Hash first, argue later: Adaptive verifiable computations on outsourced data

D Fiore, C Fournet, E Ghosh, M Kohlweiss… - Proceedings of the …, 2016 - dl.acm.org
Proof systems for verifiable computation (VC) have the potential to make cloud outsourcing
more trustworthy. Recent schemes enable a verifier with limited resources to delegate large …

Verifiable delegation of computation on outsourced data

M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted
server in such a way that, at any moment, the client can ask the server to compute a function …

Verifiable computation using smart contracts

S Avizheh, M Nabi, R Safavi-Naini… - Proceedings of the …, 2019 - dl.acm.org
Outsourcing computation has been widely used to allow weak clients to access
computational resources of a cloud. A natural security requirement for the client is to be able …

Efficient proof composition for verifiable computation

J Keuffer, R Molva, H Chabanne - … 2018, Barcelona, Spain, September 3-7 …, 2018 - Springer
Outsourcing machine learning algorithms helps users to deal with large amounts of data
without the need to develop the expertise required by these algorithms. Outsourcing …

Verifying computations with state

B Braun, AJ Feldman, Z Ren, S Setty… - Proceedings of the …, 2013 - dl.acm.org
When a client outsources a job to a third party (eg, the cloud), how can the client check the
result, without re-executing the computation? Recent work in proof-based verifiable …

{Verifiable} Computation with Massively Parallel Interactive Proofs

J Thaler, M Roberts, M Mitzenmacher… - 4th USENIX Workshop on …, 2012 - usenix.org
As the cloud computing paradigm has gained prominence, the need for verifiable
computation has grown increasingly urgent. Protocols for verifiable computation enable a …

Taking {Proof-Based} verified computation a few steps closer to practicality

S Setty, V Vu, N Panpalia, B Braun… - 21st USENIX Security …, 2012 - usenix.org
We describe GINGER, a built system for unconditional, general-purpose, and nearly
practical verification of outsourced computation. GINGER is based on PEPPER, which uses …

Full accounting for verifiable outsourcing

RS Wahby, Y Ji, AJ Blumberg, A Shelat… - Proceedings of the …, 2017 - dl.acm.org
Systems for verifiable outsourcing incur costs for a prover, a verifier, and precomputation;
outsourcing makes sense when the combination of these costs is cheaper than not …

Pinocchio: Nearly practical verifiable computation

B Parno, J Howell, C Gentry, M Raykova - Communications of the ACM, 2016 - dl.acm.org
To instill greater confidence in computations outsourced to the cloud, clients should be able
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …

Efficient techniques for publicly verifiable delegation of computation

K Elkhiyaoui, M Önen, M Azraoui, R Molva - … of the 11th ACM on Asia …, 2016 - dl.acm.org
With the advent of cloud computing, individuals and companies alike are looking for
opportunities to leverage cloud resources not only for storage but also for computation …