Running code on a machine you don't trust (was Re: Executing Encrypted Code)

solman at MIT.EDU solman at MIT.EDU
Sat Dec 21 21:44:29 PST 1996


There are several algorithms I've seen that allow for blind execution
of arbitrary code and verification of correctness given the usual
cryptographic assumptions. Their problem is that they are absurdly
inefficient. But their existence suggests the possibility of efficient
algorithms (or at least a good paper deriving lower bounds on the
complexity of such algorithms).

JWS






More information about the cypherpunks-legacy mailing list