May 16, 2013 – The Pinocchio source code is now available!<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"
Verifiable computation schemes enable a client to outsource the computation of a function F on various inputs to an untrusted worker, and then verify the correctness of the returned results. Critically, the outsourcing and verification procedures must be more efficient than performing the computation itself. In more detail, we introduce and formalize the notion of […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-170789","msr-project","type-msr-project","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"2011-08-24","related-publications":[164197,164198,167006,168179,238089,238237,314486,164144],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[{"id":0,"name":"External Collaborators","content":"
\r\n\r\n\r\n\u00a0<\/span><\/td>\r\n | \u00a0<\/span><\/td>\r\n | \u00a0<\/td>\r\n | \u00a0<\/span><\/td>\r\n | \u00a0<\/span><\/td>\r\n<\/tr>\r\n\r\n\u00a0Rosario Gennaro<\/a><\/td>\r\n | \u00a0Craig Gentry<\/a><\/td>\r\n | \u00a0Jon Howell<\/a><\/td>\r\n | \u00a0Mariana Raykova<\/a><\/td>\r\n | \u00a0Vinod Vaikuntanathan<\/a><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n\r\n\r\n \r\n\r\n \u00a0<\/a>\r\n\r\n<\/div>"}],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Antoine Delignat-Lavaud","user_id":31056,"people_section":"Group 1","alias":"antdl"},{"type":"user_nicename","display_name":"Craig Costello","user_id":31476,"people_section":"Group 1","alias":"craigco"},{"type":"user_nicename","display_name":"C\u00e9dric Fournet","user_id":31819,"people_section":"Group 1","alias":"fournet"},{"type":"user_nicename","display_name":"Michael Naehrig","user_id":32976,"people_section":"Group 1","alias":"mnaehrig"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170789"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":5,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170789\/revisions"}],"predecessor-version":[{"id":604362,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170789\/revisions\/604362"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=170789"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=170789"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=170789"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=170789"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=170789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}} | |