{"id":170789,"date":"2011-08-24T08:05:35","date_gmt":"2011-08-24T08:05:35","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/project\/verifiable-computing\/"},"modified":"2019-08-19T15:14:19","modified_gmt":"2019-08-19T22:14:19","slug":"verifiable-computing","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/verifiable-computing\/","title":{"rendered":"Verifiable Computing"},"content":{"rendered":"<p>Verifiable computation schemes enable a client to outsource the computation of a function F on various inputs to an untrusted worker, and then verify the correctness of the returned results. Critically, the outsourcing and verification procedures<br \/>\nmust be more efficient than performing the computation itself.<\/p>\n<p>In more detail, we introduce and formalize the notion of <em>Verifiable Computation<\/em>, which enables a computationally weak client to &#8220;outsource&#8221; the computation of an arbitrary function F on various dynamically-chosen inputs x_1,&#8230;,x_k to one or more workers. The workers return the result of the function evaluation, e.g., y_i=F(x_i), as well as a proof that the computation of F was carried out correctly on the given value x_i. The primary constraint is that the verification of the proof should require substantially less computational effort than computing F(x_i) from scratch.<\/p>\n<h1>News<\/h1>\n<ul>\n<li>February, 2016 &#8211; Our <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/pinocchio-nearly-practical-verifiable-computation-2\/\">Pinocchio paper<\/a> was published as a <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/cacm.acm.org\/magazines\/2016\/2\/197429-pinocchio\/fulltext\">CACM Research Highlight<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. You can watch a <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/vimeo.com\/151160625\">short video overview<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> to learn more.<\/li>\n<li>July 22, 2015 &#8211; The <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/vc.codeplex.com\/\">source code<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> for <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/publication\/geppetto-versatile-verifiable-computation\/\">Geppetto<\/a>, our system for improving the versatility and performance of verifiable computations, is now also available on CodePlex.<\/li>\n<li>August 5, 2013 &#8211; The <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/vc.codeplex.com\/\">Pinocchio source code<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> is now available via CodePlex, which supports faster updates and external contributions.<\/li>\n<li>June 3, 2013 &#8211; Coverage from the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.technologyreview.com\/news\/515081\/microsoft-and-ibm-researchers-develop-a-lie-detector-for-the-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\">MIT Technology Review<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/li>\n<li>May 16, 2013 &#8211; The Pinocchio source code is now available!<\/li>\n<\/ul>\n<div id=\"en-usprojectsverifcompdefault\" class=\"page-content\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Verifiable computation schemes enable a client to outsource the computation of a function F on various inputs to an untrusted worker, and then verify the correctness of the returned results. Critically, the outsourcing and verification procedures must be more efficient than performing the computation itself. In more detail, we introduce and formalize the notion of [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-170789","msr-project","type-msr-project","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"2011-08-24","related-publications":[164144,164197,164198,167006,168179,238089,238237,314486],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[{"id":0,"name":"External Collaborators","content":"<table style=\"border-color: #fcfcfc;height: 189px;border-collapse: separate;border-spacing: 2px\" border=\"0\" width=\"781\" cellspacing=\"2\" cellpadding=\"2\">\r\n<tbody>\r\n<tr>\r\n<td style=\"padding: 2px;border: 0px solid\">\u00a0<span id=\"befc161e-a1e4-49e7-aae5-0489b4707652\" class=\"ImageBlock fn\"><img id=\"Imagebefc161e-a1e4-49e7-aae5-0489b4707652\" title=\"Rosario Gennaro\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/verifcomp-rosario.jpg\" alt=\"Rosario Gennaro\" width=\"93\" height=\"115\" \/><\/span><\/td>\r\n<td style=\"padding: 2px;border: 0px solid\">\u00a0<span id=\"711de0bc-ae84-47b8-a5d6-f1ab7916bf76\" class=\"ImageBlock fn\"><img id=\"Image711de0bc-ae84-47b8-a5d6-f1ab7916bf76\" title=\"Craig Gentry\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/verifcomp-craig.jpg\" alt=\"Craig Gentry\" width=\"110\" height=\"115\" \/><\/span><\/td>\r\n<td style=\"padding: 2px;border: 0px solid\">\u00a0<img class=\"alignnone wp-image-242414\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2011\/08\/howell-200x300.jpg\" alt=\"Jon Howell\" width=\"79\" height=\"115\" \/><\/td>\r\n<td style=\"padding: 2px;border: 0px solid\">\u00a0<span id=\"fd369894-638f-466c-b6d4-33ade976a22c\" class=\"ImageBlock fn\"><img id=\"Imagefd369894-638f-466c-b6d4-33ade976a22c\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/verifcomp-mariana.jpg\" width=\"86\" height=\"115\" \/><\/span><\/td>\r\n<td style=\"padding: 2px;border: 0px solid\">\u00a0<span id=\"04b73100-4e27-4399-8aa0-a455474bbaf1\" class=\"ImageBlock fn\"><img id=\"Image04b73100-4e27-4399-8aa0-a455474bbaf1\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/02\/verifcomp-vinod.jpg\" width=\"125\" height=\"115\" \/><\/span><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"padding: 2px;border: 0px solid\">\u00a0<a href=\"http:\/\/www-cs.ccny.cuny.edu\/~rosario\/\" target=\"_self\">Rosario Gennaro<\/a><\/td>\r\n<td style=\"padding: 2px;border: 0px solid\"><a href=\"http:\/\/www.informatik.uni-trier.de\/~ley\/pers\/hd\/g\/Gentry:Craig.html\" target=\"_self\">\u00a0Craig Gentry<\/a><\/td>\r\n<td style=\"padding: 2px;border: 0px solid\"><a href=\"http:\/\/www.jonh.net\/~jonh\/cv\/\">\u00a0Jon Howell<\/a><\/td>\r\n<td style=\"padding: 2px;border: 0px solid\">\u00a0<a href=\"http:\/\/www.cs.columbia.edu\/~mariana\/\" target=\"_self\">Mariana Raykova<\/a><\/td>\r\n<td style=\"padding: 2px;border: 0px solid\"><a href=\"http:\/\/www.cs.toronto.edu\/~vinodv\/\" target=\"_self\">\u00a0Vinod Vaikuntanathan<\/a><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<div id=\"en-usprojectsverifcompdefault\" class=\"page-content\">\r\n\r\n&nbsp;\r\n\r\n<a href=\"http:\/\/www.cs.toronto.edu\/~vinodv\/\" target=\"_self\">\u00a0<\/a>\r\n\r\n<\/div>"}],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Antoine Delignat-Lavaud","user_id":31056,"people_section":"Group 1","alias":"antdl"},{"type":"user_nicename","display_name":"C\u00e9dric Fournet","user_id":31819,"people_section":"Group 1","alias":"fournet"},{"type":"user_nicename","display_name":"Michael Naehrig","user_id":32976,"people_section":"Group 1","alias":"mnaehrig"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":5,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170789\/revisions"}],"predecessor-version":[{"id":604362,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170789\/revisions\/604362"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=170789"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=170789"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=170789"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=170789"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=170789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}