Cryptology ePrint Archive: Report 2020/805

Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud

Furkan Turan and Ingrid Verbauwhede

Abstract: FPGAs offer many-fold acceleration to various application domains, and have become a part of cloud-based computation. However, their cloud-use introduce Cloud Service Provider (CSP) as trusted parties, who can access the hardware designs in plaintext. Therefore, the intellectual property of hardware designers is not protected against a dishonest cloud. In this paper, we propose a scheme for the confidentiality of accelerators on cloud, without limiting CSP to maintain their resources freely. Our proposed scheme is based on Proxy Re-Encryption which allows the developers to upload their accelerators to the CSPs under encryption. The CSPs cannot decrypt them; however, alter the encryption that allows the target FPGAs they pick to decrypt. In addition, our scheme allows metering the use of accelerators.

Category / Keywords: cryptographic protocols / key management, public-key cryptography

Date: received 29 Jun 2020

Contact author: furkan turan at esat kuleuven be

Available format(s): PDF | BibTeX Citation

Version: 20200630:130023 (All versions of this report)

Short URL: ia.cr/2020/805


[ Cryptology ePrint archive ]