skip to main content
research-article

Delegating Computation: Interactive Proofs for Muggles

Published:11 September 2015Publication History
Skip Abstract Section

Abstract

In this work we study interactive proofs for tractable languages. The (honest) prover should be efficient and run in polynomial time or, in other words, a “muggle”.1 The verifier should be super-efficient and run in nearly linear time. These proof systems can be used for delegating computation: a server can run a computation for a client and interactively prove the correctness of the result. The client can verify the result’s correctness in nearly linear time (instead of running the entire computation itself).

Previously, related questions were considered in the holographic proof setting by Babai et al. [1991b] in the argument setting under computational assumptions by Kilian, and in the random oracle model by Micali [1994]. Our focus, however, is on the original interactive proof model where no assumptions are made on the computational power or adaptiveness of dishonest provers.

Our main technical theorem gives a public coin interactive proof for any language computable by a log-space uniform boolean circuit with depth d and input length n. The verifier runs in time n · poly(d, log(n)) and space O(log(n)), the communication complexity is poly(d, log(n)), and the prover runs in time poly(n). In particular, for languages computable by log-space uniform NC (circuits of polylog(n) depth), the prover is efficient, the verifier runs in time n · polylog(n) and space O(log(n)), and the communication complexity is polylog(n). Using this theorem we make progress on several questions.

--- We show how to construct 1-round computationally sound arguments with polylog communication for any log-space uniform NC computation. The verifier runs in quasi-linear time. This result uses a recent transformation of Kalai and Raz from public coin interactive proofs to 1-round arguments. The soundness of the argument system is based on the existence of a PIR scheme with polylog communication.

--- We construct interactive proofs with public coin, log-space, poly-time verifiers for all of P are given. This settles an open question regarding the expressive power of proof systems with such verifiers.

--- We construct zero-knowledge interactive proofs are given with communication complexity quasi-linear in the witness length for any NP language verifiable in NC, based on the existence of 1-way functions.

--- We construct probabilistically checkable arguments (a model due to Kalai and Raz) of size polynomial in the witness length (rather than instance length) for any NP language verifiable in NC, under computational assumptions, are provided.

