A short report on:∗ Pinocchio: Nearly Practical Verifiable Computation
نویسندگان
چکیده
In this report, we aim to present a short description on the Pinocchio which is an efficient solution for Verifiable Computations (VC) and presented by Parno, Howell, Gentry, and Raykova in 2013 IEEE Symposium on Security and Privacy [PHGR13]. In fact, Pinocchio is a practical implementation of SNARKs (Succinct non-interactive argument of knowledge) which are systems that allow a client to ask a server or cloud to compute F (x) for a given function F and an input x and then verify the correctness of the returned result in considerably less time than it would take to compute F from scratch; this property is also known as VC. In addition, Pinocchio supports zeroknowledge property, in which the server convinces the client that it knows an input with a particular property, without revealing any information about the input. Pinocchio takes a high-level C program and compiles it to a low-level logic circuit and then encodes the logic circuit to a quadratic program; And after that, it compiles the quadratic program to a cryptographic verification protocol. In this report, we mainly focus on encoding a logic circuit to a quadratic program and compiling it to a cryptographic verification protocol, which consists in systems-level improvements and brings time down 5-7 order of magnitude, which will be discussed in 7 practical applications.
منابع مشابه
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation
Pinocchio is a practical zk-SNARK that allows a prover to perform cryptographically verifiable computations with verification effort potentially less than performing the computation itself. A recent proposal showed how to make Pinocchio adaptive (or “hash-and-prove”), i.e., to enable proofs with respect to computation-independent commitments. This enables computations to be chosen after the com...
متن کاملTrinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
Verifiable computation allows a client to outsource computations to a worker with a cryptographic proof of correctness of the result that can be verified faster than performing the computation. Recently, the Pinocchio system achieved faster verification than computation in practice for the first time. Unfortunately, Pinocchio and other efficient verifiable computation systems require the client...
متن کاملTrinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation
Verifiable computation allows a client to outsource computations to a worker with a cryptographic proof of correctness of the result that can be verified faster than performing the computation. Recently, the Pinocchio system achieved faster verification than computation in practice for the first time. Unfortunately, Pinocchio and other efficient verifiable computation systems require the client...
متن کاملEmbedded Proofs for Verifiable Neural Networks
The increasing use of machine learning algorithms to deal with large amount of data and the expertise required by these algorithms lead users to outsource machine learning services. This raises a trust issue about their result when executed in an untrusted environment. Verifiable computing (VC) tackles this issue and provides computational integrity for an outsourced computation, although the b...
متن کاملA Note on the Unsoundness of vnTinyRAM's SNARK
Gennaro, Gentry, Parno, and Raykova (GGPR) introduced Quadratic Arithmetic Programs (QAPs) as a way of representing arithmetic circuits in a form amendable to highly efficient cryptographic protocols [11], particularly for verifiable computation and succinct non-interactive arguments [12]. Subsequently, Parno, Gentry, Howell, and Raykova introduced an improved cryptographic protocol (and implem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016