Certified Computation
نویسنده
چکیده
This paper introduces the notion of certified computation. A certified computation does not only produce a result r, but also a correctness certificate, which is a formal proof that r is correct. This can greatly enhance the credibility of the result: if we trust the axioms and inference rules that are used in the certificate, then we can be assured that r is correct. In effect, we obtain a trust reduction: we no longer have to trust the entire computation; we only have to trust the certificate. Typically, the reasoning used in the certificate is much simpler and easier to trust than the entire computation. Certified computation has two main applications: as a software engineering discipline, it can be used to increase the reliability of our code; and as a framework for cooperative computation, it can be used whenever a code consumer executes an algorithm obtained from an untrusted agent and needs to be convinced that the generated results are correct. We propose DPLs (Denotational Proof Languages) as a uniform platform for certified computation. DPLs enforce a sharp separation between logic and control and offer versatile mechanicms for constructing certificates. We use Athena as a concrete DPL to illustrate our ideas, and we present two examples of certified computation, giving full working code in both cases.
منابع مشابه
Distributed Outsourcing of Computation on Private Data∗ A Distributed Implementation of the Certified Information Access Service
In this paper we consider the problem of securely outsourcing computation on private data. We present a protocol for securely distributing the computation of the data structures used by current implementations of the Certified Information Access primitive. To this aim, we introduce the concept of a Verifiable Deterministic Envelope that may be of independent interest and of which we provide pra...
متن کاملDeductive Runtime Certification
This paper introduces a notion of certified computation whereby an algorithm not only produces a result r for a given input x, but also proves that r is a correct result for x. This can greatly enhance the credibility of the result: if we trust the axioms and inference rules that are used in the proof, then we can be assured that r is correct. Typically, the reasoning used in a certified comput...
متن کاملImprovement of Threshold Signature Using Self-certified Public Keys
A (t, n) threshold signature scheme allows any t or more signers to cooperatively sign messages on behalf of a group, but t − 1 or fewer signers cannot. Wu and Hsu recently proposed a new (t, n) threshold signature scheme using self-certified public keys. In their scheme, the authentication of the self-certified individual/group public keys can be confirmed simultaneously in the procedure of ve...
متن کاملControlled Physical Unknown Functions: Applications to Secure Smartcards and Certified Execution
A Physical Unknown Function (PUF) is a function that is easy to evaluate but hard to characterize. We introduce controlled physical unknown functions (CPUFs) which are PUFs that can only be accessed via an algorithm that is physically bound to the PUF in an inseparable way. Controlled PUFs enable several applications including certified execution, where a certificate is produced that proves tha...
متن کاملCertified Computation of Morse-Smale Complexes on Implicit Surfaces
The Morse-Smale complex is an important tool for global topological analysis in various problems in computational topology and data analysis. A certified algorithm for computing the Morse-Smale complexes has been presented for two-dimensional Morse-Smale systems in bounded planar domains [3]. In the current article we extend the approach in case of MorseSmale systems on two-dimensional manifold...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001