Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/SP.2013.48guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Hybrid Architecture for Interactive Verifiable Computation

Published: 19 May 2013 Publication History

Abstract

We consider interactive, proof-based verifiable computation: how can a client machine specify a computation to a server, receive an answer, and then engage the server in an interactive protocol that convinces the client that the answer is correct, with less work for the client than executing the computation in the first place? Complexity theory and cryptography offer solutions in principle, but if implemented naively, they are ludicrously expensive. Recently, however, several strands of work have refined this theory and implemented the resulting protocols in actual systems. This work is promising but suffers from one of two problems: either it relies on expensive cryptography, or else it applies to a restricted class of computations. Worse, it is not always clear which protocol will perform better for a given problem.We describe a system that (a) extends optimized refinements of the non-cryptographic protocols to a much broader class of computations, (b) uses static analysis to fail over to the cryptographic ones when the non-cryptographic ones would be more expensive, and (c) incorporates this core into a built system that includes a compiler for a high-level language, a distributed server, and GPU acceleration. Experimental results indicate that our system performs better and applies more widely than the best in the literature.

Cited By

View all
  • (2023)zkSaaSProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620485(4427-4444)Online publication date: 9-Aug-2023
  • (2023)Modular Sumcheck Proofs with Applications to Machine Learning and Image ProcessingProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623160(1437-1451)Online publication date: 15-Nov-2023
  • (2021)Outlining TraceabilityProceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency10.1145/3442188.3445937(758-771)Online publication date: 3-Mar-2021
  • Show More Cited By
  1. A Hybrid Architecture for Interactive Verifiable Computation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      SP '13: Proceedings of the 2013 IEEE Symposium on Security and Privacy
      May 2013
      571 pages
      ISBN:9780769549774

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 19 May 2013

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)zkSaaSProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620485(4427-4444)Online publication date: 9-Aug-2023
      • (2023)Modular Sumcheck Proofs with Applications to Machine Learning and Image ProcessingProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623160(1437-1451)Online publication date: 15-Nov-2023
      • (2021)Outlining TraceabilityProceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency10.1145/3442188.3445937(758-771)Online publication date: 3-Mar-2021
      • (2020)Scaling verifiable computation using efficient set accumulatorsProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489329(2075-2092)Online publication date: 12-Aug-2020
      • (2020)OVERSEE: Outsourcing Verification to Enable Resource Sharing in Edge EnvironmentProceedings of the 49th International Conference on Parallel Processing10.1145/3404397.3404409(1-11)Online publication date: 17-Aug-2020
      • (2019)Doubly efficient interactive proofsProviding Sound Foundations for Cryptography10.1145/3335741.3335766(649-691)Online publication date: 4-Oct-2019
      • (2019)Architectural Support for Containment-based SecurityProceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3297858.3304020(361-377)Online publication date: 4-Apr-2019
      • (2018)Proving the correct execution of concurrent services in zero-knowledgeProceedings of the 13th USENIX conference on Operating Systems Design and Implementation10.5555/3291168.3291193(339-356)Online publication date: 8-Oct-2018
      • (2018)Verifiable Graph ProcessingACM Transactions on Privacy and Security10.1145/323318121:4(1-23)Online publication date: 1-Oct-2018
      • (2018)Primitives towards verifiable computationFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-6148-412:3(451-478)Online publication date: 1-Jun-2018
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media