-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathtalks.htm
More file actions
154 lines (151 loc) · 8.34 KB
/
talks.htm
File metadata and controls
154 lines (151 loc) · 8.34 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<meta name="keywords" content="verifiable,verified,verified computation,verifiable compuation,outsourced computation,third-party computing,PCP,probabilistically-checkable proofs,arguments,interactive proofs,IPs" />
<link href="https://fonts.googleapis.com/css?family=Roboto" rel="stylesheet">
<link rel="stylesheet" type="text/css" href="bootstrap/css/bootstrap.css" />
<link rel="stylesheet" type="text/css" href="index.css" />
<title>Pepper: toward practical verifiable computation</title>
</head>
<body>
<div id="wrap">
<div class="container">
<!--fixed navbar on top of the page-->
<div class="navbar navbar-inverse navbar-fixed-top">
<div class="container">
<div class="navbar-header">
<a class="navbar-brand" href="index.htm">
<span>Pepper: toward practical verifiable computation</span>
</a>
</div>
</div>
</div>
</div>
<div class="container">
<div class="row">
<div class="sidebar col-xs-3">
<div class="container">
<ul id="nav-tab" class="nav sidenav affix">
<li class="">
<a class="tab-toggle" href="index.htm">Home</a>
</li>
<li>
<a class="collapse-toggle" href="what-is-pepper.htm">About <span class="down-caret"></span></a>
<ul id="about-collapse" class="collapse">
<li class=""><a class="tab-toggle" href="what-is-pepper.htm">What is Pepper?</a></li>
<li class=""><a class="tab-toggle" href="our-approach.htm">Approach and research</a></li>
<li class=""><a class="tab-toggle" href="summary-results.htm">Summary of results</a></li>
<li class=""><a class="tab-toggle" href="summary-systems.htm">Built systems</a></li>
<li class=""><a class="tab-toggle" href="summary-perf.htm">Performance</a></li>
</ul>
</li >
<li class=""><a class="tab-toggle" href="publications.htm">Publications</a></li>
<li class="active"><a class="tab-toggle" href="talks.htm">Presentations</a></li>
<li class=""><a class="tab-toggle" href="tutorials.htm">Tutorials and exercises</a></li>
<li class=""><a class="tab-toggle" href="people.htm">People</a></li>
<li class=""><a class="tab-toggle" href="related.htm">Related projects</a></li>
<li class=""><a class="tab-toggle" href="source.htm">Source code</a></li>
<li class=""><a class="tab-toggle" href="funding.htm">Funding and support</a></li>
<li class=""><a class="tab-toggle" href="contact.htm">Contact</a></li>
</ul>
</div>
</div>
<!--content for each tab -->
<div class="tab-content col-xs-9">
<div class="my-tab-pane" id="talks">
<div class="content">
<h2>Presentations</h2>
<ul class="list-group">
<li class="list-group-item">
<b>Practical proof systems: implementations, applications, and next steps</b> [<a href="simons-vc-survey.pdf">pdf</a> (4.2 MB), <a href="https://www.youtube.com/watch?v=roRPgh4bQMI">video</a>]
<br/>
Presented at the <a href="https://simons.berkeley.edu/workshops/proofs2019-1">Workshop on Probabilistically Checkable and Interactive Proof Systems</a>, part of the <a href="https://simons.berkeley.edu/programs/proofs2019">Simons Institute Program on Proofs, Consensus, and Decentralizing Society</a>, September, 2019.
