Presentations
-
Practical proof systems: implementations, applications, and next steps [pdf (4.2 MB), video]
Presented at the Workshop on Probabilistically Checkable and Interactive Proof Systems, part of the Simons Institute Program on Proofs, Consensus, and Decentralizing Society, September, 2019.
-
Doubly-efficient zkSNARKs Without Trusted Setup
Security & Privacy (Oakland), May 2018 [pdf (1.2 MB), video]
-
Full accounting for verifiable outsourcing
ACM CCS, October 2017 [pdf (2.7 MB), video]
Also presented at DIMACS Workshop on Outsourcing Computation Securely, July 2017 [pdf (2.6 MB), video]
-
Verifiable ASICs
Security & Privacy (Oakland), May 2016 [pdf (2.2 MB), video]
A slightly longer version of this talk appeared at the DIMACS/MACS Workshop on Cryptography in the RAM Model of Computation, June 2016 [pdf (3.2 MB)]
-
(Implementations of) verifiable computation and succinct arguments: survey and wishlist
(This talk surveys
the last few years of progress on (implementations of) protocols for verifiable
computation and closely related
problems, such as succinct non-interactive (zero knowledge)
arguments. Watching the talk is likely to be an efficient way to
begin a literature search and to get pointers to research
questions for the area.)
Simons Institute: Securing Computation, June 2015 [pptx (1.1 MB),
video]
-
Efficient RAM and control flow in verifiable outsourced computation
NDSS, February 2015 [pdf (351 kB)]
-
Verifying computations with state
SOSP, November 2013 [pdf (243 kB),
key (773 kB)]
-
Verifying remote executions: from wild implausibility to near practicality
Keynote at HotDep, November 2013 [pptx (5 MB)]
-
Making verifiable computation a systems problem
Microsoft Research Faculty Summit, July 2013 [pptx (2.7 MB),
video]
-
A hybrid architecture for interactive verifiable computation
Security & Privacy (Oakland), May 2013 [pptx (906 kB)]
-
Resolving the conflict between generality and plausibility in verified computation
EuroSys, April 2013 [pdf (182 kB),
key (590 kB)]
-
Taking proof-based verified computation a few steps closer to practicality
Security, August 2012 [pdf (corrected, 126 kB)]
-
Making argument systems for outsourced computation practical (sometimes)
NDSS, February 2012 [pdf (12 MB),
pptx (673 kB)]