[PDF][PDF] Making argument systems for outsourced computation practical (sometimes).

STV Setty, R McPherson, AJ Blumberg, M Walfish - NDSS, 2012 - ndss-symposium.org
This paper describes the design, implementation, and evaluation of a system for performing
verifiable outsourced computation. It has long been known that (1) this problem can be …

Taking {Proof-Based} verified computation a few steps closer to practicality

S Setty, V Vu, N Panpalia, B Braun… - 21st USENIX Security …, 2012 - usenix.org
We describe GINGER, a built system for unconditional, general-purpose, and nearly
practical verification of outsourced computation. GINGER is based on PEPPER, which uses …

Resolving the conflict between generality and plausibility in verified computation

S Setty, B Braun, V Vu, AJ Blumberg, B Parno… - Proceedings of the 8th …, 2013 - dl.acm.org
The area of proof-based verified computation (outsourced computation built atop
probabilistically checkable proofs and cryptographic machinery) has lately seen renewed …

Efficient RAM and control flow in verifiable outsourced computation

RS Wahby, S Setty, M Howald, Z Ren… - Cryptology ePrint …, 2014 - eprint.iacr.org
Recent work on proof-based verifiable computation has resulted in built systems that employ
tools from complexity theory and cryptography to address a basic problem in systems …

Non-interactive verifiable computing: Outsourcing computation to untrusted workers

R Gennaro, C Gentry, B Parno - … , Santa Barbara, CA, USA, August 15-19 …, 2010 - Springer
We introduce and formalize the notion of Verifiable Computation, which enables a
computationally weak client to “outsource” the computation of a function F on various …

Trinocchio: Privacy-preserving outsourcing by distributed verifiable computation

B Schoenmakers, M Veeningen… - Applied Cryptography and …, 2016 - Springer
Verifiable computation allows a client to outsource computations to a worker with a
cryptographic proof of correctness of the result that can be verified faster than performing the …

Verifiable delegation of computation on outsourced data

M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …

Pinocchio: Nearly practical verifiable computation

B Parno, J Howell, C Gentry, M Raykova - Communications of the ACM, 2016 - dl.acm.org
To instill greater confidence in computations outsourced to the cloud, clients should be able
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …

{Verifiable} Computation with Massively Parallel Interactive Proofs

J Thaler, M Roberts, M Mitzenmacher… - 4th USENIX Workshop on …, 2012 - usenix.org
As the cloud computing paradigm has gained prominence, the need for verifiable
computation has grown increasingly urgent. Protocols for verifiable computation enable a …

Proofs, arguments, and zero-knowledge

J Thaler - Foundations and Trends® in Privacy and Security, 2022 - nowpublishers.com
Interactive proofs (IPs) and arguments are cryptographic protocols that enable an untrusted
prover to provide a guarantee that it performed a requested computation correctly …