Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Pinocchio: nearly practical verifiable computation
Parno B., Howell J., Gentry C., Raykova M.  SP 2013 (Proceedings of the 2013 IEEE Symposium on Security and Privacy, May 19-22, 2013)238-252.2013.Type:Proceedings
Date Reviewed: Oct 23 2013

Verifiable computation promises to improve the confidence of users when they choose cloud or outsourced computing to save money rather than maintaining their own servers and retaining the related technical support staff. The existing verifiable computation protocols are not very practical because they mainly rely on complicated cryptographic algorithms, such as fully homomorphic encryption and probabilistically checkable proofs. Furthermore, they cannot provide public verification.

In this paper, the authors propose Pinocchio, which can convert C code to be a specific program. The converted program can provide public verification such that the results of remote computing can be feasibly checked by the verifier. The protocol is simply based on the cryptographic assumptions from bilinear maps.

Moreover, the experiments show that Pinocchio can be very fast. In some applications, the total latency is faster than native C code execution.

I strongly suggest that engineers involved in cloud computing read this paper, especially if they need to verify that their remote execution produces secure and trustworthy results.

Reviewer:  Zheng Gong Review #: CR141668 (1401-0068)
Bookmark and Share
  Reviewer Selected
 
 
Security and Protection (C.2.0 ... )
 
 
Reliability, Availability, And Serviceability (C.4 ... )
 
 
Wireless Communication (C.2.1 ... )
 
 
Distributed Systems (C.2.4 )
 
 
Performance of Systems (C.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy