Introduction to Verifiable Computing
14:30 - 16:00 Saturday 9th April 2022 BST
Beginner
Intermediate
Often it’s desirable for a client to outsource some work to a server. Sometimes the client needs to verify that the server executed the required computation correctly. A trivial solution would be for the client to re-run the computation and compare the results, but in most cases that would defeat the purpose of outsourcing to the server in the first place. Sometimes such direct verification is even impossible because the client submits only part of the input data and the server is not allowed to share the remaining inputs. It turns out, there are cryptographic tools that can be used in such scenarios, and in this session we will have a first look at some of them.
Ahto Truu
During his three decades in the ICT industry, Ahto has worked in hardware installations and user support, as a software developer and architect, as a systems analyst and research engineer. Currently he is busy helping Guardtime’s customers preserve the integrity of their important data. Outside his day job he organizes programming competitions for Estonia’s high school students. He has also taught programming classes and written programming columns for local popular science magazines.