Privacy-preserving functional IP verification utilizing fully homomorphic encryption

Intellectual Property (IP) verification is a crucial component of System-on-Chip (SoC) design in the modern IC design business model. Given a globalized supply chain and an increasing demand for IP reuse, IP theft has become a major concern for the IC industry. In this paper, we address the trust issues that arise between IP owners and IP users during the functional verification of an IP core. Our proposed scheme ensures the privacy of IP owners and users, by a) generating a privacy-preserving version of the IP, which is functionally equivalent to the original design, and b) employing homomorphically encrypted input vectors. This allows the functional verification to be securely outsourced to a third-party, or to be executed by either parties, while revealing the least possible information regarding the test vectors and the IP core. Experiments on both combinational and sequential benchmark circuits demonstrate up to three orders of magnitude IP verification slowdown, due to the computationally intensive fully homomorphic operations, for different security parameter sizes.

[1]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[2]  J. Skytta,et al.  On Parallelization of High-Speed Processors for Elliptic Curve Cryptography , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[3]  Vinod Vaikuntanathan,et al.  On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.

[4]  Andreas G. Veneris,et al.  Path directed abstraction and refinement in SAT-based design debugging , 2012, DAC Design Automation Conference 2012.

[5]  D. Kelf,et al.  Your core - my problem? integration and verification of IP , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).

[6]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[7]  Matteo Pradella,et al.  Bounded satisfiability checking of metric temporal logic specifications , 2013, TSEM.

[8]  Antonio García,et al.  IPP@HDL: Efficient Intellectual Property Protection Scheme for IP Cores , 2007, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[9]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.

[10]  Wolfgang Fichtner,et al.  Functional verification of intellectual properties (IP): a simulation-based solution for an application-specific instruction-set processor , 1999, International Test Conference 1999. Proceedings (IEEE Cat. No.99CH37034).

[11]  Nektarios Georgios Tsoutsos,et al.  HEROIC: Homomorphically EncRypted One Instruction Computer , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[12]  Tom Anderson,et al.  Your core— my problem? (panel session): integration and verification of IP , 2001, DAC '01.

[13]  Matthew Smith,et al.  How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[14]  Rafail Ostrovsky,et al.  Zero-knowledge from secure multiparty computation , 2007, STOC '07.

[15]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[16]  F. Fummi,et al.  The use of SystemC for design verification and integration test of IP-cores , 2001, Proceedings 14th Annual IEEE International ASIC/SOC Conference (IEEE Cat. No.01TH8558).

[17]  Michael Brenner,et al.  Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system , 2011, CCS '11.

[18]  Tyler Moore,et al.  Measuring the Cost of Cybercrime , 2012, WEIS.

[19]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.