MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation

被引:0
|
作者
Mouris, Dimitris [1 ]
Gouert, Charles [1 ]
Tsoutsos, Nektarios Georgios [1 ]
机构
[1] Univ Delaware, Newark, DE 19716 USA
关键词
Applied Cryptography; Hardware Security; Intellectual Property (IP) Verification; IP Piracy; Logic Locking; Secure Multiparty Computation (MPC); PIRACY; GATES;
D O I
10.1109/IOLTS59296.2023.10224859
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The global supply chain involves multiple independent entities, and potential adversaries can exploit different attack vectors to steal proprietary designs and information. As a result, intellectual property (IP) owners and consumers have reasons to keep their designs private. Without a trusted third party, this mutual mistrust can lead to a deadlock where IP owners are unwilling to disclose their IP core before a financial agreement is reached, while consumers need assurance that the proprietary design will meet their integration needs without compromising the confidentiality of their test vectors. To address this challenge, we introduce an efficient framework called MPloC that resolves this deadlock by allowing owners and consumers to jointly evaluate the target design with consumer-supplied test vectors while preserving the privacy of both the IP core and the inputs. MPloC is the first work that combines secure multiparty computation (MPC) and logic-locking techniques to accomplish these goals. Our approach supports both semi-honest and malicious security models to allow users to balance stronger security guarantees with performance. We compare our approach to existing state-of-the-art works that utilize homomorphic encryption across several benchmarks and report runtime improvements of more than two orders of magnitude.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Towards Outsourced Privacy-preserving Multiparty DBSCAN
    Rahman, Mohammad Shahriar
    Basu, Anirban
    Kiyomoto, Shinsaku
    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 225 - 226
  • [42] A Framework for Privacy-Preserving Multiparty Computation with Homomorphic Encryption and Zero-Knowledge Proofs
    Dhokrat, Janak
    Pulgam, Namita
    Maktum, Tabassum
    Mane, Vanita
    Informatica (Slovenia), 2024, 48 (21): : 1 - 13
  • [43] Privacy-Preserving Functional IP Verification utilizing Fully Homomorphic Encryption
    Konstantinou, Charalambos
    Keliris, Anastasis
    Maniatakos, Michail
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 333 - 338
  • [44] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jian-Feng
    Sun, Cong
    Xi, Ning
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 943 - 960
  • [45] SAEV: Secure Aggregation and Efficient Verification for Privacy-Preserving Federated Learning
    Wang, Junkai
    Wang, Rong
    Xiong, Ling
    Xiong, Neal
    Liu, Zhicai
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 39681 - 39696
  • [46] Multiparty Computation: To Secure Privacy, Do the Math
    Queue, 2023, 21 (06): : 78 - 100
  • [47] Threshold-based Secure and Privacy-Preserving Message Verification in VANETs
    Gao, Wei
    Wang, Mingzhong
    Zhu, Liehuang
    Zhang, Xiaoping
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 795 - 802
  • [48] Privacy-preserving Trust Verification
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Shafiq, Basit
    Adam, Nabil
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 139 - 148
  • [49] PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
    Li, Teng
    Ma, Jianfeng
    Sun, Cong
    Wei, Dawei
    Xi, Ning
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 5 - 10
  • [50] A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
    Qin, Zhen
    Sun, Jianfei
    Wahaballa, Abubaker
    Zheng, Wentao
    Xiong, Hu
    Qin, Zhiguang
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 55 - 60