Efficient Generation of Program Execution Hash
Efficient Generation of Program Execution Hash
Blog Article
Distributed computing systems often require verifiable computing techniques in case their node is untrusted.To verify a node’s computation result, proof-of-work (PoW) is often utilized as a basis of verifiable computing method; however, this mechanism is only valid for computations producing results based on specific algorithm (e.g.
, AES decryption).To date, there is no efficient PoW mechanism applicable to arbitrary algorithm or a Stamping computation that does not produce any tangible output (e.g.
, void function).This paper proposes
Implementation was based on LLVM/Clang 6.0 and evaluation was based on open-source software, including GNU binutils/coreutils and Google’s OSSFuzz projects.