Obfuscation Algorithm Design Based on Fully Homomorphism

被引:0
|
作者
Pan, Zhao [1 ]
Zhang, Yue-Jun [1 ]
Wang, Jia-Wei [1 ]
Wang, Peng-jun [1 ,2 ]
机构
[1] Ningbo Univ, Fac Elect Engn & Comp Sci, Ningbo 315211, Zhejiang, Peoples R China
[2] Wenzhou Univ, Coll Math Phys & Elect Informat Engn, Wenzhou 325035, Peoples R China
来源
2018 14TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT) | 2018年
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Protecting effectively integrated circuit (IC) intellectual property (IP) cores has become an urgent problem. Obfuscation is an effective measure to protect IP cores of IC design. After studying the full homomorphism algorithm and the hardware obfuscation theory, a obfuscation algorithm design scheme is proposed based on the full homomorphism. in this scheme, the feasibility of the full homomorphism method in the hardware circuit is analyzed. Then, obfuscated data selector and multiplier are implemented based on full homomorphic algorithm. Finally, the proposed hardware circuit of obfuscation algorithm are designed in the TSMC 65nm process. Experimental results show that the full homomorphism algorithm based on hardware obfuscation has the correct logic function and the encrypted output data has the better randomness.
引用
收藏
页码:266 / 268
页数:3
相关论文
共 50 条
  • [31] CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network
    Pang, Bo
    Liang, Gang
    Yang, Jin
    Chen, Yijing
    Wang, Xinyi
    He, Wenbo
    COMPUTER JOURNAL, 2023, 66 (05): : 1295 - 1309
  • [32] Design of Anti-interference System for Fully Autonomous UAV Based on ADRC-EKF Algorithm
    Lin, Liang
    Chen, Chengbin
    Su, Kaixiong
    Chen, Baihe
    Li, Hanwen
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION ENGINEERING (ICECE 2019), 2019, : 428 - 433
  • [33] Semantic redirection obfuscation: A control flow obfuscation based on Android Runtime
    Wang, Zhichao
    Shan, Yiwei
    Yang, Zhi
    Wang, Ruoyi
    Song, Shuang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1756 - 1763
  • [34] Binary Obfuscation Based Reassemble
    Wang, Chang
    Zhang, Zhaolong
    Jia, Xiaoqi
    Tian, Donghai
    PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2018), 2018, : 153 - 160
  • [35] A fully distributed clustering algorithm based on fractal dimension
    Xiong, Xiao
    Zhang, Jie
    Shi, Qingwei
    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2007, 2007, 6773
  • [36] Hybrid Algorithm for Symmetric Based Fully Homomorphic Encryption
    Muhammed, Kamaldeen Jimoh
    Isiaka, Rafiu Mope
    Asaju-Gbolagade, Ayisat Wuraola
    Adewole, Kayode Sakariyah
    Gbolagade, Kazeem Alagbe
    APPLIED INFORMATICS (ICAI 2021), 2021, 1455 : 377 - 390
  • [37] A fully distributed clustering algorithm based on random walks
    Bui, Alain
    Kudireti, Abdurusul
    Sohier, Devan
    EIGHTH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, : 125 - +
  • [38] Homomorphism Key Agreement Based on RSA
    XIANG Guangli~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1609 - 1612
  • [39] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Rajat Subhra Chakraborty
    Swarup Bhunia
    Journal of Electronic Testing, 2011, 27 : 767 - 785
  • [40] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785