We consider a scenario in which a data owner outsources storage of a large graph to an untrusted server; the server performs compu-tations on this graph in response to queries from a client (whether the data owner or others), and the goal is to ensure verifiability of the returned results. Existing work on verifiable computation (VC) would compile each graph computation to a circuit or a RAM pro-gram and then use generic techniques to produce a cryptographic proof of correctness for the result. Such an approach will incur large overhead, especially in the proof-computation time. In this work we address the above by designing, building, and evaluating ALITHEIA, a nearly practical VC system tailored for graph queries such as computing shortes...
Abstract. We investigate the problem of solving traditional combina-torial graph problems using secu...
We study a design framework for robust, independently verifiable, and workload-balanced distributed ...
Verifiable Computation (VC) schemes provide a mechanism for verifying the output of a remotely execu...
We give new algorithms in the annotated data streaming setting - also known as verifiable data strea...
International audienceIn an emerging computing paradigm, computational capabilities, from processing...
The goal of the LEDA project was to build an easy-to-use and extendable library of correct and effic...
When computation is outsourced, the data owner would like to be assured that the desired computation...
AbstractWe study a new model of computation, called best-order stream, for graph problems. Roughly, ...
An integral component of modern computing is the ability to outsource data and computation to powerf...
We investigate the problem of solving traditional combinatorial graph problems using secure multi-pa...
WWW 2015: 24th International World Wide Web Conference, Florence, Italy, 18-22 May 2015Analyzing and...
We address the problem of verifying the accuracy of a map of a network by making as few measurements...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
We address the problem of authenticating pattern matching queries over textual data that is outsourc...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Abstract. We investigate the problem of solving traditional combina-torial graph problems using secu...
We study a design framework for robust, independently verifiable, and workload-balanced distributed ...
Verifiable Computation (VC) schemes provide a mechanism for verifying the output of a remotely execu...
We give new algorithms in the annotated data streaming setting - also known as verifiable data strea...
International audienceIn an emerging computing paradigm, computational capabilities, from processing...
The goal of the LEDA project was to build an easy-to-use and extendable library of correct and effic...
When computation is outsourced, the data owner would like to be assured that the desired computation...
AbstractWe study a new model of computation, called best-order stream, for graph problems. Roughly, ...
An integral component of modern computing is the ability to outsource data and computation to powerf...
We investigate the problem of solving traditional combinatorial graph problems using secure multi-pa...
WWW 2015: 24th International World Wide Web Conference, Florence, Italy, 18-22 May 2015Analyzing and...
We address the problem of verifying the accuracy of a map of a network by making as few measurements...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
We address the problem of authenticating pattern matching queries over textual data that is outsourc...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Abstract. We investigate the problem of solving traditional combina-torial graph problems using secu...
We study a design framework for robust, independently verifiable, and workload-balanced distributed ...
Verifiable Computation (VC) schemes provide a mechanism for verifying the output of a remotely execu...