Cryptology ePrint Archive: Report 2012/598

Taking proof-based verified computation a few steps closer to practicality (extended version)

Srinath Setty and Victor Vu and Nikhil Panpalia and Benjamin Braun and Muqeet Ali and Andrew J. Blumberg and Michael Walfish

Abstract: We describe Ginger, a built system for unconditional, general-purpose, and nearly practical verification of outsourced computation. Ginger is based on Pepper, which uses the PCP theorem and cryptographic techniques to implement an \emph{efficient argument} system (a kind of interactive protocol). Ginger slashes the query size and costs via theoretical refinements that are of independent interest; broadens the computational model to include (primitive) floating-point fractions, inequality comparisons, logical operations, and conditional control flow; and includes a parallel GPU-based implementation that dramatically reduces latency.

Category / Keywords: cryptographic protocols / implementation applications PCP verified computation

Publication Info: This paper is an extended version of a previous publication. This version includes four Appendices (B--E) that were elided from the published version, for space.

Date: received 23 Oct 2012, last revised 28 Feb 2013

Contact author: mwalfish at cs utexas edu

Available format(s): PDF | BibTeX Citation

Note: This paper is an extended version of a previous publication. This version includes four Appendices (B--E) that were elided from the published version, for space, and eliminates an incorrect theoretical claim in the published paper.

Version: 20130228:071118 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]