</li>
<li class="list-group-item">
<b>Doubly-efficient zkSNARKs Without Trusted Setup</b>
<br/>
Security & Privacy (Oakland), May 2018 [<a href="hyrax-oakland18-talk.pdf">pdf (1.2 MB)</a>, <a href="https://www.youtube.com/watch?v=yq2AfLlMww0">video</a>]
</li>
<li class="list-group-item">
<b>Full accounting for verifiable outsourcing</b>
<br/>
ACM CCS, October 2017 [<a href="giraffe-ccs17-talk.pdf">pdf (2.7 MB)</a>, <a href="https://www.youtube.com/watch?v=uU9noMY3OR0">video</a>]
<br/>
Also presented at <a href="http://dimacs.rutgers.edu/Workshops/Outsourcing/">DIMACS Workshop on Outsourcing Computation Securely</a>, July 2017 [<a href="giraffe-dimacs_outsourcing17-talk.pdf">pdf (2.6 MB)</a>, <a href="https://www.youtube.com/watch?v=RCzcF0niZGI">video</a>]
</li>
<li class="list-group-item">
<b>Verifiable ASICs</b>
<br/>
Security & Privacy (Oakland), May 2016 [<a href="zebra-oakland16-talk.pdf">pdf (2.2 MB)</a>, <a href="https://www.youtube.com/watch?v=Wr0QiNatBdE">video</a>]
<br/>
A slightly longer version of this talk appeared at the <a href="http://dimacs.rutgers.edu/Workshops/RAM/">DIMACS/MACS Workshop on Cryptography in the RAM Model of Computation</a>, June 2016 [<a href="zebra-dimacs_ram_model16-talk.pdf">pdf (3.2 MB)</a>]
</li>
<li class="list-group-item">
<b>(Implementations of) verifiable computation and succinct arguments: survey and wishlist</b>
<br/>
(<span class="text-emphasis">This talk surveys
the last few years of progress on (implementations of) protocols for verifiable
computation and closely related
problems, such as succinct non-interactive (zero knowledge)
arguments. Watching the talk is likely to be an efficient way to
begin a literature search and to get pointers to research
questions for the area.</span>)
<br/>
Simons Institute: Securing Computation, June 2015 [<a href="surveywishlist.pptx">pptx (1.1 MB)</a>,
<a href="http://simons.berkeley.edu/talks/mike-walfish-2015-06-10">video</a>]
</li>
<li class="list-group-item">
<b>Efficient RAM and control flow in verifiable outsourced computation</b>
<br/>
NDSS, February 2015 [<a href="buffet-ndss15-talk.pdf">pdf (351 kB)</a>]
</li>
<li class="list-group-item">
<b>Verifying computations with state</b>
<br/>
SOSP, November 2013 [<a href="pantry-sosp13-talk.pdf">pdf (243 kB)</a>,
<a href="pantry-sosp13-talk.key">key (773 kB)</a>]
</li>
<li class="list-group-item">
<b>Verifying remote executions: from wild implausibility to near practicality</b>
<br/>
Keynote at HotDep, November 2013 [<a href="hotdep13-keynote.pptx">pptx (5 MB)</a>]
</li>
<li class="list-group-item">
<b>Making verifiable computation a systems problem</b>
<br/>
Microsoft Research Faculty Summit, July 2013 [<a href="msrfs.pptx">pptx (2.7 MB)</a>,
<a href="http://research.microsoft.com/apps/video/dl.aspx?id=199523">video</a>]
</li>
<li class="list-group-item">
<b>A hybrid architecture for interactive verifiable computation</b>
<br/>
Security & Privacy (Oakland), May 2013 [<a href="allspice-oakland13.pptx">pptx (906 kB)</a>]
</li>
<li class="list-group-item">
<b>Resolving the conflict between generality and plausibility in verified computation</b>
<br/>
EuroSys, April 2013 [<a href="zaatar-eurosys13-talk.pdf">pdf (182 kB)</a>,
<a href="zaatar-eurosys13-talk.key">key (590 kB)</a>]
</li>
<li class="list-group-item">
<b>Taking proof-based verified computation a few steps closer to practicality</b>
<br/>
Security, August 2012 [<a href="ginger-usec12-talk-v2.pdf">pdf (corrected, 126 kB)</a>]
</li>
<li class="list-group-item">
<b>Making argument systems for outsourced computation practical (sometimes)</b>
<br/>
NDSS, February 2012 [<a href="pepper-ndss12-talk.pdf">pdf (12 MB)</a>,
<a href="pepper-ndss12-talk.pptx">pptx (673 kB)</a>]
</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
<script type="text/javascript" src="js/jquery.min.js"></script>
<script type="text/javascript" src="bootstrap/js/bootstrap.js" ></script>
</body>
</html>