Systems and methods for privacy-preserving functional IP verification utilizing fully homomorphic encryption
First Claim
1. A method of verifying an intellectual property (“
- IP”
) core with test vectors in the encrypted domain between at least two parties, the at least two parties including an IP owner and an IP user, the method comprising;
transforming, by an IP owner computing system, an IP core to a fully homomorphic encryption (“
FHE”
) compatible netlist;
generating, by an IP user computing system, a private encryption key and a public encryption key for a FHE scheme;
encrypting, by the IP user computing system, a test vector with the private encryption key to form an encrypted test vector that is encrypted according to the FHE scheme;
inputting the FHE compatible netlist, the encrypted test vector, and the public encryption key into a privacy-preserving verification (“
PPV”
) tool;
generating, by the PPV tool, an encrypted test output; and
transmitting the encrypted test output to the IP user computing system.
2 Assignments
0 Petitions
Accused Products
Abstract
A privacy-preserving verification methodology for SoC computing systems is described. The verification methodology utilizes the principles of Multi-Party Computation (“MPC”), and enables meaningful manipulation of encrypted data in the encrypted domain through the use of a fully homomorphic encryption (“FHE”) scheme. In the described verification methodology, IP logic is transformed and test vectors utilized to verify the IP logic are encrypted. The parties involved in the verification (e.g., the designer, the manufacturer, a third-party verification service, etc.) can functionally verify the IP core via the encrypted test vectors while the encrypted test vectors remain in the encrypted domain. Accordingly, the IP core is verified without revealing unwarranted information, such as the underlying IP behind the SoC.
-
Citations
19 Claims
-
1. A method of verifying an intellectual property (“
- IP”
) core with test vectors in the encrypted domain between at least two parties, the at least two parties including an IP owner and an IP user, the method comprising;transforming, by an IP owner computing system, an IP core to a fully homomorphic encryption (“
FHE”
) compatible netlist;generating, by an IP user computing system, a private encryption key and a public encryption key for a FHE scheme; encrypting, by the IP user computing system, a test vector with the private encryption key to form an encrypted test vector that is encrypted according to the FHE scheme; inputting the FHE compatible netlist, the encrypted test vector, and the public encryption key into a privacy-preserving verification (“
PPV”
) tool;generating, by the PPV tool, an encrypted test output; and transmitting the encrypted test output to the IP user computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
- IP”
-
12. A computer-implemented machine for verifying an intellectual property (“
- IP”
) core with test vectors in the encrypted domain between at least two parties, the at least two parties including an IP owner and an IP user, comprising;a processor; and a nontransitory computer-readable medium operatively connected to the processor and including computer code configured to; transform, by an IP owner computing system, an IP core to a fully homomorphic encryption (“
FHE”
) compatible netlist;generate, by an IP user computing system, a private encryption key and a public encryption key for a FHE scheme; encrypt, by the IP user computing system, a test vector with the private encryption key to form an encrypted test vector that is encrypted according to the FHE scheme; input the FHE compatible netlist, the encrypted test vector, and the public encryption key into a privacy-preserving verification (“
PPV”
) tool;generate, by the PPV tool, an encrypted test output; and transmit the encrypted test output to the IP user computing system. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
- IP”
Specification