TY - CONF
T1 - Taking proof-based verified computation a few steps closer to practicality
AU - Setty, Srinath
AU - Vu, Victor
AU - Panpalia, Nikhil
AU - Braun, Benjamin
AU - Blumberg, Andrew J.
AU - Walfish, Michael
N1 - Funding Information:
Detailed attention from Edmund L. Wong substantially clarified this paper. Yuval Ishai, Mike Lee, Bryan Parno, Mark Silberstein, Chung-chieh (Ken) Shan, Sara L. Su, Justin Thaler, and the anonymous reviewers gave useful comments that improved this draft. The Texas Advanced Computing Center (TACC) at UT supplied computing resources. We thank Jane-Ellen Long, of USENIX, for her good nature and inexhaustible patience. The research was supported by AFOSR grant FA9550-10-1-0073 and by NSF grants 1055057 and 1040083.
Publisher Copyright:
Copyright © 2019 21st USENIX Security Symposium. All rights reserved.
PY - 2012
Y1 - 2012
N2 - We describe GINGER, a built system for unconditional, general-purpose, and nearly practical verification of outsourced computation. GINGER is based on PEPPER, which uses the PCP theorem and cryptographic techniques to implement an efficient argument system (a kind of interactive protocol). GINGER slashes the query size and costs via theoretical refinements that are of independent interest; broadens the computational model to include (primitive) floating-point fractions, inequality comparisons, logical operations, and conditional control flow; and includes a parallel GPU-based implementation that dramatically reduces latency.
AB - We describe GINGER, a built system for unconditional, general-purpose, and nearly practical verification of outsourced computation. GINGER is based on PEPPER, which uses the PCP theorem and cryptographic techniques to implement an efficient argument system (a kind of interactive protocol). GINGER slashes the query size and costs via theoretical refinements that are of independent interest; broadens the computational model to include (primitive) floating-point fractions, inequality comparisons, logical operations, and conditional control flow; and includes a parallel GPU-based implementation that dramatically reduces latency.
UR - http://www.scopus.com/inward/record.url?scp=85076228457&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85076228457&partnerID=8YFLogxK
M3 - Paper
AN - SCOPUS:85076228457
SP - 253
EP - 268
T2 - 21st USENIX Security Symposium
Y2 - 8 August 2012 through 10 August 2012
ER -