Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Verifiable computing

Verifiable computation schemes enable a client to outsource the computation of a function F on various inputs to an untrusted worker, and then verify the correctness of the returned results. Critically, the outsourcing and verification procedures must be more efficient than performing the computation itself. The code included here implements the Pinocchio toolchain, as described in "Pinocchio: Nearly Practical Verifiable Computation" at the IEEE Symposium on Security and Privacy, 2013.


Date Published17 July 2013
Download Size0.45 MB

Note By installing, copying, or otherwise using this software, you agree to be bound by the terms of its license. Read the license.