2011
DOI: 10.14778/2047485.2047488
|View full text |Cite
|
Sign up to set email alerts
|

Verifying computations with streaming interactive proofs

Abstract: When computation is outsourced, the data owner would like to be assured that the desired computation has been performed correctly by the service provider. In theory, proof systems can give the necessary assurance, but prior work is not sufficiently scalable or practical. In this paper, we develop new proof protocols for verifying computations which are streaming in nature: the verifier (data owner) needs only logarithmic space and a single pass over the input, and after observing the input follows a simple pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
117
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 48 publications
(118 citation statements)
references
References 31 publications
1
117
0
Order By: Relevance
“…Similarly, they turn an online AMA protocol for F into an online AA protocol, which is also just a one-way randomized protocol for F . has an online MAMA protocol that is polynomially more efficient than any online AMA protocol (see e.g., [3,42]). …”
Section: Implications Of the Lower Boundmentioning
confidence: 99%
“…Similarly, they turn an online AMA protocol for F into an online AA protocol, which is also just a one-way randomized protocol for F . has an online MAMA protocol that is polynomially more efficient than any online AMA protocol (see e.g., [3,42]). …”
Section: Implications Of the Lower Boundmentioning
confidence: 99%
“…The research community has introduced streaming verifiable computation, both in the statistical [11,12] and the cryptographic setting [10,42], where a verifier and a prover observe a stream of n elements x 1 , x 2 , . . .…”
Section: Related Workmentioning
confidence: 99%
“…, x n and the verifier can delegate some computation over the stream to the prover. The protocols in [11,12] are probabilistic and use multiple interactions for verification, which reveal the secret randomness. Thus they support one-shot computation tasks, whereas we allow any number of queries.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations