Abstract
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. Recent work has dramatically reduced the client's cost to verify the correctness of their results, but the overhead to produce proofs remains largely impractical.
Geppetto introduces complementary techniques for reducing prover overhead and increasing prover flexibility. With Multi QAPs, Geppetto reduces the cost of sharing state between computations (e.g, For MapReduce) or within a single computation by up to two orders of magnitude. Via a careful choice of cryptographic primitives, Geppetto's instantiation of bounded proof bootstrapping improves on prior bootstrapped systems by up to five orders of magnitude, albeit at some cost in universality. Geppetto also efficiently verifies the correct execution of proprietary (i.e, Secret) algorithms. Finally, Geppetto's use of energy-saving circuits brings the prover's costs more in line with the program's actual (rather than worst-case) execution time.
Geppetto is implemented in a full-fledged, scalable compiler and runtime that consume LLVM code generated from a variety of source C programs and cryptographic libraries.
Geppetto introduces complementary techniques for reducing prover overhead and increasing prover flexibility. With Multi QAPs, Geppetto reduces the cost of sharing state between computations (e.g, For MapReduce) or within a single computation by up to two orders of magnitude. Via a careful choice of cryptographic primitives, Geppetto's instantiation of bounded proof bootstrapping improves on prior bootstrapped systems by up to five orders of magnitude, albeit at some cost in universality. Geppetto also efficiently verifies the correct execution of proprietary (i.e, Secret) algorithms. Finally, Geppetto's use of energy-saving circuits brings the prover's costs more in line with the program's actual (rather than worst-case) execution time.
Geppetto is implemented in a full-fledged, scalable compiler and runtime that consume LLVM code generated from a variety of source C programs and cryptographic libraries.
Original language | English |
---|---|
Title of host publication | 2015 IEEE Symposium on Security and Privacy |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 253-270 |
Number of pages | 18 |
ISBN (Electronic) | 978-1-4673-6949-7 |
DOIs | |
Publication status | Published - 20 Jul 2015 |
Event | 2015 IEEE Symposium on Security and Privacy - The Fairmont, San Jose, CA, United States Duration: 18 May 2015 → 20 May 2015 https://www.ieee-security.org/TC/SP2015/ |
Publication series
Name | |
---|---|
Publisher | IEEE |
ISSN (Print) | 1081-6011 |
ISSN (Electronic) | 2375-1207 |
Conference
Conference | 2015 IEEE Symposium on Security and Privacy |
---|---|
Country/Territory | United States |
City | San Jose, CA |
Period | 18/05/15 → 20/05/15 |
Internet address |
Fingerprint
Dive into the research topics of 'Geppetto: Versatile Verifiable Computation'. Together they form a unique fingerprint.Profiles
-
Markulf Kohlweiss
- School of Informatics - Senior Lecturer in Security and Privacy
- Laboratory for Foundations of Computer Science
- Foundations of Computation
Person: Academic: Research Active , Academic: Research Active (Teaching)