Verifiable computation schemes enable a client to outsource the computation of a function F on various inputs to an untrusted worker, and then verify the correctness of the returned results. Critically, the outsourcing and verification procedures must be more efficient than performing the computation itself. The code included here implements the Pinocchio toolchain, as described in "Pinocchio: Nearly Practical Verifiable Computation" at the IEEE Symposium on Security and Privacy, 2013.
Note By installing, copying, or otherwise using this software, you agree to be bound by the terms of its license. Read the license.