Verifiable ASICs

作者: Riad S. Wahby , Michael Walfish , Abhi Shelat , Siddharth Garg , Max Howald

DOI:

关键词:

摘要: A manufacturer of custom hardware (ASICs) can undermine the intended execution that hardware, high-assurance thus requires controlling manufacturing chain. However, a trusted platform might be orders magnitude worse in performance or price than an advanced, untrusted platform. This paper initiates exploration alternative: using verifiable computation (VC), ASIC computes proofs correct execution, which are verified by processor ASIC. In contrast to usual VC setup, here prover and verifier together must impose less overhead alternative executing directly on We instantiate this approach designing implementing physically realizable, area-efficient, high throughput ASICs (for verifier), fully synthesizable Verilog. The system, called Zebra, is based CMT Allspice interactive proof protocols, required new observations about CMT, careful design, attention architectural challenges. For class real computations, Zebra meets exceeds

参考文章(91)
Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova, Quadratic Span Programs and Succinct NIZKs without PCPs theory and application of cryptographic techniques. pp. 626- 645 ,(2013) , 10.1007/978-3-642-38348-9_37
Georg T Becker, Francesco Regazzoni, Christof Paar, Wayne P Burleson, None, Stealthy Dopant-Level Hardware Trojans Cryptographic Hardware and Embedded Systems - CHES 2013. pp. 197- 214 ,(2013) , 10.1007/978-3-642-40349-1_12
Bernd Hoefflinger, ITRS: The International Technology Roadmap for Semiconductors The Frontiers Collection. pp. 161- 174 ,(2011) , 10.1007/978-3-642-23096-7_7
Kwanhu Bang, Dong Kim, Sungroh Yoon, Eui-Young Chung, Soong-Mann Shin, Chang-Il Son, A High-Performance Solid-State Disk with Double-Data-Rate NAND Flash Memory. arXiv: Hardware Architecture. ,(2015)
Andrew J. Blumberg, Michael Walfish, Srinath Setty, Toward practical and unconditional verification of remote computations hot topics in operating systems. pp. 29- 29 ,(2011)
Pascal Sasdrich, Tim Güneysu, Efficient Elliptic-Curve Cryptography Using Curve25519 on Reconfigurable Devices applied reconfigurable computing. pp. 25- 36 ,(2014) , 10.1007/978-3-319-05960-0_3
Eli Ben-Sasson, Eran Tromer, Alessandro Chiesa, Madars Virza, Succinct non-interactive zero knowledge for a von Neumann architecture usenix security symposium. pp. 781- 796 ,(2014)
Eran Tromer, Alessandro Chiesa, Proof-Carrying Data and Hearsay Arguments from Signature Cards. international conference on supercomputing. pp. 310- 331 ,(2010)
Rosario Gennaro, Craig Gentry, Bryan Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers international cryptology conference. ,vol. 2009, pp. 465- 482 ,(2010) , 10.1007/978-3-642-14623-7_25
Craig Costello, Cedric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur, Geppetto: Versatile Verifiable Computation 2015 IEEE Symposium on Security and Privacy. pp. 253- 270 ,(2015) , 10.1109/SP.2015.23