Verifiable computation schemes enable a client to outsource the computation of a function F on various inputs to an untrusted worker, and then verify the correctness of the returned results. Critically, the outsourcing and verification procedures must be more
efficient than performing the computation itself. The code included here implements the Pinocchio toolchain, as described in Pinocchio: Nearly Practical Verifiable Computation
at the IEEE Symposium on Security and Privacy, 2013.