|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Non-Interactive Verifiable Computation
If you have a question about this talk, please contact Microsoft Research Cambridge Talks Admins.
This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending
The growth of ``cloud computing’’ and the proliferation of mobile devices contribute to a desire to outsource computing from a client device to an online service. However, in these applications, how can the client verify that the result returned is correct, without redoing the computation herself? We formalize this setting by introducing the notion of verifiable computation, and we provide a protocol that achieves asymptotically optimal performance (amortized over multiple inputs). We then extend the definition of verifiable computation in two important directions: public delegation and public verifiability, which have important applications in many practical delegation scenarios. To achieve these new properties, we establish an important (and somewhat surprising) connection between verifiable computation and attribute-based encryption. Finally, we introduce a new characterization of NP that lends itself to very efficient cryptographic applications, including verifiable computation, succinct non-interactive arguments, and non-interactive zero knowledge proofs.
Bryan Parno is a researcher in the Security and Privacy Group within Microsoft Research, Redmond. His interests span a broad range of security topics, including network and system security, applied cryptography, usable security, and data privacy. Currently, he is investigating next-generation application models, privacy-preserving online services, and cryptographic techniques for securely outsourcing computation. He completed his PhD at Carnegie Mellon University, where he was advised by Adrian Perrig. His dissertation received the 2010 ACM Doctoral Dissertation Award, and he recently co-authored the book “Bootstrapping Trust in Modern Computers”.
This talk is part of the Microsoft Research Cambridge, public talks series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsPart III Seminar Series Lent 2008 Adolescence: rhetoric, representations, realities discussion group Emerge Cambridge
Other talksUnderstanding plant root developmental plasticity using cell type-specific genomics Spectral Sequences Applied to Two Specific Problems in the BRST Cohomology of Supersymmetric Theories in D=4 and D=10 Spacetime dimensions. "History since the Sixties: from social science to the global turn" Social processing in response to autobiographical memories of rejection and inclusion in depression Fourth Rollo Davidson Lecture On growth and form: gastrulation and axis formation by stem cells in the Amniote embryo