Intellectual property protection for FPGA designs using the public key cryptography

被引:1
作者
Huang, Weihong [1 ,2 ]
Li, Renfa [1 ]
Xu, Jianbo [2 ]
Huang, Yin [3 ]
Hosam, Osama [4 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan, Peoples R China
[3] Xiamen Univ Technol, Coll Software Engn, Xiamen, Peoples R China
[4] IRI, City Sci Res & Technol Applicat, Alexandria, Egypt
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Intellectual property reuse; asymmetric encryption; intellectual property watermark; elliptic-curve cryptography; intellectual property security; IP PROTECTION; WATERMARKING; EFFICIENT; SCHEME;
D O I
10.1177/1687814019836838
中图分类号
O414.1 [热力学];
学科分类号
摘要
For the copyright protection in intellectual property reuse technology, we must ensure that when an intellectual property watermark verifier leaks the secret key of an intellectual property watermark system, a malicious attacker could not guess the key to facilitate successful attacks on the watermarks. Therefore, this work proposes a robust intellectual property watermarking algorithm based on elliptic-curve cryptography. The physical layout of intellectual property design is abstracted into a graph with tree structure by using the topology theory. A secure model based on the asymmetric encryption model is proposed to encrypt the watermark positions. The generated graph and a random searching algorithm are used for the distribution of the watermark positions. Finally, the watermarks are inserted by reordering the redundant attributes in the graph. The experiments show that the proposed algorithm will insert more watermark constraints under the same condition. Thus, the probability of coincidence is lower, achieving good reliability. In addition, when the watermarks are impaired due to attacks, the algorithm can restore the original watermarks from the topology graph. In comparison to other algorithms, the proposed algorithm has good performance in watermark capacity and overhead, as well as provides resilience to the typical attacks.
引用
收藏
页数:11
相关论文
共 50 条
[41]   Recent progress in the security evaluation of multivariate public-key cryptography [J].
Ikematsu, Yasuhiko ;
Nakamura, Shuhei ;
Takagi, Tsuyoshi .
IET INFORMATION SECURITY, 2023, 17 (02) :210-226
[42]   Binary and prime field multiplication for public key cryptography on embedded microprocessors [J].
Seo, Hwajeong ;
Lee, Yeoncheol ;
Kim, Hyunjin ;
Park, Taehwan ;
Kim, Howon .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (04) :774-787
[43]   Public-Key Cryptography from New Multivariate Quadratic Assumptions [J].
Huang, Yun-Ju ;
Liu, Feng-Hao ;
Yang, Bo-Yin .
PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 :190-205
[44]   An analysis of public key cryptography based techniques in wireless sensor networks [J].
Kausar, Firdous ;
Masood, Ashraf .
IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, :341-+
[45]   Efficient Certificateless Public Key Cryptography With Equality Test for Internet of Vehicles [J].
Elhabob, Rashad ;
Zhao, Yanan ;
Sella, Iva ;
Xiong, Hu .
IEEE ACCESS, 2019, 7 :68957-68969
[46]   Exploring Intellectual Property in the Digital Realm: A Bibliometric Study on Research on the Management and Protection of Data-Based Intellectual Property [J].
Sun, Hanyue ;
Liu, Jiajia ;
Chen, Bingyuan ;
Yang, Le .
INFORMATION, 2024, 15 (12)
[47]   A novel watermarking framework for intellectual property protection of NLG APIs [J].
Li, Mingjie ;
Wu, Hanzhou ;
Zhang, Xinpeng .
NEUROCOMPUTING, 2023, 558
[48]   PUF-Based Intellectual Property Protection for CNN Model [J].
Li, Dawei ;
Ren, Yangkun ;
Liu, Di ;
Guan, Zhenyu ;
Zhang, Qianyun ;
Wang, Yanzhao ;
Liu, Jianwei .
KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2022, PT III, 2022, 13370 :722-733
[49]   A Novel Copyright Protection Scheme Using Visual Cryptography [J].
Nag, Amitava ;
Singh, Jyoti Prakash ;
Biswas, Sushanta ;
Sarkar, D. ;
Sarkar, Partha Pratim .
ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 :612-619
[50]   Establishing Symmetric Pairwise-keys Using Public-Key Cryptography in Wireless Sensor Networks (WSN) [J].
Nadir, Ibrahim ;
Zegeye, Wondimu K. ;
Moazzami, Farzad ;
Astatke, Yacob .
2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,