A new publicly verifiable blind detection scheme for intellectual property protection

被引:2
|
作者
Liang W. [1 ]
Long J. [2 ]
Chen X. [1 ]
Fan Y. [3 ]
Xiao W. [1 ]
机构
[1] Department of Software Engineering, Xiamen University of Technology, Xiamen, 361024, Fujian
[2] College of Computer Science and Electronic Engineering, Hunan University, Changsha, 10082, Hunan
[3] Department of Computer Science and Technology, China University of Petroleum, Beijing
关键词
Blind detection; IP watermark; Public verifiable; Scrambling; Zero-knowledge proof;
D O I
10.1007/s13198-016-0423-5
中图分类号
学科分类号
摘要
Existing zero-knowledge-based intellectual property (IP) watermarking techniques require a third party to identify suspected IP ownership. However, the credibility and controllability of the third party raise a new challenge to watermark detection in field programmable gate array (FPGA) IP cores. In this work, a public verifiable scheme for watermark embedding and blind detection in FPGA IP cores is proposed. The scheme uses the key threshold of interactive zero-knowledge protocol as the blind detection evidence for secure watermark authentication. The identification information of the IP owner and the key detection threshold is public in the zero-knowledge proof protocol. The security of public watermark detection for IP watermark adopts the idea of zero knowledge in cryptography. The scrambling algorithm will be used to scramble the authentication information in FPGA IP cores. In this case, the security of public watermark detection can be guaranteed. Without the original IP circuit and the third party, watermarks in FPGA IP cores can be blindly detected on site. The experiments show that our scheme improves the credibility of the watermarks detected by trading partners in public. The performances in terms of resource overhead, robustness and security are encouraging. © 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:2017 / 2029
页数:12
相关论文
共 50 条
  • [21] Secure and efficient publicly verifiable ridge regression outsourcing scheme
    Ruan, Ou
    Qin, Shanshan
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 703 - 709
  • [22] A PAIRING-BASED PUBLICLY VERIFIABLE SECRET SHARING SCHEME
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2011, 24 (01) : 186 - 194
  • [23] A pairing-based publicly verifiable secret sharing scheme
    Tsu-Yang Wu
    Yuh-Min Tseng
    Journal of Systems Science and Complexity, 2011, 24 : 186 - 194
  • [24] On the Security of Publicly Verifiable Anonymous IBE Scheme in the Standard Model
    Yang Q.-L.
    Zhou Y.-W.
    Yang K.-W.
    Wang T.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (02): : 291 - 295
  • [25] A publicly verifiable PCAE scheme for confidential applications with proxy delegation
    Wu, Tzong-Sun
    Lin, Han-Yu
    Ting, Pei-Yih
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (02): : 172 - 185
  • [26] Non-interactive publicly verifiable electronic voting scheme
    Information Engineering Institute, Information Engineering University, Zhengzhou 450002, China
    Kongzhi yu Juece Control Decis, 2006, 1 (107-110):
  • [27] New Publicly Verifiable Databases with Efficient Updates
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Ma, Jianfeng
    Lou, Wenjing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 546 - 556
  • [28] A New Efficient Publicly Verifiable Signcryption Scheme and Its Multiple Recipients Variant for Firewalls Implementation
    Elkamchouchi, H. M.
    Nasr, M. E.
    Ismail, Roayat
    NRSC: 2009 NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2009, VOLS 1 AND 2, 2009, : 511 - 519
  • [29] A Blind Dynamic Fingerprinting Technique for Sequential Circuit Intellectual Property Protection
    Chang, Chip-Hong
    Zhang, Li
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (01) : 76 - 89
  • [30] THE PROTECTION OF INTELLECTUAL PROPERTY
    CAPTAIN, TR
    JOURNAL OF SYSTEMS MANAGEMENT, 1984, 35 (07): : 18 - 20