发明名称 Verifying work performed by untrusted computing nodes
摘要 Techniques for verifying work performed by untrusted computing nodes are provided. A central computing system determines a first computation that is to be performed, at least in part, by a first untrusted computing node. The central computing system also determines a transformation function that is applied to the first computation to produce an equivalent second computation that is to be performed, at least in part, by a second untrusted computing node. The central computing system assigns the first computation to the first untrusted computing node and the second computation to the second untrusted computing node while keeping the transformation function secret. The central computing system receives a first result for the first computation and a second result for the second computation. The central computing system analyzes the first and second results to verify the work performed by the first and second untrusted computing nodes.
申请公布号 US8881275(B2) 申请公布日期 2014.11.04
申请号 US201314084413 申请日期 2013.11.19
申请人 Empire Technology Development LLC 发明人 Stephens, Jr. James H.
分类号 G06F11/00;H04L29/08;H04L12/26 主分类号 G06F11/00
代理机构 Maschoff Brennan 代理人 Maschoff Brennan
主权项 1. A method for a computing system to verify work performed by two or more untrusted computing nodes, the method comprising: determining, at the computing system, a first computation; applying, at the computing system by one or more processors, a transformation function to the first computation to produce a second computation that is different from the first computation; assigning, at the computing system, the first computation to be performed by a first untrusted computing node; assigning, at the computing system, the second computation to be performed by a second untrusted computing node while keeping the transformation function secret from the first untrusted computing node and the second untrusted computing node; receiving, at the computing system, a first result for the first computation determined by the first untrusted computing node and a second result for the second computation determined by the second untrusted computing node; analyzing, at the computing system by one of the one or more processors, the first and second results to verify the work performed by the first and second untrusted computing nodes; storing, at the computing system, the first result and the second result in a storage unit that includes results from past computations performed by the first and second untrusted computing nodes; and determining, at the computing system by one of the one or more processors, whether the first and second untrusted computing nodes are deemed to be trustworthy based on total results for each of the first and second untrusted computing nodes stored in the storage unit, wherein the first and second untrusted computing nodes are deemed to be trustworthy in response to a majority of the total results for each of the first and second untrusted computing nodes being valid, and wherein the first and second untrusted computing nodes are deemed to not likely be trustworthy in response to the majority of the total results for each of the first and second untrusted computing nodes being invalid.
地址 Wilmington DE US