eldenpark / verifiable-computing

Verifiable work delegation and ENS (Ethereum Name Service) indexing
MIT License
1 stars 0 forks source link

Protocol #2

Open eldenpark opened 4 years ago

eldenpark commented 4 years ago

Protocol

  1. Let C be a contract, N be a set of all K nodes in the network, and a solicitor s be a node in N who wants to delegate work to other nodes. s makes a transaction to C with a pledge g and a public key b such that,
    1. s has a pair of private and public keys that are generated using an asymmetric key encryption scheme
    2. g is an amount of compensation which is to be given to a node that accomplishes work
  2. Any bidding node b of N who wants to participate in a selection round makes a transaction to C such that,
    1. b makes a transaction with a sha of a random number r_i, where sha(x) is a function that outputs cryptographic hash of x
    2. b makes a transaction and it needs to arrive within a window w to be examined by C
  3. Given a sequence of nodes BN who made a bid within a window w, and a sequence of nodes SR who have recently worked, C creates SN, a subset of BN such that the following conditions hold,
    1. C creates SN only when |BN| > 1
    2. 1 < |SN| < |BN|
    3. A node n whose transaction comes early generally has a higher chance to be selected, with exceptions that if n is in SR it gets repositioned to the end of BN. If more than a single such node exists in BN, they are repositioned and ordered such that the least recently worked node n comes first
  4. Nodes of SN make a transaction to C with r_i within a window w
  5. C creates a set of integers VR and computes a random value r using gen(X) such that
    1. Valid random numbers VR is a subset of a sequence R whose elements are all r_is transmitted such that an element of VR is unique
    2. C computes r if and only if |VR| / |R| > THRESHOLD
    3. gen(|SN|, VR) is a function that outputs an integer r such that 0 <= r < |SN|
  6. C selects a node s of SN whose index is r and appends s in SR.
  7. C adds a pair (x,y) into a set of work W, a binary relation such that,
    1. x is an id of node n
    2. y is a unique identifier of work w, which C generates
  8. C adds a pair (x,y) into a set of work proof WF, a binary relation such that,
    1. x is a unique identifier of work w
    2. y is a public key b which s provided

Comparison with DRAND

Next steps

Full Picture