Inferix Decentralized GPU
  • Overview
  • Tokenomics
  • Introduction
    • Rendering network using crowdsourced GPU
    • Rendering verification problem
  • Decentralized visual computing
    • Client Apps plugin
    • Client API and SDK
    • Manager node
    • Worker node
    • Decentralized storage
      • Data categories
      • Multi-level 3D polygon data
      • Polygon digester
      • Decentralized storage
      • Decentralized cache
    • Data security with FHE and TEE
      • Verifier data security enhancement with FHE
      • Worker and Manager data security enhancement with FHE
    • Decentralized federated AI
      • Federated learning with TensorOpera
      • Meta LLaMA
      • Stable Diffusion
      • Other AI models
      • Inferix AI
  • Inferix Testnet 1
    • Inferix GPU Solutions
    • Adding GPUs to the Network
    • Renting GPU Devices
    • GPU Staking
  • Future development
    • PoR and NFT minting for graphics creative assets
    • ZKP and PoR communication
    • Inferix RemotePC
    • Rendering professional network
  • Terms of Service
    • Privacy Policy
    • Airdrop Terms of Service
Powered by GitBook
On this page
  1. Decentralized visual computing
  2. Data security with FHE and TEE

Verifier data security enhancement with FHE

PreviousData security with FHE and TEENextWorker and Manager data security enhancement with FHE

Last updated 4 months ago

Verifier is the component that receives the least amount of data among the three main components of the Inferix network. The input data for a Verifier includes a random subset of the rendering job's output along with the algorithm and key to verify it. Rendering jobs that do not require high data security will be executed by standard Verifiers. Otherwise, those that require high data security will be executed by secure Verifiers. Inferix uses Fully Homomorphic Encryption (FHE) , , technology on secure Verifiers to ensure that end-user data is completely protected from leakage. The hardware requirements for secure Verifiers are higher than those for standard Verifiers, and specifically, these nodes must be equipped with GPUs.

Rendering flow with PoR and FHE

Figure illustrates the operation of the PoR algorithm combined with FHE. All information related to the verifying task including the rendering output data and verification key is encrypted using FHE and sent back to Manager node. The verification result is then sent back to the Manager node for review, while the Verifier remains completely unaware of the content of the verification process or the verification result.

[5]
[6]
[24]