Paper 2020/805

Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud

Furkan Turan and Ingrid Verbauwhede

Abstract

FPGAs offer many-fold acceleration to various application domains, and have become a part of cloud-based computation. However, their cloud-use introduce Cloud Service Provider (CSP) as trusted parties, who can access the hardware designs in plaintext. Therefore, the intellectual property of hardware designers is not protected against a dishonest cloud. In this paper, we propose a scheme for the confidentiality of accelerators on cloud, without limiting CSP to maintain their resources freely. Our proposed scheme is based on Proxy Re-Encryption which allows the developers to upload their accelerators to the CSPs under encryption. The CSPs cannot decrypt them; however, alter the encryption that allows the target FPGAs they pick to decrypt. In addition, our scheme allows metering the use of accelerators.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
key managementpublic-key cryptography
Contact author(s)
furkan turan @ esat kuleuven be
History
2020-06-30: received
Short URL
https://ia.cr/2020/805
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/805,
      author = {Furkan Turan and Ingrid Verbauwhede},
      title = {Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud},
      howpublished = {Cryptology ePrint Archive, Paper 2020/805},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/805}},
      url = {https://eprint.iacr.org/2020/805}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.