References

  1. Manindra Agrawal, Neeraj Kayal, and Nitin Saxena. 2004. PRIMES is in P. Ann. Math. 160, 2, 781--793.Google ScholarGoogle ScholarCross RefCross Ref
  2. David P. Anderson. 2003. Public computing: Reconnecting people to science. In Proceedings of the Conference on Shared Knowledge and the Web.Google ScholarGoogle Scholar
  3. David P. Anderson. 2004. BOINC: A system for public-resource computing and storage. In Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing (GRID’04). 4--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz. 2010. From secrecy to soundness: Efficient verification via secure computation. In Proceedings of the 37th International Colloquium on Automata, Languages and Programming (ICALP’10). 152--163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. 1998. Proof verification and the hardness of approximation problems. J. ACM 45, 3, 501--555. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sanjeev Arora and Shmuel Safra. 1998. Probabilistic checking of proofs: A new characterization of NP. J. ACM 45, 1, 70--122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Laszlo Babai. 1985. Trading group theory for randomness. In Proceedings of the 17th Annual ACM Symposium on Theory of Computing (STOC’85). 421--429. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Laszlo Babai, Lance Fortnow, and Carsten Lund. 1991a. Non-deterministic exponential time has two-prover interactive protocols. Comput. Complex. 1, 3--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Laszlo Babai, Lance Fortnow, Leonid A. Levin, and Mario Szegedy. 1991b. Checking computations in polylogarithmic time. In Proceedings of the 23rd Annual ACM Symposium on Theory of Computing (STOC’91). 21--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Boaz Barak. 2001. How to go beyond the black-box simulation barrier. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS’01). 106--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Boaz Barak and Oded Goldreich. 2002. Universal arguments and their applications. In Proceedings of the 17th Annual IEEE Conference on Computational Complexity (CCC’02). 194--203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Richard Beigel, Mihir Bellare, Joan Feigenbaum, and Shafi Goldwasser. 1991. Languages that are easier than their proofs. In Proceedings of the 32nd Annual IEEE Symposium on Foundations of Computer Science (FOCS’91). 19--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Michael Ben-Or, Oded Goldreich, Shafi Goldwasser, Johan Hastad, Joe Kilian, Silvio Micali, and Phillip Rogaway. 1988a. Everything provable is provable in zero-knowledge. In Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’88). 37--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Michael Ben-Or, Shafi Goldwasser, Joe Kilian, and Avi Wigderson. 1988b. Multi-prover interactive proofs: How to remove intractability assumptions. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC’88). 113--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Eli Ben-Sasson, Oded Goldreich, Prahladh Harsha, Madhu Sudan, and Salil P. Vadhan. 2006. Robust PCPs of proximity, shorter PCPs, and applications to coding. SIAM J. Comput. 36, 4, 889--974. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer. 2012. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In Proceedings of the 3rd Conference on Innovations in Theoretical Computer Science (ITCS’12). 326--349. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer. 2013. Recursive composition and bootstrapping for SNARKS and proof-carrying data. In Proceedings of the 45th Annual ACM Symposium on Theory of Computing (STOC’13). 111--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Manuel Blum. 1987. How to prove a theorem so no-one else can claim it. In Proceedings of the International Congress of Mathematicians (ICM’87). 1444--1451.Google ScholarGoogle Scholar
  19. Manuel Blum and Sampath Kannan. 1995. Designing programs that check their work. J. ACM 42, 1, 269--291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Zvika Brakerski and Vinod Vaikuntanathan. 2011. Efficient fully homomorphic encryption from (standard) LWE. In Proceedings of the 52nd IEEE Annual Symposium on Foundations of Computer Science (FOCS’11). 97--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Christian Cachin, Silvio Micali, and Markus Stadler. 1999. Computationally private information retrieval with polylogarithmic communication. In Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT’99). 402--414. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ran Canetti, Oded Goldreich, and Shai Halevi. 2004. The random oracle methodology, revisited. J. ACM 51, 4, 557--594. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. 1998. Private information retrieval. J. ACM 45, 6, 965--981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, and Ran Raz. 2011. Memory delegation. In Proceedings of the 31st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’11). 151--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Kai-Min Chung, Yael Tauman Kalai, and Salil P. Vadhan. 2010. Improved delegation of computation using fully homomorphic encryption. In Proceedings of the 30th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’10). 483--501. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Anne Condon. 1991. Space-bounded probabilistic game automata. J. ACM 38, 2, 472--494. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Anne Condon and Richard E. Ladner. 1988. Probabilistic game automata. J. Comput. Syst. Sci. 36, 3, 452--489. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Anne Condon and Richard J. Lipton. 1989. On the complexity of space bounded interactive proofs (extended abstract). In Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science (FOCS’89). 462--467. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Graham Cormode, Michael Mitzenmacher, and Justin Thaler. 2012. Practical verified computation with streaming interactive proofs. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS’12). 90--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ronald Cramer and Ivan Damgård. 1997. Linear zero-knowledge -- A note on efficient zero-knowledge proofs and arguments. