#### Filter Results:

- Full text PDF available (14)

#### Publication Year

2004

2018

- This year (1)
- Last 5 years (15)
- Last 10 years (24)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

The cloud computing paradigm, which involves distributed computation on multiple large-scale datasets, will become successful only if it ensures privacy, confidentiality, and integrity for the dataâ€¦ (More)

- Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish
- IACR Cryptology ePrint Archive
- 2013

When a client outsources a job to a third party (e.g., the cloud), how can the client check the result, without re-executing the computation? Recent work in proof-based verifiable computation hasâ€¦ (More)

- Prince Mahajan, Srinath T. V. Setty, +4 authors Michael Walfish
- OSDI
- 2010

This article describes the design, implementation, and evaluation of Depot, a cloud storage system that minimizes trust assumptions. Depot tolerates buggy or malicious behavior by any number ofâ€¦ (More)

- Chris Hawblitzel, Jon Howell, +5 authors Brian Zill
- SOSP
- 2015

Distributed systems are notorious for harboring subtle bugs. Verification can, in principle, eliminate these bugs a priori, but verification has historically been difficult to apply at full-programâ€¦ (More)

- Srinath T. V. Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish
- IACR Cryptology ePrint Archive
- 2012

We describe GINGER, a built system for unconditional, general-purpose, and nearly practical verification of outsourced computation. GINGER is based on PEPPER, which uses the PCP theorem andâ€¦ (More)

- Victor Vu, Srinath T. V. Setty, Andrew J. Blumberg, Michael Walfish
- 2013 IEEE Symposium on Security and Privacy
- 2013

We consider interactive, proof-based verifiable computation: how can a client machine specify a computation to a server, receive an answer, and then engage the server in an interactive protocol thatâ€¦ (More)

- Barry Bond, Chris Hawblitzel, +6 authors Laure Thompson
- USENIX Security Symposium
- 2017

High-performance cryptographic code often relies on complex hand-tuned assembly language that is customized for individual hardware platforms. Such code is difficult to understand or analyze. Weâ€¦ (More)

This paper describes the design, implementation, and evaluation of a system for performing verifiable outsourced computation. It has long been known that (1) this problem can be solved in theoryâ€¦ (More)

- Srinath T. V. Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish
- IACR Cryptology ePrint Archive
- 2012

The area of proof-based verified computation (outsourced computation built atop probabilistically checkable proofs and cryptographic machinery) has lately seen renewed interest. Although recent workâ€¦ (More)