{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T17:39:42Z","timestamp":1767289182550,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1040672, 1055057, 1040083"],"award-info":[{"award-number":["1040672, 1055057, 1040083"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-10-1-0073"],"award-info":[{"award-number":["FA9550-10-1-0073"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2517349.2522733","type":"proceedings-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T13:27:04Z","timestamp":1381238824000},"page":"341-357","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":108,"title":["Verifying computations with state"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Braun","sequence":"first","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Ariel J.","family":"Feldman","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Zuocheng","family":"Ren","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Srinath","family":"Setty","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Andrew J.","family":"Blumberg","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Michael","family":"Walfish","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Cassandra CQL. http:\/\/cassandra.apache.org\/doc\/cql\/CQL.html.  Cassandra CQL. http:\/\/cassandra.apache.org\/doc\/cql\/CQL.html."},{"key":"e_1_3_2_2_2_1","unstructured":"High-speed software implementation of the optimal Ate pairing over Barreto-Naehrig curves. https:\/\/github.com\/herumi\/ate-pairing.  High-speed software implementation of the optimal Ate pairing over Barreto-Naehrig curves. https:\/\/github.com\/herumi\/ate-pairing."},{"key":"e_1_3_2_2_3_1","unstructured":"leveldb -- a fast and lightweight key\/value database library by Google. https:\/\/code.google.com\/p\/leveldb\/.  leveldb -- a fast and lightweight key\/value database library by Google. https:\/\/code.google.com\/p\/leveldb\/."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/581571.581573"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/278298.278306"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/273865.273901"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755695"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22192"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646761.706031"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422481"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033046"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_18"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1991.185352"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008698"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(88)90005-0"},{"key":"e_1_3_2_2_20_1","volume-title":"Dec.","author":"Braun B.","year":"2012","unstructured":"B. Braun . Compiling computations to constraints for verified computation. UT Austin Honors thesis HR-12-10 , Dec. 2012 . B. Braun. Compiling computations to constraints for verified computation. UT Austin Honors thesis HR-12-10, Dec. 2012."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046759"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090245"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_26"},{"key":"e_1_3_2_2_26_1","first-page":"107","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . MapReduce: simplified data processing on large clusters . In Symposium on Operating Systems Design and Implementation (OSDI) , pages 107 -- 113 , Dec. 2004 . J. Dean and S. Ghemawat. MapReduce: simplified data processing on large clusters. In Symposium on Operating Systems Design and Implementation (OSDI), pages 107--113, Dec. 2004."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/0-306-47008-X_9","volume-title":"Data and Application Security: Development and Directions","author":"Devanbu P.","year":"2002","unstructured":"P. Devanbu , M. Gertz , C. Martel , and S. G. Stubblebine . Authentic third-party data publication . In Data and Application Security: Development and Directions , pages 101 -- 112 . Springer , 2002 . P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine. Authentic third-party data publication. In Data and Application Security: Development and Directions, pages 101--112. Springer, 2002."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382250"},{"key":"e_1_3_2_2_29_1","first-page":"1","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Fu K.","year":"2000","unstructured":"K. Fu , M. F. Kaashoek , and D. Mazi\u00e8res . Fast and secure distributed read-only file system . In Symposium on Operating Systems Design and Implementation (OSDI) , pages 1 -- 24 , Oct. 2000 . K. Fu, M. F. Kaashoek, and D. Mazi\u00e8res. Fast and secure distributed read-only file system. In Symposium on Operating Systems Design and Implementation (OSDI), pages 1--24, Oct. 2000."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/822080.822806"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881445"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993651"},{"key":"e_1_3_2_2_34_1","first-page":"131","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Goh E.-J.","year":"2003","unstructured":"E.-J. Goh , H. Shacham , N. Modadugu , and D. Boneh . SiRiUS: securing remote untrusted storage . In Network and Distributed System Security Symposium (NDSS) , pages 131 -- 145 , Feb. 2003 . E.-J. Goh, H. Shacham, N. Modadugu, and D. Boneh. SiRiUS: securing remote untrusted storage. In Network and Distributed System Security Symposium (NDSS), pages 131--145, Feb. 2003."},{"key":"e_1_3_2_2_35_1","volume-title":"II Basic Applications","author":"Goldreich O.","year":"2004","unstructured":"O. Goldreich . Foundations of Cryptography : II Basic Applications . Cambridge University Press , 2004 . O. Goldreich. Foundations of Cryptography: II Basic Applications. Cambridge University Press, 2004."},{"key":"e_1_3_2_2_36_1","first-page":"236","article-title":"Collision-free hashing from lattice problems. Electronic Colloquium on Computational Complexity (ECCC)","volume":"96","author":"Goldreich O.","year":"1996","unstructured":"O. Goldreich , S. Goldwasser , and S. Halevi . Collision-free hashing from lattice problems. Electronic Colloquium on Computational Complexity (ECCC) , TR 96-042 : 236 -- 241 , 1996 . O. Goldreich, S. Goldwasser, and S. Halevi. Collision-free hashing from lattice problems. Electronic Colloquium on Computational Complexity (ECCC), TR96-042:236--241, 1996.","journal-title":"TR"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374396"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/646139.680794"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_2_41_1","volume-title":"June","author":"Ishai Y.","year":"2012","unstructured":"Y. Ishai . Personal communication , June 2012 . Y. Ishai. Personal communication, June 2012."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2007.10"},{"key":"e_1_3_2_2_43_1","first-page":"29","volume-title":"Conference on File and Storage Technologies (FAST)","author":"Kallahalla M.","year":"2003","unstructured":"M. Kallahalla , E. Riedel , R. Swaminathan , Q. Wang , and K. Fu . Plutus: scalable secure file sharing on untrusted storage . In Conference on File and Storage Technologies (FAST) , pages 29 -- 42 , Mar. 2003 . M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: scalable secure file sharing on untrusted storage. In Conference on File and Storage Technologies (FAST), pages 29--42, Mar. 2003."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1206501"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/129712.129782"},{"key":"e_1_3_2_2_46_1","volume-title":"Digital Press","author":"Levy H. M.","year":"1984","unstructured":"H. M. Levy . Capability-Based Computer Systems . Digital Press , 1984 . H. M. Levy. Capability-Based Computer Systems. Digital Press, 1984."},{"key":"e_1_3_2_2_47_1","first-page":"121","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Li J.","year":"2004","unstructured":"J. Li , M. N. Krohn , D. Mazi\u00e8res , and D. Shasha . Secure untrusted data repository (SUNDR) . In Symposium on Operating Systems Design and Implementation (OSDI) , pages 121 -- 136 , Dec. 2004 . J. Li, M. N. Krohn, D. Mazi\u00e8res, and D. Shasha. Secure untrusted data repository (SUNDR). In Symposium on Operating Systems Design and Implementation (OSDI), pages 121--136, Dec. 2004."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/146585.146605"},{"key":"e_1_3_2_2_49_1","first-page":"135","volume-title":"Symposium on Operating Systems Design and Implementation (OSDI)","author":"Maheshwari U.","year":"2000","unstructured":"U. Maheshwari , R. Vingralek , and W. Shapiro . How to build a trusted database system on untrusted storage . In Symposium on Operating Systems Design and Implementation (OSDI) , pages 135 -- 150 , Oct. 2000 . U. Maheshwari, R. Vingralek, and W. Shapiro. How to build a trusted database system on untrusted storage. In Symposium on Operating Systems Design and Implementation (OSDI), pages 135--150, Oct. 2000."},{"key":"e_1_3_2_2_50_1","first-page":"287","volume-title":"USENIX Security","author":"Malkhi D.","year":"2004","unstructured":"D. Malkhi , N. Nisan , B. Pinkas , and Y. Sella . Fairplay---a secure two-party computation system . In USENIX Security , pages 287 -- 302 , Aug. 2004 . D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay---a secure two-party computation system. In USENIX Security, pages 287--302, Aug. 2004."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050050"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1076-8"},{"key":"e_1_3_2_2_53_1","first-page":"369","volume-title":"IACR International Cryptology Conference (CRYPTO)","author":"Merkle R. C.","year":"1987","unstructured":"R. C. Merkle . A digital signature based on a conventional encryption function . In IACR International Cryptology Conference (CRYPTO) , pages 369 -- 378 , Aug. 1987 . R. C. Merkle. A digital signature based on a conventional encryption function. In IACR International Cryptology Conference (CRYPTO), pages 369--378, Aug. 1987."},{"key":"e_1_3_2_2_54_1","first-page":"147","volume-title":"Post-quantum Cryptography","author":"Micciancio D.","year":"2008","unstructured":"D. Micciancio and O. Regev . Lattice-based cryptography . In D. J. Bernstein and J. Buchmann, editors, Post-quantum Cryptography , pages 147 -- 191 . Springer , 2008 . D. Micciancio and O. Regev. Lattice-based cryptography. In D. J. Bernstein and J. Buchmann, editors, Post-quantum Cryptography, pages 147--191. Springer, 2008."