Authors
Ahmed Kosba, Charalampos Papamanthou, Elaine Shi
Publication date
2018/5/20
Conference
2018 IEEE Symposium on Security and Privacy (SP)
Pages
944-961
Publisher
IEEE
Description
Many cloud and cryptocurrency applications rely on verifying the integrity of outsourced computations, in which a verifier can efficiently verify the correctness of a computation made by an untrusted prover. State-of-the-art protocols for verifiable computation require that the computation task be expressed as arithmetic circuits, and the number of multiplication gates in the circuit is the primary metric that determines performance. At the present, a programmer could rely on two approaches for expressing the computation task, either by composing the circuits directly through low-level development tools; or by expressing the computation in a high-level program and rely on compilers to perform the program-to-circuit transformation. The former approach is difficult to use but on the other hand allows an expert programmer to perform custom optimizations that minimize the resulting circuit. In comparison, the latter approach is …
Total citations
2018201920202021202220232024222018283618
Scholar articles
A Kosba, C Papamanthou, E Shi - 2018 IEEE Symposium on Security and Privacy (SP), 2018