Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

Free registration required

Executive Summary

Several trends are contributing to a growing desire to "Outsource" computing from a (Relatively) weak computational device to a more powerful computation service. For years, a variety of projects, including SETI@Home, Folding@Home, and the Mersenne prime search, has distributed computations to millions of clients around the Internet to take advantage of their idle cycles. A perennial problem is dishonest clients: end users who modify their client software to return plausible results without performing any actual work. Users commit such fraud, even when the only incentive is to increase their relative ranking on a website listing. Many projects cope with such fraud via redundancy; the same work unit is sent to several clients and the results are compared for consistency.

  • Format: PDF
  • Size: 174 KB