发明名称 VERIFYING WORK PERFORMED BY UNTRUSTED COMPUTING NODES
摘要 <p>Techniques for verifying work performed by untrusted computing nodes are provided. A central computing system determines a first computation that is to be performed, at least in part, by a first untrusted computing node. The central computing system also determines a transformation function that is applied to the first computation to produce an equivalent second computation that is to be performed, at least in part, by a second untrusted computing node. The central computing system assigns the first computation to the first untrusted computing node and the second computation to the second untrusted computing node while keeping the transformation function secret. The central computing system receives a first result for the first computation and a second result for the second computation. The central computing system analyzes the first and second results to verify the work performed by the first and second untrusted computing nodes.</p>
申请公布号 WO2012011902(A1) 申请公布日期 2012.01.26
申请号 WO2010US42782 申请日期 2010.07.21
申请人 EMPIRE TECHNOLOGY DEVELOPMENT LLC;STEPHENS, JAMES, H. 发明人 STEPHENS, JAMES, H.
分类号 G06F15/173 主分类号 G06F15/173
代理机构 代理人
主权项
地址