Energy-privacy trade-offs in VLSI computations

被引:0
|
作者
Tyagi, A [1 ]
机构
[1] Iowa State Univ Sci & Technol, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
VLSI circuits are open to sidechannel attacks which disclose information about its internal state to an adversary. Privacy is a design attribute to quantify the circuit's resistance and resilience to sidechannel attacks. There has been some recent work in cryptography to capture the notion of privacy in circuits. Several constructions to transform a circuit into a private circuit have also been proposed. In this paper, we quantify the energy cost of providing privacy. We use the classical area-time-energy VLSI complexity theory techniques to prove lower bounds on the energy of any VLSI computation for a given function f parametrized by its privacy P (Privacy P or a P-private circuit implies that at least P bits of the circuit need to be observed to derive a single bit of information about an internal node). The main result establishes a lower bound of Omega (t(2)n(2)) on the E or ET or AT(2) product of any t-private computation of an n-bit multiplier or shifter. Incidentally, the privacy transformation proposed by Ishai et al [6] will generate n-bit multiplier and shifter with matching energy, energy-time, and AT(2) characteristics establishing that these lower bounds are tight. The privacy of the base design, without any privacy enhancement techniques, is t = 1. Hence this demonstrates that the privacy comes at a quadratic multiplicative factor energy cost, which can be significant for portable, energy-staxved applications such as Smart card. We further introduce the notion of information splitting secret sharing based privacy enhancement techniques. The lower bound on the energy for this case improves to Omega (Pn(2)), a factor P improvement.
引用
收藏
页码:361 / 374
页数:14
相关论文
共 50 条
  • [1] ENERGY-TIME TRADE-OFFS IN VLSI COMPUTATIONS
    TYAGI, A
    FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE ////, 1989, 405 : 301 - 311
  • [2] ENERGY-TIME TRADE-OFFS IN VLSI COMPUTATIONS
    TYAGI, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1989, 405 : 301 - 311
  • [3] Modeling Energy-Time Trade-Offs in VLSI Computation
    Bingham, Brad D.
    Greenstreet, Mark R.
    IEEE TRANSACTIONS ON COMPUTERS, 2012, 61 (04) : 530 - 547
  • [4] On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy
    Jhumka, Arshad
    Leeke, Matthew
    Shrestha, Sambid
    COMPUTER JOURNAL, 2011, 54 (06): : 860 - 874
  • [5] Sanitization of databases for refined privacy trade-offs
    HajYasien, Ahmed
    Estivill-Castro, Vladimir
    Topor, Rodney
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 522 - 528
  • [6] Area, Throughput, and Energy-Efficiency Trade-offs in the VLSI Implementation of LDPC Decoders
    Roth, C.
    Cevrero, A.
    Studer, C.
    Leblebici, Y.
    Burg, A.
    2011 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2011, : 1772 - 1775
  • [7] Energy and performance trade-offs between instruction reuse and trivial computations for embedded applications
    Islam, Md. Mafijul
    Stenstrom, Per
    2007 INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS, 2007, : 86 - 93
  • [8] On Privacy, Accuracy, and Fairness Trade-Offs in Facial Recognition
    Zarei, Amir
    Hassanpour, Ahmad
    Raja, Kiran
    IEEE ACCESS, 2025, 13 : 26050 - 26062
  • [9] Trade-Offs Between Fairness and Privacy in Language Modeling
    Matzken, Cleo
    Eger, Steffen
    Habernal, Ivan
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL 2023, 2023, : 6948 - 6969
  • [10] Security and Privacy Trade-Offs in CPS by Leveraging Inherent Differential Privacy
    Giraldo, Jairo
    Cardenas, Alvaro
    Kantarcioglu, Murat
    2017 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA 2017), 2017, : 1313 - 1318