Abstract
In this chapter the state of the art with respect to proof based verifiable computing schemes is presented. In this setting a prover wants to convince a verifier of the correctness of a computed result. The first proof based solutions that achieve this were interactive proof systems. Depending on the computation power of the prover we distinguish here between proof based and argument based approaches. While all proof based schemes are interactive protocols, the argument based solutions were further improved, such that also non-interactive solutions are available. In this chapter, we first provide an introduction presenting the setting and the notions, i.e. quadratic span program (QSP), quadratic arithmetic program (QAP), and succinct non-interactive arguments of knowledge (SNARKs). Then, we present the interactive proof based solutions, i.e. “Verifiable Computation with Massively Parallel Interactive Proofs” by Thaler et al. and “Allspice” by Vu et al., and the argument based approaches, i.e. “Pepper” by Setty et al., “Ginger” by Setty et al., “Zaatar” by Setty et al., “Pantry” by Braun et al., and “River” by Xu et al. Afterwards, we present the definitions and solutions for the non-interactive argument based verifiable computing schemes, i.e. “Pinocchio” by Parno et al., “Geppetto” by Costello et al., “SNARKs for C” by Ben-Sasson et al., “Succinct Non-interactive Zero Knowledge for a von Neumann Architecture” by Ben-Sasson et al., “Buffet” by Wahby et al., “ADSNARK” by Backes et al., and “Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures” by Xu et al.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
S. Arora, S. Safra, Probabilistic checking of proofs: a new characterization of NP. J. ACM 45, 70–122 (1998)
L. Babai, L. Fortnow, L.A. Levin, M. Szegedy, Checking computations in polylogarithmic time, in Proceedings of the 23rd Annual ACM Symposium on Theory of Computing (1991), pp. 21–31
M. Backes, M. Barbosa, D. Fiore, R.M. Reischuk, ADSNARK: nearly practical and privacy-preserving proofs on authenticated data, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, 17–21 May 2015, pp. 271–286
E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, S.P. Vadhan, Short PCPs verifiable in polylogarithmic time, in 20th Annual IEEE Conference on Computational Complexity (CCC 2005) (2005), pp. 120–134
E. Ben-Sasson, O. Goldreich, P. Harsha, M. Sudan, S.P. Vadhan, Robust PCPs of proximity, shorter PCPs, and applications to coding. SIAM J. Comput. 36, 889–974 (2006)
E. Ben-Sasson, A. Chiesa, D. Genkin, E. Tromer, M. Virza, SNARKs for C: verifying program executions succinctly and in zero knowledge, in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings, Part II, Santa Barbara, CA, 18–22 August 2013, pp. 90–108
E. Ben-Sasson, A. Chiesa, E. Tromer, M. Virza, Succinct non-interactive zero knowledge for a von Neumann architecture, in Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, 20–22 August 2014, pp. 781–796
N. Bitansky, R. Canetti, A. Chiesa, E. Tromer, From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again, in Innovations in Theoretical Computer Science 2012, Cambridge, MA, 8–10 January 2012, pp. 326–349
N. Bitansky, A. Chiesa, Y. Ishai, R. Ostrovsky, O. Paneth, Succinct non-interactive arguments via linear interactive proofs, in TCC (2013), pp. 315–333
B. Braun, A.J. Feldman, Z. Ren, S.T.V. Setty, A.J. Blumberg, M. Walfish, Verifying computations with state, in ACM SIGOPS 24th Symposium on Operating Systems Principles, SOSP ’13, Farmington, PA, 3–6 November 2013, pp. 341–357
R. Canetti, B. Riva, G.N. Rothblum, Two protocols for delegation of computation, in Information Theoretic Security - 6th International Conference, ICITS 2012, Proceedings, Montreal, QC, 15–17 August 2012, pp. 37–61
C. Costello, C. Fournet, J. Howell, M. Kohlweiss, B. Kreuter, M. Naehrig, B. Parno, S. Zahur, Geppetto: versatile verifiable computation, in 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, 17–21 May 2015, pp. 253–270
A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems, in CRYPTO (1986), pp. 186–194