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC’97). 436--445. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Ivan Damgård, Sebastian Faust, and Carmit Hazay. 2012. Secure two-party computation with low communication. In Proceedings of the 9th International Conference on Theory of Cryptography (TCC’12). 54--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Irit Dinur. 2007. The PCP theorem by gap amplification. J. ACM 54, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Irit Dinur and Omer Reingold. 2006. Assignment testers: Towards a combinatorial proof of the PCP theorem. SIAM J. Comput. 36, 4, 975--1024. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Cynthia Dwork, Moni Naor, Omer Reingold, and Larry J. Stockmeyer. 2003. Magic functions. J. ACM 50, 6, 852--921. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Cynthia Dwork and Larry J. Stockmeyer. 1992a. Finite state verifiers I: The power of interaction. J. ACM 39, 4, 800--828. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Cynthia Dwork and Larry J. Stockmeyer. 1992b. Finite state verifiers II: Zero knowledge. J. ACM 39, 4, 829--858. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Cynthia Dwork and Larry J. Stockmeyer. 2002. 2-round zero knowledge and proof auditors. In Proceedings of the 34th Annual ACM Symposium on Theory of Computing (STOC’02). 322--331. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Uriel Feige, Shafi Goldwasser, Laszlo Lovasz, Shmuel Safra, and Mario Szegedy. 1996. Interactive proofs and the hardness of approximating cliques. J. ACM 43, 2, 268--292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Uriel Feige and Joe Kilian. 1997. Making games short (extended abstract). In Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC’97). 506--516. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Proceedings of the Conference on Advances in Cryptology (CRYPTO’86). 186--194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Lance Fortnow. 1989. Complexity-theoretic aspects of interactive proof systems. Tech. rep. MIT/LCS/TR-447, Massachusetts Institute of Technology. http://people.cs.uchicago.edu/~fortnow/papers/thesis.pdf.Google ScholarGoogle Scholar
  42. Lance Fortnow and Carsten Lund. 1993. Interactive proof systems and alternating time-space complexity. Theoret. Comput. Sci. 113, 1, 55--73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Rosario Gennaro, Craig Gentry, and Bryan Parno. 2010. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Proceedings of the 30th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’10). 465--482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova. 2013. Quadratic span programs and succinct NIZKs without PCPs. In Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT’13). 626--645.Google ScholarGoogle ScholarCross RefCross Ref
  45. Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC’09). 169--178. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Craig Gentry and Daniel Wichs. 2011. Separating succinct non-interactive arguments from all falsifiable assumptions. In Proceedings of the 43rd Annual ACM Symposium on Theory of Computing (STOC’11). 99--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Oded Goldreich. 1999. Modern cryptography, probabilistic proofs and pseudorandomness. In Algorithms and Combinatorics, Vol. 17, Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Oded Goldreich. 2001. The Foundations of Cryptography, Vol. 1. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Oded Goldreich, Silvio Micali, and Avi Wigderson. 1991. Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proof systems. J. ACM 38, 1, 691--729. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Shafi Goldwasser, Dan Gutfreund, Alexander Healy, Tali Kaufman, and Guy N. Rothblum. 2007. Verifying and decoding in constant depth. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC’07). 440--449. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Shafi Goldwasser and Yael Tauman Kalai. 2003. On the (in) security of the Fiat-Shamir paradigm. In Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science (FOCS’03). 102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Shafi Goldwasser, Huijia Lin, and Aviad Rubinstein. 2011. Delegation of computation without rejection problem from designated verifier CS-proofs. https://eprint.iacr.org/2011/456.pdf.Google ScholarGoogle Scholar
  53. Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The knowledge complexity of interactive proof-systems. SIAM J. Comput. 18, 1, 186--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Jens Groth. 2010. Short pairing-based non-interactive zero-knowledge arguments. In Proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’10). 321--340.Google ScholarGoogle ScholarCross RefCross Ref
  55. Tom Gur and Ron Rothblum. 2013. Non-interactive proofs of proximity. http://eccc.hpi-web.de/report/2013/078/.Google ScholarGoogle Scholar
  56. Johan Hastad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. 1999. A pseudorandom generator from any one-way function. SIAM J. Comput. 28, 4, 1364--1396. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. 2007. Zero-knowledge from secure multiparty computation. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC’07). 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Yuval Ishai and Anat Paskin. 2007. Evaluating branching programs on encrypted data. In Proceedings of the 4th Conference on Theory of Cryptography (TCC’07). 575--594. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Yael Tauman Kalai and Ran Raz. 2006. Succinct non-interactive zero-knowledge proofs with preprocessing for LOGSNP. In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06). 355--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Yael Tauman Kalai and Ran Raz. 2008. Interactive PCP. In Proceedings of the 35th International Colloquium on Automata, Languages and Programming (ICALP’08). 536--547. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Yael Tauman Kalai and Ran Raz. 2009. Probabilistically checkable arguments. In Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’09). 143--159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Yael Tauman Kalai, Ran Raz, and Ron D. Rothblum. 