A new publicly verifiable blind detection scheme for intellectual property protection

被引:2
|
作者
Liang W. [1 ]
Long J. [2 ]
Chen X. [1 ]
Fan Y. [3 ]
Xiao W. [1 ]
机构
[1] Department of Software Engineering, Xiamen University of Technology, Xiamen, 361024, Fujian
[2] College of Computer Science and Electronic Engineering, Hunan University, Changsha, 10082, Hunan
[3] Department of Computer Science and Technology, China University of Petroleum, Beijing
关键词
Blind detection; IP watermark; Public verifiable; Scrambling; Zero-knowledge proof;
D O I
10.1007/s13198-016-0423-5
中图分类号
学科分类号
摘要
Existing zero-knowledge-based intellectual property (IP) watermarking techniques require a third party to identify suspected IP ownership. However, the credibility and controllability of the third party raise a new challenge to watermark detection in field programmable gate array (FPGA) IP cores. In this work, a public verifiable scheme for watermark embedding and blind detection in FPGA IP cores is proposed. The scheme uses the key threshold of interactive zero-knowledge protocol as the blind detection evidence for secure watermark authentication. The identification information of the IP owner and the key detection threshold is public in the zero-knowledge proof protocol. The security of public watermark detection for IP watermark adopts the idea of zero knowledge in cryptography. The scrambling algorithm will be used to scramble the authentication information in FPGA IP cores. In this case, the security of public watermark detection can be guaranteed. Without the original IP circuit and the third party, watermarks in FPGA IP cores can be blindly detected on site. The experiments show that our scheme improves the credibility of the watermarks detected by trading partners in public. The performances in terms of resource overhead, robustness and security are encouraging. © 2016, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:2017 / 2029
页数:12
相关论文
共 50 条
  • [31] PROTECTION OF INTELLECTUAL PROPERTY
    不详
    ILLINOIS LAW REVIEW, 1941, 35 (05): : 546 - 565
  • [32] A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing
    Tian, Youliang
    Peng, Changgen
    Zhang, Renping
    Chen, Yuling
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 71 - 75
  • [33] A publicly verifiable watermarking scheme based on quantum chaos and DWT–DCT
    Gaurav Sharma
    Rashmi Chawla
    Shailender Gupta
    Shirin Dora
    SN Applied Sciences, 2019, 1
  • [34] Security analysis of a publicly verifiable data possession scheme for remote storage
    Zhiyan Xu
    Libing Wu
    Debiao He
    Muhammad Khurram Khan
    The Journal of Supercomputing, 2017, 73 : 4923 - 4930
  • [35] Secure electronic voting using Publicly Verifiable Secret Sharing scheme
    Song, Chun-lai
    Yin, Xin-chun
    2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 627 - 630
  • [36] A publicly verifiable copyright-proving scheme resistant to malicious attacks
    Chen, TH
    Horng, GB
    Lee, WB
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2005, 52 (01) : 327 - 334
  • [37] Publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Wu, Yujiang
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1945 - +
  • [38] Publicly verifiable secret sharing scheme with information-theoretic security
    Tang, Chun-Ming
    Pei, Ding-Yi
    Zhao, Yan-Meng
    Shi, Gui-Hua
    Shenzhen Daxue Xuebao (Ligong Ban)/Journal of Shenzhen University Science and Engineering, 2009, 26 (02): : 121 - 126
  • [39] A publicly verifiable authenticated encryption scheme based on factoring and discrete logarithms
    Tsai C.-Y.
    Liu C.-Y.
    Tsaur S.-C.
    Hwang M.-S.
    Int. J. Netw. Secur., 3 (443-448): : 443 - 448
  • [40] A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts
    Wang, Hao
    Ge, Chunpeng
    Zhou, Lu
    Liu, Zhe
    Lan, Dongwan
    Lu, Xiaozhen
    Jiang, Danni
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 70 - 83