Link Details

Link 953089 thumbnail
User 448255 avatar

By dotCore
via research.microsoft.com
Submitted: Apr 11 2013 / 00:28

Verifiable computation schemes enable a client to outsource the computation of a function F on various inputs to an untrusted worker, and then verify the correctness of the returned results. Critically, the outsourcing and verification procedures must be more efficient than performing the computation itself. The code included here implements the Pinocchio toolchain, as described in "Pinocchio: Nearly Practical Verifiable Computation" at the IEEE Symposium on Security and Privacy, 2013.
  • 3
  • 0
  • 286
  • 19

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (2)



Voters Against This Link (0)



    Apache Hadoop
    Written by: Piotr Krewski
    Featured Refcardz: Top Refcardz:
    1. Play
    2. Akka
    3. Design Patterns
    4. OO JS
    5. Cont. Delivery
    1. Play
    2. Java Performance
    3. Akka
    4. REST
    5. Java