This repository contains snapshots of the Pepper system corresponding to previously published work.
These snapshots all rely on third party software. Consult the README in each tarball for more information on setting up your machine.
This file maps filenames to implemented systems. For the reverse mapping, see our website.
Srinath Setty, Richard McPherson, Andrew J. Blumberg, and Michael Walfish. "Making argument systems for outsourced computation practical (sometimes)." NDSS 2012.
( pdf )
Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, and Michael Walfish. "Taking proof-based verified computation a few steps closer to practicality." USENIX Security 2012.
( pdf | extended version )
Victor Vu, Srinath Setty, Andrew J. Blumberg, and Michael Walfish. "A hybrid architecture for interactive verifiable computation." Oakland 2013.
( pdf )
Srinath Setty, Benjamin Vraun, Victor Vu, Andrew J. Blumberg, Bryan Parno, and Michael Walfish. "Resolving the conflict between generality and plausibility in verified computation." EuroSys 2013.
( pdf | extended version )
Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish. "Verifying computations with state." SOSP 2013.
( pdf | extended version )
Note: The enhanced Pantry release includes additional refinements and optimizations. The results of these optimizations will soon be reported in an update to the extended version.
Riad S. Wahby, Srinath Setty, Zuocheng Ren, Andrew J. Blumberg, and Michael Walfish. "Efficient RAM and control flow in verifiable outsourced computation." To appear in Network & Distributed System Security Symposium, NDSS 2015, February 2015.
( pdf )