Verifiable Computations with RAM-like Running Times

Current and emerging trends such as cloud computing, fog computing, and more recently, multi-access edge computing (MEC) increase the interest in finding solutions to the verifiable computation problem. Furthermore, the number of computationally weak devices have increased drastically in recent years due to the ongoing realization of the Internet of Things. This work proposes a solution which enjoys the following two desirable properties: (1) cost of input preparation and verification is very low (low enough to allow verifiable outsourcing of computations by resource-constrained devices on constrained networks); (2) the running time of the verifiable computation is RAM-like.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/27/2017

Big Data and Fog Computing

Fog computing serves as a computing layer that sits between the edge dev...
research
11/06/2017

ENGINE:Cost Effective Offloading in Mobile Edge Computing with Fog-Cloud Cooperation

Mobile Edge Computing (MEC) as an emerging paradigm utilizing cloudlet o...
research
09/19/2021

A Manifesto for Modern Fog and Edge Computing: Vision, New Paradigms, Opportunities, and Future Directions

The advancements in the use of Internet of Things (IoT) devices is incre...
research
07/31/2019

Machine Learning at the Network Edge: A Survey

Devices comprising the Internet of Things, such as sensors and small cam...
research
09/26/2022

Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing

The few resources available on devices restricted in Internet of Things ...
research
07/17/2018

SPOC: Secure Payments for Outsourced Computations

Constrained devices in IoT networks often require to outsource resource-...
research
05/30/2018

Privacy Aware Offloading of Deep Neural Networks

Deep neural networks require large amounts of resources which makes them...

Please sign up or login with your details

Forgot password? Click here to reset