Proof-of-work certificates that can be efficiently computed in the cloud

06/29/2018
by   Jean-Guillaume Dumas, et al.
0

In an emerging computing paradigm, computational capabilities, from processing power to storage capacities, are offered to users over communication networks as a cloud-based service. There, demanding computations are outsourced in order to limit infrastructure costs. The idea of verifiable computing is to associate a data structure, a proof-of-work certificate, to the result of the outsourced computation. This allows a verification algorithm to prove the validity of the result, faster than by recomputing it. We talk about a Prover (the server performing the computations) and a Verifier. Goldwasser, Kalai and Rothblum gave in 2008 a generic method to verify any parallelizable computation, in almost linear time in the size of the, potentially structured, inputs and the result. However, the extra cost of the computations for the Prover (and therefore the extra cost to the customer), although only almost a constant factor of the overall work, is nonetheless prohibitive in practice. Differently, we will here present problem-specific procedures in computer algebra, e.g. for exact linear algebra computations, that are Prover-optimal, that is that have much less financial overhead.

READ FULL TEXT
research
02/11/2022

On the maximal autocorrelation of Rudin-Shapiro sequences

In this paper, we prove that the maximal aperiodic autocorrelation of th...
research
10/31/2019

A note on commutative Kleene algebra

In this paper we present a detailed proof of an important result of alge...
research
07/20/2021

A New Design Framework for Heterogeneous Uncoded Storage Elastic Computing

Elasticity is one important feature in modern cloud computing systems an...
research
08/27/2021

Computer algebra in Julia

Recently, the place of the main programming language for scientific and ...
research
07/03/2018

Interactive Certificates for Polynomial Matrices with Sub-Linear Communication

We develop and analyze new protocols to verify the correctness of variou...
research
07/03/2018

Verification Protocols with Sub-Linear Communication for Polynomial Matrix Operations

We design and analyze new protocols to verify the correctness of various...
research
05/04/2021

Verifiable Computing Using Computation Fingerprints Within FHE

We suggest using Fully Homomorphic Encryption (FHE) to be used, not only...

Please sign up or login with your details

Forgot password? Click here to reset