M Backes, D Fiore, RM Reischuk - … of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We address the problem in which a client stores a large amount of data with an untrusted server in such a way that, at any moment, the client can ask the server to compute a function …
Outsourcing computation has been widely used to allow weak clients to access computational resources of a cloud. A natural security requirement for the client is to be able …
J Keuffer, R Molva, H Chabanne - … 2018, Barcelona, Spain, September 3-7 …, 2018 - Springer
Outsourcing machine learning algorithms helps users to deal with large amounts of data without the need to develop the expertise required by these algorithms. Outsourcing …
When a client outsources a job to a third party (eg, the cloud), how can the client check the result, without re-executing the computation? Recent work in proof-based verifiable …
As the cloud computing paradigm has gained prominence, the need for verifiable computation has grown increasingly urgent. Protocols for verifiable computation enable a …
S Setty, V Vu, N Panpalia, B Braun… - 21st USENIX Security …, 2012 - usenix.org
We describe GINGER, a built system for unconditional, general-purpose, and nearly practical verification of outsourced computation. GINGER is based on PEPPER, which uses …
Systems for verifiable outsourcing incur costs for a prover, a verifier, and precomputation; outsourcing makes sense when the combination of these costs is cheaper than not …
To instill greater confidence in computations outsourced to the cloud, clients should be able to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …
With the advent of cloud computing, individuals and companies alike are looking for opportunities to leverage cloud resources not only for storage but also for computation …