Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, M Howald, Z Ren… - Cryptology ePrint …, 2014 - eprint.iacr.org
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

Taking {Proof-Based} verified computation a few steps closer to practicality

S Setty, V Vu, N Panpalia, B Braun… - 21st USENIX Security …, 2012 - usenix.org
We describe GINGER, a built system for unconditional, general-purpose, and nearly
practical verification of outsourced computation. GINGER is based on PEPPER, which uses …

Resolving the conflict between generality and plausibility in verified computation

S Setty, B Braun, V Vu, AJ Blumberg, B Parno… - Proceedings of the 8th …, 2013 - dl.acm.org
The area of proof-based verified computation (outsourced computation built atop
probabilistically checkable proofs and cryptographic machinery) has lately seen renewed …

Pinocchio: Nearly practical verifiable computation

B Parno, J Howell, C Gentry, M Raykova - Communications of the ACM, 2016 - dl.acm.org
To instill greater confidence in computations outsourced to the cloud, clients should be able
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …

Verifiable delegation of computation on outsourced data

M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …

[PDF][PDF] Making argument systems for outsourced computation practical (sometimes).

STV Setty, R McPherson, AJ Blumberg, M Walfish - NDSS, 2012 - ndss-symposium.org
This paper describes the design, implementation, and evaluation of a system for performing
verifiable outsourced computation. It has long been known that (1) this problem can be …

Non-interactive verifiable computing: Outsourcing computation to untrusted workers

R Gennaro, C Gentry, B Parno - … , Santa Barbara, CA, USA, August 15-19 …, 2010 - Springer
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …

SNARKs for C: Verifying program executions succinctly and in zero knowledge

E Ben-Sasson, A Chiesa, D Genkin, E Tromer… - Annual cryptology …, 2013 - Springer
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …

Geppetto: Versatile verifiable computation

C Costello, C Fournet, J Howell… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak
client to securely outsource computations to remote parties. Recent work has dramatically …

vRAM: Faster verifiable RAM with program-independent preprocessing

Y Zhang, D Genkin, J Katz… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We study the problem of verifiable computation (VC) for RAM programs, where a
computationally weak verifier outsources the execution of a program to a powerful (but …