},{"key":"e_1_3_2_2_55_1","first-page":"103","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Monrose F.","year":"1999","unstructured":"F. Monrose , P. Wycko , and A. D. Rubin . Distributed execution with remote audit . In Network and Distributed System Security Symposium (NDSS) , pages 103 -- 113 , Feb. 1999 . F. Monrose, P. Wycko, and A. D. Rubin. Distributed execution with remote audit. In Network and Distributed System Security Symposium (NDSS), pages 103--113, Feb. 1999."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.39"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_13"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.47"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2060078"},{"key":"e_1_3_2_2_61_1","first-page":"129","volume-title":"IACR International Cryptology Conference (CRYPTO)","author":"Pedersen T. P.","year":"1991","unstructured":"T. P. Pedersen . Non-interactive and information-theoretic secure verifiable secret sharing . In IACR International Cryptology Conference (CRYPTO) , pages 129 -- 140 , Aug. 1991 . T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In IACR International Cryptology Conference (CRYPTO), pages 129--140, Aug. 1991."},{"key":"e_1_3_2_2_62_1","first-page":"335","volume-title":"USENIX Security","author":"Popa R. A.","year":"2009","unstructured":"R. A. Popa , H. Balakrishnan , and A. Blumberg . VPriv: Protecting privacy in location-based vehicular services . In USENIX Security , pages 335 -- 350 , Aug. 2009 . R. A. Popa, H. Balakrishnan, and A. Blumberg. VPriv: Protecting privacy in location-based vehicular services. In USENIX Security, pages 335--350, Aug. 2009."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"e_1_3_2_2_64_1","volume-title":"Workshop on Hot Topics in Operating Systems (HotOS)","author":"Setty S.","year":"2011","unstructured":"S. Setty , A. J. Blumberg , and M. Walfish . Toward practical and unconditional verification of remote computations . In Workshop on Hot Topics in Operating Systems (HotOS) , May 2011 . S. Setty, A. J. Blumberg, and M. Walfish. Toward practical and unconditional verification of remote computations. In Workshop on Hot Topics in Operating Systems (HotOS), May 2011."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465359"},{"key":"e_1_3_2_2_66_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Setty S.","year":"2012","unstructured":"S. Setty , R. McPherson , A. J. Blumberg , and M. Walfish . Making argument systems for outsourced computation practical (sometimes) . In Network and Distributed System Security Symposium (NDSS) , Feb. 2012 . S. Setty, R. McPherson, A. J. Blumberg, and M. Walfish. Making argument systems for outsourced computation practical (sometimes). In Network and Distributed System Security Symposium (NDSS), Feb. 2012."},{"key":"e_1_3_2_2_67_1","first-page":"253","volume-title":"USENIX Security","author":"Setty S.","year":"2012","unstructured":"S. Setty , V. Vu , N. Panpalia , B. Braun , A. J. Blumberg , and M. Walfish . Taking proof-based verified computation a few steps closer to practicality . In USENIX Security , pages 253 -- 268 , Aug. 2012 . S. Setty, V. Vu, N. Panpalia, B. Braun, A. J. Blumberg, and M. Walfish. Taking proof-based verified computation a few steps closer to practicality. In USENIX Security, pages 253--268, Aug. 2012."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/146585.146609"},{"key":"e_1_3_2_2_70_1","first-page":"601","volume-title":"International Conference on Very Large Databases (VLDB)","author":"Sion R.","year":"2005","unstructured":"R. Sion . Query execution assurance for outsourced databases . In International Conference on Very Large Databases (VLDB) , pages 601 -- 612 , Aug. 2005 . R. Sion. Query execution assurance for outsourced databases. In International Conference on Very Large Databases (VLDB), pages 601--612, Aug. 2005."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_5"},{"key":"e_1_3_2_2_72_1","volume-title":"USENIX HotCloud Workshop","author":"Thaler J.","year":"2012","unstructured":"J. Thaler , M. Roberts , M. Mitzenmacher , and H. Pfister . Verifiable computation with massively parallel interactive proofs . In USENIX HotCloud Workshop , June 2012 . J. Thaler, M. Roberts, M. Mitzenmacher, and H. Pfister. Verifiable computation with massively parallel interactive proofs. In USENIX HotCloud Workshop, June 2012."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_11"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.48"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935305"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.40"},{"key":"e_1_3_2_2_77_1","unstructured":"L. Zhou. Personal communication Oct. 2012.  L. Zhou. Personal communication Oct. 2012."}],"event":{"name":"SOSP '13: ACM SIGOPS 24th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Farminton Pennsylvania","acronym":"SOSP '13"},"container-title":["Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517349.2522733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:53Z","timestamp":1750231733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":75,"alternative-id":["10.1145\/2517349.2522733","10.1145\/2517349"],"URL":"https:\/\/doi.org\/10.1145\/2517349.2522733","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}