2013. Delegation for bounded space. In Proceedings of the 45th Annual ACM Symposium on Theory of Computing (STOC’13). 565--574. Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Yael Tauman Kalai, Ran Raz, and Ron D. Rothblum. 2014. How to delegate computations: The power of no-signaling proofs. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing (STOC’14). 485--494. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Joe Kilian. 1988. Zero-knowledge with log-space verifiers. In Proceedings of the 29th Annual Symposium on Foundations of Computer Science (FOCS’88). 25--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Joe Kilian. 1992. A note on efficient zero-knowledge proofs and arguments (extended abstract). In Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC’92). 723--732. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Joe Kilian. 1995. Improved efficient arguments (preliminary version). In Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’95). 311--324. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Eyal Kushilevitz and Rafail Ostrovsky. 1997. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS’97). 364--373. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Nathan Linial, Yishay Mansour, and Noam Nisan. 1993. Constant depth circuits, Fourier transform, and learnability. J. ACM 40, 3, 607--620. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Helger Lipmaa. 2005. An oblivious transfer protocol with log-squared communication. In Proceedings of the 8th International Conference on Information Security (ISC’05). 314--328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Helger Lipmaa. 2012. Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In Proceedings of the 9th International Conference on Theory of Cryptography (TCC’12). 169--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Carsten Lund, Lance Fortnow, Howard J. Karloff, and Noam Nisan. 1992. Algebraic methods for interactive proof systems. J. ACM 39, 4, 859--868. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Mersenne. 2007. The great Internet Mersenne prime search. http://www.mersenne.org/.Google ScholarGoogle Scholar
  73. Silvio Micali. 1994. CS proofs (extended abstract). In Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science (FOCS’94). 436--453. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Dana Moshkovitz and Ran Raz. 2008. Sub-constant error low degree test of almost-linear size. SIAM J. Comput. 38, 1, 140--180. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Moni Naor. 1989. Bit commitment using pseudo-randomness. In Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’89). 128--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Moni Naor. 2003. On cryptographic assumptions and challenges. In Proceedings of the 23rd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’03). 96--109.Google ScholarGoogle ScholarCross RefCross Ref
  77. Bryan Parno, Mariana Raykova, and Vinod Vaikuntanathan. 2012. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In Proceedings of the 9th International Conference on Theory of Cryptography (TCC’12). 422--439. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Alexander Polishchuk and Daniel A. Spielman. 1994. Nearly-linear size holographic proofs. In Proceedings of the 26th Annual ACM Symposium on Theory of Computing (STOC’94). 194--203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Ron Rivest, Leonard Adleman, and Michael Dertouzos. 1978. On data banks and privacy homomorphisms. Foundat. Secure Comput. 4, 11, 169--179.Google ScholarGoogle Scholar
  80. Guy Rothblum and Salil Vadhan. 2009. Are PCPs inherent in efficient arguments? In Proceedings of the 24th Annual IEEE Conference on Computational Complexity (CCC’09). 81--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Guy N. Rothblum, Salil P. Vadhan, and Avi Wigderson. 2013. Interactive proofs of proximity: Delegating computation in sublinear time. In Proceedings of the 45th Annual ACM Symposium on Symposium on Theory of Computing (STOC’13). 793--802. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Ronitt Rubinfeld and Madhu Sudan. 1996. Robust characterizations of polynomials with applications to program testing. SIAM J. Comput. 25, 2, 252--271. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. SETI. 1999. ET, phone SETI@home!. Science@NASA headlines. http://science.nasa.gov/science-news/science-at-nasa/1999/ast23may99_ 1/.Google ScholarGoogle Scholar
  84. SETI. 2007. SETI@home project website. http://setiathome.berkeley.edu/.Google ScholarGoogle Scholar
  85. Adi Shamir. 1992. IP = PSPACE. J. ACM 39, 4, 869--877. Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Justin Thaler. 2013. Time-optimal interactive proofs for circuit evaluation. In Proceedings of the 33rd Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’13). 71--89.Google ScholarGoogle ScholarCross RefCross Ref
  87. Justin Thaler, Mike Roberts, Michael Mitzenmacher, and Hanspeter Pfister. 2012. Verifiable computation with massively parallel interactive proofs. http://arxiv.org/abs/1202.1350.Google ScholarGoogle Scholar
  88. Victor Vu, Srinath T. V. Setty, Andrew J. Blumberg, and Michael Walfish. 2013. A hybrid architecture for interactive verifiable computation. In Proceedings of the IEEE Symposium on Security and Privacy (SP’13). 223--237. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. Michael Walfish and Andrew J. Blumberg. 2013. Verifying computations without reexecuting them: From theoretical possibility to near-practicality. http://eccc.hpi-web.de/report/2013/165/.Google ScholarGoogle Scholar

Index Terms

  1. Delegating Computation: Interactive Proofs for Muggles

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Journal of the ACM
      Journal of the ACM  Volume 62, Issue 4
      August 2015
      168 pages
      ISSN:0004-5411
      EISSN:1557-735X
      DOI:10.1145/2823318
      Issue’s Table of Contents

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 September 2015
      • Accepted: 1 February 2015
      • Revised: 1 December 2014
      • Received: 1 March 2014
      Published in jacm Volume 62, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader