2015 IEEE Symposium on Security and Privacy 2015
DOI: 10.1109/sp.2015.23
|View full text |Cite
|
Sign up to set email alerts
|

Geppetto: Versatile Verifiable Computation

Abstract: Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. Recent work has dramatically reduced the client's cost to verify the correctness of results, but the overhead to produce proofs largely remains impractical. Geppetto introduces complementary techniques for reducing prover overhead and increasing prover flexibility. With Multi-QAPs, Geppetto reduces the cost of sharing state between computations (e.g., for MapRedu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
94
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 148 publications
(95 citation statements)
references
References 56 publications
1
94
0
Order By: Relevance
“…We do not implement a hybrid version, but not due to its incompatibility with hybrid computation. 19 In Section 5, we provided intuition for extending the hybrid versions of Database and Dijkstra into further rounds. That discussion was meant primarily to demonstrate that SFE could be achieved for functions requiring more than two rounds.…”
Section: Test Programsmentioning
confidence: 99%
See 1 more Smart Citation
“…We do not implement a hybrid version, but not due to its incompatibility with hybrid computation. 19 In Section 5, we provided intuition for extending the hybrid versions of Database and Dijkstra into further rounds. That discussion was meant primarily to demonstrate that SFE could be achieved for functions requiring more than two rounds.…”
Section: Test Programsmentioning
confidence: 99%
“…Hohenberger and Lysyanskaya introduced the untrusted but much more computationally powerful worker [24]. Follow-on works founded the idea of a verifiable, outsourceable computation scheme [22] and further improved on this idea [19,46,54]. Tramèr et al [60] previously modeled the enclave as a black-box, albeit in a weaker sense, by keeping only critical functionalities secret from the host.…”
Section: Related Workmentioning
confidence: 99%
“…General-purpose techniques for verifiable computation [19,9,10,20,11,15] and their implementations [30,29] are potential solutions to the problem. To use these systems, the computation of the multi-pattern matching is either modeled as a circuit [28,16] or as a RAM program [14,31,6,7,15]. In circuit-based VC, the whole pattern set must be hardcoded into the circuit, which makes the computation on the server side inefficient (quasi-linear in the circuit size).…”
Section: Related Workmentioning
confidence: 99%
“…We do not use generic approaches to verified computation (where protocols check circuits with polylogarithmic depth [12] or use amortized models and homomorphic encryption [2]). Rather, we use dedicated certificates as those designed for dense [11,14] or sparse [4,5] exact linear algebra.…”
Section: Introductionmentioning
confidence: 99%