Introduction to Verifiable Computing

Introduction to Verifiable Computing

14:30 - 16:00 Saturday 9th April 2022 BST

Beginner

Intermediate

Often it’s desirable for a client to outsource some work to a server. Sometimes the client needs to verify that the server executed the required computation correctly. A trivial solution would be for the client to re-run the computation and compare the results, but in most cases that would defeat the purpose of outsourcing to the server in the first place. Sometimes such direct verification is even impossible because the client submits only part of the input data and the server is not allowed to share the remaining inputs. It turns out, there are cryptographic tools that can be used in such scenarios, and in this session we will have a first look at some of them.

image

Ahto Truu

During his three decades in the ICT industry, Ahto has worked in hardware installations and user support, as a software developer and architect, as a systems analyst and research engineer. Currently he is busy helping Guardtime’s customers preserve the integrity of their important data. Outside his day job he organizes programming competitions for Estonia’s high school students. He has also taught programming classes and written programming columns for local popular science magazines.





Your Privacy

By clicking "Accept Non-Essential Cookies" you agree ACCU can store non-essential cookies on your device and disclose information in accordance with our Privacy Policy and Cookie Policy.

Current Setting: Non-Essential Cookies REJECTED


By clicking "Include Third Party Content" you agree ACCU can forward your IP address to third-party sites (such as YouTube) to enhance the information presented on this site, and that third-party sites may store cookies on your device.

Current Setting: Third Party Content EXCLUDED



Settings can be changed at any time from the Cookie Policy page.