D. Fiore, A. Nitulescu, On the (in)security of SNARKs in the presence of oracles, in Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings, Part I, Beijing, 31 October–3 November 2016, pp. 108–138
R. Gennaro, C. Gentry, B. Parno, M. Raykova, Quadratic span programs and succinct NIZKs without PCPs, in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Athens, 26–30 May 2013, pp. 626–645
S. Goldwasser, S. Micali, C. Rackoff, The knowledge complexity of interactive proof systems. SIAM J. Comput. 18, 186–208 (1989)
S. Goldwasser, Y.T. Kalai, G.N. Rothblum, Delegating computation: interactive proofs for muggles, in Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, BC, 17–20 May 2008, pp. 113–122
http://cs.utexas.edu/pepper. Retrieved 18 Apr 2016
http://research.microsoft.com/verifcomp/. Retrieved 18 Apr 2016
https://github.com/scipr-lab/libsnark. Retrieved 18 Apr 2016
Y. Ishai, E. Kushilevitz, R. Ostrovsky, Efficient arguments without short PCPs, in 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), San Diego, CA, 13–16 June 2007, pp. 278–291
J. Kilian, A note on efficient zero-knowledge proofs and arguments (extended abstract), in Proceedings of the 24th Annual ACM Symposium on Theory of Computing, Victoria, BC, 4–6 May 1992, pp. 723–732
S. Micali, Computationally sound proofs. SIAM J. Comput. 30, 1253–1298 (2000)
B. Parno, J. Howell, C. Gentry, M. Raykova, Pinocchio: nearly practical verifiable computation, in 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, 19–22 May 2013, pp. 238–252
O. Reingold, G.N. Rothblum, R.D. Rothblum, Constant-round interactive proofs for delegating computation, in Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, Cambridge, MA, 18–21 June 2016, pp. 49–62
S.T.V. Setty, R. McPherson, A.J. Blumberg, M. Walfish, Making argument systems for outsourced computation practical (sometimes), in 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, CA, 5–8 February 2012
S.T.V. Setty, V. Vu, N. Panpalia, B. Braun, A.J. Blumberg, M. Walfish, Taking proof-based verified computation a few steps closer to practicality, in Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, 8–10 August 2012, pp. 253–268
S.T.V. Setty, B. Braun, V. Vu, A.J. Blumberg, B. Parno, M. Walfish, Resolving the conflict between generality and plausibility in verified computation, in Eighth Eurosys Conference 2013, EuroSys ’13, Prague, 14–17 April 2013, pp. 71–84
J. Thaler, Time-optimal interactive proofs for circuit evaluation, in Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings, Part II, Santa Barbara, CA, 18–22 August 2013, pp. 71–89
J. Thaler, M. Roberts, M. Mitzenmacher, H. Pfister, Verifiable computation with massively parallel interactive proofs, in 4th USENIX Workshop on Hot Topics in Cloud Computing, HotCloud’12, Boston, MA, 12–13 June 2012
V. Vu, S.T.V. Setty, A.J. Blumberg, M. Walfish, A hybrid architecture for interactive verifiable computation, in 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, 19–22 May 2013, pp. 223–237
R.S. Wahby, S.T.V. Setty, Z. Ren, A.J. Blumberg, M. Walfish, Efficient RAM and control flow in verifiable outsourced computation, in 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, CA, 8–11 February 2015
M. Walfish, A.J. Blumberg, Verifying computations without reexecuting them. Commun. ACM 58, 74–84 (2015)
G. Xu, G.T. Amariucai, Y. Guan, Verifiable computation with reduced informational costs and computational costs, in Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Proceedings, Part I, Wroclaw, 7–11 September 2014, pp. 292–309
G. Xu, G.T. Amariucai, Y. Guan, Block programs: improving efficiency of verifiable computation for circuits with repeated substructures, in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’15, Singapore, 14–17 April 2015, pp. 405–416
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Demirel, D., Schabhüser, L., Buchmann, J. (2017). Proof and Argument Based Verifiable Computing. In: Privately and Publicly Verifiable Computing Techniques. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-53798-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-53798-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53797-9
Online ISBN: 978-3-319-53798-6
eBook Packages: Computer ScienceComputer Science (R0)