Obfuscation Algorithm Design Based on Fully Homomorphism

被引:0
|
作者
Pan, Zhao [1 ]
Zhang, Yue-Jun [1 ]
Wang, Jia-Wei [1 ]
Wang, Peng-jun [1 ,2 ]
机构
[1] Ningbo Univ, Fac Elect Engn & Comp Sci, Ningbo 315211, Zhejiang, Peoples R China
[2] Wenzhou Univ, Coll Math Phys & Elect Informat Engn, Wenzhou 325035, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Protecting effectively integrated circuit (IC) intellectual property (IP) cores has become an urgent problem. Obfuscation is an effective measure to protect IP cores of IC design. After studying the full homomorphism algorithm and the hardware obfuscation theory, a obfuscation algorithm design scheme is proposed based on the full homomorphism. in this scheme, the feasibility of the full homomorphism method in the hardware circuit is analyzed. Then, obfuscated data selector and multiplier are implemented based on full homomorphic algorithm. Finally, the proposed hardware circuit of obfuscation algorithm are designed in the TSMC 65nm process. Experimental results show that the full homomorphism algorithm based on hardware obfuscation has the correct logic function and the encrypted output data has the better randomness.
引用
收藏
页码:266 / 268
页数:3
相关论文
共 50 条
  • [1] A Parameterized Flattening Control Flow Based Obfuscation Algorithm with Opaque Predicate for Reduplicate Obfuscation
    Liang, Zheheng
    Li, Wenin
    Guo, Jing
    Qi, Deyu
    Zeng, Jijun
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 372 - 378
  • [2] Software protection algorithm based on control flow obfuscation
    Sun Y.
    Sun, Yongyong (yongsunjd@126.com), 2018, Totem Publishers Ltd (14) : 2181 - 2188
  • [4] Fully Secure and Fast Signing from Obfuscation
    Ramchen, Kim
    Waters, Brent
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 659 - 673
  • [5] An innovative algorithm for code Obfuscation
    Muhammad, Aslam
    Zia-ul Qayyum
    Ashfaq, Ahmad
    Waqar, M. M.
    Martinez-Enriquez, A. M.
    Syed, Afraz Z.
    LIFE SCIENCE JOURNAL-ACTA ZHENGZHOU UNIVERSITY OVERSEAS EDITION, 2012, 9 (01): : 527 - 533
  • [6] Design of Hardware Obfuscation AES Based on State Deflection Strategy
    Zhang Yuejun
    Pan Zhao
    Wang Pengjun
    Ding Dailu
    Li Gang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 750 - 757
  • [7] Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism
    Xia, Zhuoqun
    Yin, Dan
    Gu, Ke
    Li, Xiong
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2023, 8 (04): : 652 - 669
  • [8] A Reversible Data Hiding Algorithm Based on Multiple Histogram Shifting and Homomorphism Encryption
    Zhang, Ru
    Lu, Chunjing
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 113 - 113
  • [9] Design Obfuscation versus Test
    Farahmandi, Farimah
    Sinanoglu, Ozgur
    Blanton, Ronald
    Pagliarini, Samuel
    2020 IEEE EUROPEAN TEST SYMPOSIUM (ETS 2020), 2020,
  • [10] Optimization design of a fully variable valve system based on Nelder-Mead algorithm
    Zheng, Cong
    Liu, Liang
    Guo, He
    Xu, Zhaoping
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL OF MECHANICAL ENGINEERING SCIENCE, 2022, 236 (11) : 5815 - 5825