Research

Paper

TESTING March 24, 2026

BlindMarket: Enabling Verifiable, Confidential, and Traceable IP Core Distribution in Zero-Trust Settings

Authors

Zhaoxiang Liu, Samuel Judson, Raj Dutta, Mark Santolucito, Xiaolong Guo, Ning Luo

Abstract

We present BlindMarket, an end-to-end zero-trust distribution framework for hardware IP cores. BlindMarket allows two parties, the IP user and the IP vendor, to complete an IP trading process with strong guarantees of verifiability and confidentiality before the transaction, and then traceability after. We propose verification heuristics and adapt the cone of influence-based design pruning to overcome the limited scalability common to cryptographic protocols and the hardness of the underlying hardware verification. We systematically evaluate our framework on a diverse set of real-world hardware benchmarks, and the results demonstrate that BlindMarket effectively completes across a diverse set of real-world hardware IP cores, demonstrating successful verification on 12 out of 13 designs and substantial performance improvements enabled by design pruning and control-flow guided heuristics.

Metadata

arXiv ID: 2603.22685
Provider: ARXIV
Primary Category: cs.CR
Published: 2026-03-24
Fetched: 2026-03-25 06:02

Related papers

Raw Data (Debug)
{
  "raw_xml": "<entry>\n    <id>http://arxiv.org/abs/2603.22685v1</id>\n    <title>BlindMarket: Enabling Verifiable, Confidential, and Traceable IP Core Distribution in Zero-Trust Settings</title>\n    <updated>2026-03-24T01:23:45Z</updated>\n    <link href='https://arxiv.org/abs/2603.22685v1' rel='alternate' type='text/html'/>\n    <link href='https://arxiv.org/pdf/2603.22685v1' rel='related' title='pdf' type='application/pdf'/>\n    <summary>We present BlindMarket, an end-to-end zero-trust distribution framework for hardware IP cores. BlindMarket allows two parties, the IP user and the IP vendor, to complete an IP trading process with strong guarantees of verifiability and confidentiality before the transaction, and then traceability after. We propose verification heuristics and adapt the cone of influence-based design pruning to overcome the limited scalability common to cryptographic protocols and the hardness of the underlying hardware verification. We systematically evaluate our framework on a diverse set of real-world hardware benchmarks, and the results demonstrate that BlindMarket effectively completes across a diverse set of real-world hardware IP cores, demonstrating successful verification on 12 out of 13 designs and substantial performance improvements enabled by design pruning and control-flow guided heuristics.</summary>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.CR'/>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.LO'/>\n    <published>2026-03-24T01:23:45Z</published>\n    <arxiv:primary_category term='cs.CR'/>\n    <author>\n      <name>Zhaoxiang Liu</name>\n    </author>\n    <author>\n      <name>Samuel Judson</name>\n    </author>\n    <author>\n      <name>Raj Dutta</name>\n    </author>\n    <author>\n      <name>Mark Santolucito</name>\n    </author>\n    <author>\n      <name>Xiaolong Guo</name>\n    </author>\n    <author>\n      <name>Ning Luo</name>\n    </author>\n  </entry>"
}