Realizing the Promise of Proof-Based Verifiable Computation
Abstract:
This project designed and built systems that allow people to get useful work out of computers and components without having to trust, that is assume, that those components work properly. We have answered questions such as: how can we integrate custom hardware into a system, if the hardware manufacturer may be adversarial? How can a client outsource a computation to servers, if the servers are not guaranteed to return the right answer? How can we use peripheral devices with our computers, when those devices may be malicious, given that commodity computers are designed to trust physically connected hardware?
Security Markings
RECORD
Collection: TRECMS