The growth of cloud computing contributes to a desire to outsource computing from a client device to an online service. However, the client should be able to efficiently verify the correctness of the results returned, to guard against malicious or malfunctioning services.
The speakers in this session of the 2013 Microsoft Research Faculty Summit have each built a different system for verifying arbitrary outsourced computations. Each draws on a different strand of theory and applies different cryptographic and system-engineering techniques. Collectively, their efforts have brought the cost of verification down by over 20 orders of magnitude in the last three years, making verifiable computation close to practical for a variety of applications.