
266
Big Data: Storage, Sharing, and Security
10.5.2 Verifiable computation
10.5.2.1 Introduction
Imagine that, as in the previous section, we own a computationally weak computer and wish to
outsource some work to a server that we do not trust. Unlike the FHE scenario though, suppose
we now do not care about the confidentiality of the data (perhaps these data are not sensitive),
but we do care that the work is done correctly.
There are a number of ways that one might approach this without using cryptographic tools.
The most straightforward approach is replication—outsourcing the computation to several
different servers and then taking the most common