this omission risks incomplete tracking of intruder belief updates when decisions are issued under either mechanism, which would render the safety-game reduction either unsound (missed opacity violations) or incomplete (valid supervisors rejected).
- [Theorem 5] Theorem 5 (coincidence result): the equivalence is established only under strictly finer observations; the proof does not address whether the intermediate information-state construction remains faithful for arbitrary (non-finer) observable sets, leaving the central soundness claim for the general case without direct verification.
minor comments (2)
- [Section 3] Notation for the two decision-issuance mechanisms is introduced without a compact tabular comparison of their information-flow differences; a small table would improve readability.
- [Section 5] The complexity analysis of the safety-game algorithm is stated only in terms of state-space size; explicit dependence on the number of possible supervisors (even if finite) should be added for clarity.
Simulated Author's Rebuttal
We thank the referee for the thorough review and insightful comments on our work. We address each major comment below with clarifications on our constructions and proofs.
read point-by-point responses
-
Referee: [Section 4] Definition of the information-state structure (Section 4): the state is defined to embed only the supervisor's estimate of the intruder's belief set; it is not shown to maintain an explicit component for the set of possible supervisor realizations consistent with observed decisions. Under the a priori unknown setting this omission risks incomplete tracking of intruder belief updates when decisions are issued under either mechanism, which would render the safety-game reduction either unsound (missed opacity violations) or incomplete (valid supervisors rejected).
Authors: The information-state structure is constructed precisely to track the supervisor's estimate of the intruder's belief, with transitions defined to incorporate all possible updates arising from observed decisions under both observation-triggered and decision-triggered mechanisms. Because the supervisor is synthesizing its own (fixed but undisclosed) policy, it computes this estimate directly from the observed sequence without needing an auxiliary component enumerating possible realizations; any realization consistent with the observed decisions is already reflected in the belief-set evolution. The soundness and completeness proofs (Theorems 3 and 4) verify that the safety-game winning strategies correspond exactly to opacity-enforcing supervisors in the a priori unknown setting. We will add a short clarifying paragraph in Section 4 of the revision to make this implicit accounting explicit. revision: partial
-
Referee: [Theorem 5] Theorem 5 (coincidence result): the equivalence is established only under strictly finer observations; the proof does not address whether the intermediate information-state construction remains faithful for arbitrary (non-finer) observable sets, leaving the central soundness claim for the general case without direct verification.
Authors: Theorem 5 is an auxiliary result that shows coincidence with the a priori known model precisely when intruder observations are strictly finer; this is the only regime in which the two models are expected to coincide. The central soundness and completeness claims for the a priori unknown setting (Theorems 3 and 4) are established independently by showing that the information-state structure and safety-game reduction correctly capture the intruder's belief updates and yield valid supervisors for arbitrary observable and controllable sets. The proofs rely only on the definitions of the new opacity notions and the transition rules of the information-state structure, without invoking the known-supervisor model or any fineness assumption. revision: no
Circularity Check
No significant circularity: new setting and reduction defined from first principles
full rationale
The paper defines the a priori unknown supervisor setting from first principles by formalizing intruder's partial inference under observation-triggered and decision-triggered mechanisms. The information-state structure embedding the supervisor's estimate of the intruder's belief is constructed explicitly to reduce synthesis to a safety game, presented as an algorithmic step rather than a definitional identity. The coincidence result with the known-supervisor model is stated as a separate theorem under strictly finer observations, not by construction or self-citation. No self-definitional steps, fitted inputs renamed as predictions, or load-bearing self-citations appear in the derivation chain; the central claims remain independent of the inputs.
Axiom & Free-Parameter Ledger
axioms (2)
- standard math Discrete-event systems are modeled as finite automata with controllable and observable event sets
- domain assumption Opacity is defined via intruder belief states over secret versus non-secret states
invented entities (2)
-
a priori unknown supervisor setting
no independent evidence
-
decision-triggered decision-issuance mechanism
no independent evidence
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/ArithmeticFromLogic.leanLogicNat recovery and embed_strictMono unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
By constructing an information-state structure that embeds the supervisor's estimate of the intruder's belief, the synthesis problem is reduced to a safety game.
-
IndisputableMonolith/Foundation/AbsoluteFloorClosure.leanabsolute_floor_iff_bare_distinguishability unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We provide sound and complete algorithms for synthesizing opacity-enforcing supervisors without imposing any restrictions on the observable or controllable event sets.
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Liwei An and Guang-Hong Yang. Enhancement of opacity for distributed state estimation in cyber–physical systems.Automatica, 136:110087, 2022
work page 2022
-
[2]
Francesco Basile, Gianmaria De Tommasi, Sara Dubbioso, and Federico Fiorenza. A sequence-based approach for the verification of current- state opacity in bounded discrete event systems.IEEE Transactions on Automatic Control, 2026
work page 2026
-
[3]
Now Foundations and Trends, 2021
Jo ˜ao Carlos Basilio, Christoforos N Hadjicostis, and Rong Su.Analysis and control for resilience of discrete event systems: Fault diagnosis, opacity and cyber security. Now Foundations and Trends, 2021
work page 2021
-
[4]
Supervisory control for opacity of discrete event systems
Majed Ben-Kalefa and Feng Lin. Supervisory control for opacity of discrete event systems. In2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 1113–1119. IEEE, 2011
work page 2011
-
[5]
The complexity of diagnosability and opacity verification for Petri nets
B ´eatrice B ´erard, Stefan Haar, Sylvain Schmitz, and Stefan Schwoon. The complexity of diagnosability and opacity verification for Petri nets. Fundamenta Informaticae, 161(4):317–349, 2018
work page 2018
-
[6]
Franck Cassez, J ´er´emy Dubreil, and Herv ´e Marchand. Synthesis of opaque systems with static and dynamic masks.Formal Methods in System Design, 40(1):88–115, 2012
work page 2012
-
[7]
Jun Chen, Mariam Ibrahim, and Ratnesh Kumar. Quantification of secrecy in partially observed stochastic discrete event systems.IEEE Transactions on Automation Science and Engineering, 14(1):185–195, 2016
work page 2016
-
[8]
Philippe Darondeau, Herv ´e Marchand, and Laurie Ricker. Enforcing opacity of regular predicates on modal transition systems.Discrete Event Dynamic Systems, 25(1):251–270, 2015
work page 2015
-
[9]
Yifan Dong, Dimitri Lefebvre, and Zhiwu Li.k-step opacity verification and enforcement of time labeled Petri net systems.IEEE Transactions on Automatic Control, 2025
work page 2025
-
[10]
Opacity enforcing control synthesis
J ´er´emy Dubreil, Philippe Darondeau, and Herv ´e Marchand. Opacity enforcing control synthesis. In9th International Workshop on Discrete Event Systems, pages 28–35. IEEE, 2008
work page 2008
-
[11]
Supervi- sory control for opacity.IEEE Transactions on Automatic Control, 55(5):1089–1100, 2010
J ´er´emy Dubreil, Philippe Darondeau, and Herv ´e Marchand. Supervi- sory control for opacity.IEEE Transactions on Automatic Control, 55(5):1089–1100, 2010
work page 2010
-
[12]
Ylies Falcone and Herv ´e Marchand. Enforcement and validation (at runtime) of various notions of opacity.Discrete Event Dynamic Systems, 25(4):531–570, 2015
work page 2015
-
[13]
State estimation of timed automata under partial observation
Chao Gao, Dimitri Lefebvre, Carla Seatzu, Zhiwu Li, and Alessandro Giua. State estimation of timed automata under partial observation. IEEE Transactions on Automatic Control, 2024
work page 2024
-
[14]
Xiaoguang Han, Kuize Zhang, Jiahui Zhang, Zhiwu Li, and Zengqiang Chen. Strong current-state and initial-state opacity of discrete-event systems.Automatica, 148:110756, 2023
work page 2023
-
[15]
Christoforos Keroglou and Christoforos N Hadjicostis. Probabilistic system opacity in discrete event systems.Discrete Event Dynamic Systems, 28(2):289–314, 2018
work page 2018
-
[16]
St ´ephane Lafortune, Feng Lin, and Christoforos N Hadjicostis. On the history of diagnosability and opacity in discrete event systems.Annual Reviews in Control, 45:257–266, 2018
work page 2018
-
[17]
Dimitri Lefebvre and Christoforos N Hadjicostis. Exposure and reve- lation times as a measure of opacity in timed stochastic discrete event systems.IEEE Transactions on Automatic Control, 66(12):5802–5815, 2020
work page 2020
-
[18]
Dimitri Lefebvre and Christoforos N Hadjicostis. Privacy and safety analysis of timed stochastic discrete event systems using markovian trajectory-observers.Discrete Event Dynamic Systems, 30(3):413–440, 2020
work page 2020
-
[19]
Xiaoyan Li, Christoforos N Hadjicostis, and Zhiwu Li. Opacity enforcement in discrete event systems using extended insertion functions under inserted language constraints.IEEE Transactions on Automatic Control, 68(11):6797–6803, 2023
work page 2023
-
[20]
P ´ublio M Lima, Lilian K Carvalho, and Marcos V Moreira. Ensuring confidentiality of cyber-physical systems using event-based cryptogra- phy.Information Sciences, 621:119–135, 2023. 14
work page 2023
-
[21]
Opacity of discrete event systems and its applications
Feng Lin. Opacity of discrete event systems and its applications. Automatica, 47(3):496–503, 2011
work page 2011
-
[22]
Rongjian Liu, Jianquan Lu, and Christoforos N Hadjicostis. Opacity enforcement via attribute-based edit functions in the presence of an intended receiver.IEEE Transactions on Automatic Control, 68(9):5646– 5652, 2022
work page 2022
-
[23]
Siyuan Liu, Ashutosh Trivedi, Xiang Yin, and Majid Zamani. Secure- by-construction synthesis of cyber-physical systems.Annual Reviews in Control, 53:30–50, 2022
work page 2022
-
[24]
On approximate opacity of stochastic control systems.IEEE Transactions on Automatic Control, 2024
Siyuan Liu, Xiang Yin, Dimos V Dimarogonas, and Majid Zamani. On approximate opacity of stochastic control systems.IEEE Transactions on Automatic Control, 2024
work page 2024
-
[25]
Siyuan Liu and Majid Zamani. Verification of approximate opacity via barrier certificates.IEEE Control Systems Letters, 5(4):1369–1374, 2020
work page 2020
-
[26]
Siyuan Liu and Majid Zamani. Compositional synthesis of opacity- preserving finite abstractions for interconnected systems.Automatica, 131:109745, 2021
work page 2021
-
[27]
Always guarding you: Strong initial-and-final-state opacity of discrete-event systems
Shaowen Miao, Aiwen Lai, and Jan Komenda. Always guarding you: Strong initial-and-final-state opacity of discrete-event systems. Automatica, 173:112085, 2025
work page 2025
-
[28]
Richard Hugh Moulton, Behnam Behinaein Hamgini, Zahra Abedi Khouzani, R ˆomulo Meira-G ´oes, Fei Wang, and Karen Rudie. Using subobservers to synthesize opacity-enforcing supervisors.Discrete Event Dynamic Systems, 32(4):611–640, 2022
work page 2022
-
[29]
Chunyan Mu and David Clark. Verifying opacity properties in security systems.IEEE Transactions on Dependable and Secure Computing, 20(2):1450–1460, 2022
work page 2022
-
[30]
Bhaskar Ramasubramanian, Rance Cleaveland, and Steven I Marcus. Notions of centralized and decentralized opacity in linear systems.IEEE Transactions on Automatic Control, 65(4):1442–1455, 2020
work page 2020
-
[31]
Lucas NR Reis, Lilian K Carvalho, and Marcos V Moreira. Enforcing current-state opacity and utility of cyber-physical systems using multi- path event routing.IEEE Transactions on Automatic Control, 2026
work page 2026
-
[32]
K Ritsuka, St ´ephane Lafortune, and Feng Lin. Joint opacity and opacity against state-estimate-intersection-based intrusion of discrete- event systems.Automatica, 176:112136, 2025
work page 2025
-
[33]
Anooshiravan Saboori and Christoforos N Hadjicostis. Opacity- enforcing supervisory strategies via state estimator constructions.IEEE Transactions on Automatic Control, 57(5):1155–1165, 2011
work page 2011
-
[34]
Anooshiravan Saboori and Christoforos N Hadjicostis. Verification of infinite-step opacity and complexity considerations.IEEE Transactions on Automatic Control, 57(5):1265–1269, 2011
work page 2011
-
[35]
Verification of initial-state opacity in security applications of discrete event systems
Anooshiravan Saboori and Christoforos N Hadjicostis. Verification of initial-state opacity in security applications of discrete event systems. Information Sciences, 246:115–132, 2013
work page 2013
-
[36]
Existence conditions for confidentiality in discrete-event systems
Bryony H Schonewille and Karen Rudie. Existence conditions for confidentiality in discrete-event systems. In2024 American Control Conference (ACC), pages 5412–5418. IEEE, 2024
work page 2024
-
[37]
Synthesis of opacity-enforcing winning strategies against colluded op- ponent
Chongyang Shi, Abhishek N Kulkarni, Hazhar Rahmani, and Jie Fu. Synthesis of opacity-enforcing winning strategies against colluded op- ponent. In2023 62nd IEEE Conference on Decision and Control (CDC), pages 7240–7246. IEEE, 2023
work page 2023
-
[38]
Ruochen Tai, Liyong Lin, Yuting Zhu, and Rong Su. Privacy-preserving co-synthesis against sensor–actuator eavesdropping intruder.Automat- ica, 150:110860, 2023
work page 2023
-
[39]
Shigemasa Takai and Yusuke Oka. A formula for the supremal con- trollable and opaque sublanguage arising in supervisory control.SICE Journal of Control, Measurement, and System Integration, 1(4):307–311, 2008
work page 2008
-
[40]
Yin Tong, Hao Lan, and Carla Seatzu. Verification of k-step and infinite- step opacity of bounded labeled petri nets.Automatica, 140:110221, 2022
work page 2022
-
[41]
Yin Tong, Zhiwu Li, Carla Seatzu, and Alessandro Giua. Verification of state-based opacity using petri nets.IEEE Transactions on Automatic Control, 62(6):2823–2837, 2017
work page 2017
-
[42]
Yin Tong, Zhiwu Li, Carla Seatzu, and Alessandro Giua. Current- state opacity enforcement in discrete event systems under incomparable observations.Discrete Event Dynamic Systems, 28(2):161–182, 2018
work page 2018
-
[43]
Synthesis of dynamic masks for information-theoretic opacity in stochastic systems
Sumukha Udupa, Chongyang Shi, and Jie Fu. Synthesis of dynamic masks for information-theoretic opacity in stochastic systems. In Proceedings of the ACM/IEEE 16th International Conference on Cyber- Physical Systems (with CPS-IoT Week 2025), pages 1–12, 2025
work page 2025
-
[44]
Integrat- ing obfuscation and control for privacy.IEEE Transactions on Automatic Control, 2025
Andrew Wintenberg, Necmiye Ozay, and St ´ephane Lafortune. Integrat- ing obfuscation and control for privacy.IEEE Transactions on Automatic Control, 2025
work page 2025
-
[45]
Walter Murry Wonham, Kai Cai, and Karen Rudie. Supervisory control of discrete-event systems: A brief history.Annual Reviews in Control, 45:250–256, 2018
work page 2018
-
[46]
Yifan Xie, Xiang Yin, and Shaoyuan Li. Opacity enforcing supervisory control using nondeterministic supervisors.IEEE Transactions on Automatic Control, 67(12):6567–6582, 2021
work page 2021
-
[47]
Yifan Xie, Xiang Yin, Shaoyuan Li, and Majid Zamani. Secure-by- construction controller synthesis for stochastic systems under linear temporal logic specifications. In2021 60th IEEE Conference on Decision and Control (CDC), pages 7015–7021. IEEE, 2021
work page 2021
-
[48]
Shuo Yang and Xiang Yin. Secure your intention: On notions of pre- opacity in discrete-event systems.IEEE Transactions on Automatic Control, 68(8):4754–4766, 2022
work page 2022
-
[49]
Xiang Yin and St ´ephane Lafortune. A uniform approach for synthesiz- ing property-enforcing supervisors for partially-observed discrete-event systems.IEEE Transactions on Automatic Control, 61(8):2140–2154, 2015
work page 2015
-
[50]
Xiang Yin and St ´ephane Lafortune. A new approach for the verification of infinite-step and k-step opacity using two-way observers.Automatica, 80:162–171, 2017
work page 2017
-
[51]
Xiang Yin, Majid Zamani, and Siyuan Liu. On approximate opacity of cyber-physical systems.IEEE Transactions on Automatic Control, 66(4):1630–1645, 2021
work page 2021
-
[52]
Yiwei Zheng, Aiwen Lai, Weiyao Lan, Xiao Yu, and Rong Su. En- forcement of opacity for interval weighted discrete-event system by supervisory control.IEEE Transactions on Automatic Control, 2025
work page 2025
-
[53]
Secure-by-construction synthesis for control systems.IEEE Transactions on Automatic Control, 2025
Bingzhuo Zhong, Siyuan Liu, Marco Caccamo, and Majid Zamani. Secure-by-construction synthesis for control systems.IEEE Transactions on Automatic Control, 2025
work page 2025
-
[54]
Online verification of k- step opacity by petri nets in centralized and decentralized structures
Guanghui Zhu, Zhiwu Li, and Naiqi Wu. Online verification of k- step opacity by petri nets in centralized and decentralized structures. Automatica, 145:110528, 2022. APPENDIX Proof of Proposition 1 Proof.The conclusions for the first and third components are straightforward according to the definition of the intruder state estimator. We now prove the seco...
work page 2022
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.