DeAI: decentralized artificial intelligence
  • Introduction
    • General Terminology
  • Landscape
    • Data Providers
    • Computing Power
    • Model Training Task
    • Challenges
  • Privacy Preservation
    • Data Process
    • Privacy Preserved Training
    • Federated Learning
    • Cryptographic Computation
      • Homomorphic encryption
      • Multi-Party Computation
      • Trusted Execution Environment
    • Challenges
  • Security
    • Data Poisoning
    • Model Poisoning
    • Sybil Attacks
    • Impact of Large Models
    • Responsibility
  • Incentive mechanisms
    • Problem Formulation
    • Contribution Evaluation
    • Copyright
  • Verification of Computation
    • Computation on Smart Contract
    • Zero-Knowledge Proof
    • Blockchain Audit
    • Consensus Protocol
  • Network Scalability
    • Local Updating
    • Cryptography Protocol
    • Distribution Topology
    • Compression
    • Parameter-Efficient Fine Tuning
  • Conclusion
Powered by GitBook
On this page

Verification of Computation

In the decentralized infrastructure of DeAI, computing resources often come from untrusted third parties. Consequently, the verification of computations becomes imperative to ensure the integrity of the process, safeguarding against instances where remote computing nodes might produce erroneous or even deliberately falsified results. Failure to verify computations not only risks rewarding malicious nodes undeservedly but also poses threats to the integrity of the entire model training process, including vulnerabilities to sybil attacks and poisoning attacks.

While some studies have delved into the realm of verifiable computing, these investigations may not encompass the latest advancements following the emergence of blockchain technology and cryptographic techniques. Incorporating insights from these domains could yield novel solutions capable of addressing the evolving challenges within decentralized AI ecosystems, ensuring the robustness and trustworthiness of computations conducted by remote nodes.

PreviousCopyrightNextComputation on Smart Contract

Last updated 11 months ago