Obfuscation Algorithm Design Based on Fully Homomorphism

被引:0
|
作者
Pan, Zhao [1 ]
Zhang, Yue-Jun [1 ]
Wang, Jia-Wei [1 ]
Wang, Peng-jun [1 ,2 ]
机构
[1] Ningbo Univ, Fac Elect Engn & Comp Sci, Ningbo 315211, Zhejiang, Peoples R China
[2] Wenzhou Univ, Coll Math Phys & Elect Informat Engn, Wenzhou 325035, Peoples R China
来源
2018 14TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT) | 2018年
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Protecting effectively integrated circuit (IC) intellectual property (IP) cores has become an urgent problem. Obfuscation is an effective measure to protect IP cores of IC design. After studying the full homomorphism algorithm and the hardware obfuscation theory, a obfuscation algorithm design scheme is proposed based on the full homomorphism. in this scheme, the feasibility of the full homomorphism method in the hardware circuit is analyzed. Then, obfuscated data selector and multiplier are implemented based on full homomorphic algorithm. Finally, the proposed hardware circuit of obfuscation algorithm are designed in the TSMC 65nm process. Experimental results show that the full homomorphism algorithm based on hardware obfuscation has the correct logic function and the encrypted output data has the better randomness.
引用
收藏
页码:266 / 268
页数:3
相关论文
共 50 条
  • [21] A HOMOMORPHISM SEQUENCE BASED ON LOOPS
    SMITH, PA
    SCIENCE, 1954, 120 (3124) : 790 - 790
  • [22] An Orthogonal Algorithm for Key Management in Hardware Obfuscation
    Wang, Jiawei
    Zhang, Yuejun
    Wang, Pengjun
    Luan, Zhicun
    Xue, Xiaoyong
    Zeng, Xiaoyang
    Yu, Qiaoyan
    PROCEEDINGS OF THE 2019 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2019,
  • [23] A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
    Cui, Aijiao
    Li, Mengyang
    Qu, Gang
    Li, Huawei
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (12) : 4524 - 4536
  • [24] DSP Design Protection in CE through Algorithmic Transformation Based Structural Obfuscation
    Sengupta, Anirban
    Roy, Dipanjan
    Mohanty, Saraju P.
    Corcoran, Peter
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2017, 63 (04) : 467 - 476
  • [25] Authorship Obfuscation System Development based on Long Short-term Memory Algorithm
    Maulana, Hendrik
    Sari, Riri Fitri
    INTERNATIONAL JOURNAL OF TECHNOLOGY, 2022, 13 (02) : 345 - 355
  • [26] Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
    Chakraborty, Abhishek
    Srivastava, Ankur
    2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 549 - 554
  • [27] Towards a fully automated algorithm driven platform for biosystems design
    Mohammad HamediRad
    Ran Chao
    Scott Weisberg
    Jiazhang Lian
    Saurabh Sinha
    Huimin Zhao
    Nature Communications, 10
  • [28] Towards a fully automated algorithm driven platform for biosystems design
    HamediRad, Mohammad
    Chao, Ran
    Weisberg, Scott
    Lian, Jiazhang
    Sinha, Saurabh
    Zhao, Huimin
    NATURE COMMUNICATIONS, 2019, 10 (1)
  • [29] AN IMPROVED FULLY STRESSED DESIGN ALGORITHM FOR PLATE SHELL STRUCTURES
    MIURA, H
    STRUCTURAL OPTIMIZATION, 1990, 2 (04): : 233 - 237
  • [30] Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications
    Hariss, Khalil
    Noura, Hassan
    Samhat, Abed Ellatif
    Chamoun, Maroun
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2017, 2018, 10694 : 127 - 139