首页> 外文期刊>Electronic Colloquium on Computational Complexity >Verifying computations without reexecuting them: from theoretical possibility to near-practicality
【24h】

Verifying computations without reexecuting them: from theoretical possibility to near-practicality

机译:验证计算而无需重新执行它们:从理论可能性到接近实际

获取原文
           

摘要

How can we trust results computed by a third party, or the integrity of data stored by such a party? This is a classic question in systems security, and it is particularly relevant in the context of cloud computing.Various solutions have been proposed that make assumptions about the class of computations, the failure modes of the performing computer, etc. However, deep results in theoretical computer science - interactive proofs, probabilistically checkable proofs (PCPs) coupled with cryptographic commitments, etc. -- tell us that a fully general solution exists that makes no assumptions about the third party: the local computer can check the correctness of a remotely executed computation by inspecting a proof returned by the third party. The rub is practicality: if implemented naively, the theory would be preposterously expensive (e.g., trillions of CPU-years or more to verify simple computations).Over the last several years, a number of projects have reduced this theory to near-practice in the context of implemented systems; we call this field _proof-based verifiable computation_. The pace of progress has been rapid, and there have been many exciting developments. This paper covers the high-level problem, the theory that solves the problem in principle, the work required to bring this theory to near-practicality, the various projects in the area, and open questions. Many of these questions cut across multiple sub-disciplines of computer science: complexity theory, cryptography, systems, parallel programming, and programming languages.[Note: this survey, which is about applying complexity-theoretic and cryptographic machinery, is written for a general computer science audience. However, we feel that it may be of interest to the ECCC community, so we are posting it here.]
机译:我们如何信任第三方计算的结果或该第三方存储的数据的完整性?这是系统安全中的一个经典问题,在云计算的环境中尤为重要。已经提出了各种解决方案,它们对计算的类别,性能计算机的故障模式等进行了假设。理论计算机科学-交互式证明,概率性可证明(PCP)以及加密承诺等-告诉我们,存在一种完全通用的解决方案,无需对第三方进行任何假设:本地计算机可以检查远程执行的正确性通过检查第三方返回的证明进行计算。碰到的是实用性:如果天真地实施,那么该理论将非常昂贵(例如,数万亿个CPU年或更多的时间来验证简单的计算)。在过去的几年中,许多项目已将该理论简化为在实践中的应用。实施系统的背景;我们将此字段称为“基于证明的可验证计算”。进步的步伐一直很快,并且出现了许多令人兴奋的发展。本文涵盖了高层问题,原则上解决问题的理论,使该理论接近实际所需的工作,该领域的各种项目以及未解决的问题。其中许多问题涉及计算机科学的多个子学科:复杂性理论,密码学,系统,并行编程和编程语言。[注:此调查是关于应用复杂性理论和加密机制的,是为一般性的计算机科学的受众。但是,我们认为ECCC社区可能对此很感兴趣,因此我们将其发布在此处。]

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号