Paper 2020/805

Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud

Furkan Turan and Ingrid Verbauwhede


FPGAs offer many-fold acceleration to various application domains, and have become a part of cloud-based computation. However, their cloud-use introduce Cloud Service Provider (CSP) as trusted parties, who can access the hardware designs in plaintext. Therefore, the intellectual property of hardware designers is not protected against a dishonest cloud. In this paper, we propose a scheme for the confidentiality of accelerators on cloud, without limiting CSP to maintain their resources freely. Our proposed scheme is based on Proxy Re-Encryption which allows the developers to upload their accelerators to the CSPs under encryption. The CSPs cannot decrypt them; however, alter the encryption that allows the target FPGAs they pick to decrypt. In addition, our scheme allows metering the use of accelerators.

Available format(s)
Cryptographic protocols
Publication info
Preprint. MINOR revision.
key managementpublic-key cryptography
Contact author(s)
furkan turan @ esat kuleuven be
2020-06-30: received
Short URL
Creative Commons Attribution


      author = {Furkan Turan and Ingrid Verbauwhede},
      title = {Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud},
      howpublished = {Cryptology ePrint Archive, Paper 2020/805},
      year = {2020},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.