RPOI (Rent Proof Of Instructions)

After completing the POCI, the computation own- ers can consider how to further utilize the com- putational power efficiently, they either consider on-chain mining to earn tokens (reward distribution will be described in the next subsection), further purchase computation, or perform lease (rent) ser- vice clusters to clients for distributed mining or AI training tasks, etc. In this section, we will define the proof of lease ownership, namely Rent Proof Of Instructions (RPOI), to complete each secure and complete computational lease agreement.

Define β as the computation leaser and R as the user. Suppose R sends a request to β to lease M TPU chips ϕ, the request γ(R → β,Mϕ) is signed with a private key[7, 8] along with timestamp T, and the transaction is packaged and recorded on the block along with the current deposit ρ and rental ω, the transaction hash H(R → β,Mϕ,T,ρ,ω) is obtained, and the funds are received at the public ledger address π . After β receiving the message and verifying with public key, he will add the chip encryption instruction set and the relevant set of encrypted files of computational power lease σ to the message string, encrypt it with the public key of R and send it to R, and R decrypt its own private key to obtain the lease and usage of computational power:

1. R send a request to β: γ(R → β,Mϕ)

completed signature:

E(m) = signR (m(R → β,Mϕ,T,ρ,ω)) pledged funds:

E(m(γ(R → β,Mϕ),T,ρ,ω)) → π

2. R submit a transaction:

H(R → β,Mϕ,T,ρ,ω) = SHA(E(m(γ(R → β,Mϕ),T,ρ,ω))))

3. β signature check:

m(γ,T,ρ,ω) = DR(E(m(γ,T,ρ,ω))))

β re-encrypt:

Enc(m\ ) = ER(m\ (m + σ(Mϕ → β)))

4. R decrypt to obtain computational usage: m\ (m+σ(Mϕ → β)) = DR(Enc) → σ(Mϕ → β)

The lease message string m(R → β,Mϕ,T,ρ,ω) and the encrypted computation file σ(Mϕ → β)are the first phase of RPOI(RPOI phase I, Figure 3) completed by R.

Figure 3: Schematic diagram of RPOI phase I process

When R has finished using and want to return the computing power, a mutual rating (Rating) and sign is needed to complete for the refund of the deposit on R and the rental income on β . The steps are listed as following:

1.Generate a rating message RaR(R → β) for β and integrate m(R → β,Mϕ,T,ρ,ω) and σ(Mϕ → β) into a new message string, signed and sent to β:

E(m\\ ) = signR (m\\ (m + RaR)) (18)

2.The public key decrypts E(m\\ ) the signa- ture and generates the message rating RaR(β → R) for R, combines and encrypts the ”final mes-

sage” using the public key of π:

mfinal = Eπ(m\\\ (m\\ + Raβ)) ( 19)

3. Finally, the encrypted ”last message” mfinal is submitted to the chain, which is de- crypted by π with its own private key to confirm the completion of RPoI, and then generates the scheduling operators ζ and ξ to act on the encrypted request message E(m(γ(R → β,Mϕ),T,ρ,ω)) decrypted by public key of R, and dispatches funds from the pool to send the deposit and rent to R and β, respectively, to complete the process of comput- ing power leasing:

mfinal → ζ(γ(R → β,Mϕ),ρ,ω) ⇒ ρ → R (20)

mfinal → ξ(γ(R → β,Mϕ),ρ,ω) ⇒ ω → β (21)

Here mfinal contains information about the pre- vious lease request, the amount of funds, and the mutual rating of the two, which is verified by π to complete the second phase of RPOI (RPOI phase II, Figure 4). π can be considered as an impartial adjudicator, and the absence of any part of the in- formation in mfinal will result in the failure of fund allocation. In the first step above, if fails to generate a rating message, mfinal t ζ(γ(R t β,Mϕ),ρ,ω) ⇒ ρ t R will fail to execute; and in the second step, if fails to generate a rating message, mfinal t ξ(γ(R t β,Mϕ),ρ,ω) ⇒ ω t β will fail to execute, and the deposit ρ and the rental ω will all be returned to the address R . Each of the above message delivery is encrypted and decrypted by signatures and public-private keys to guarantee the process tamper-evident and prevent malicious listening [19, 20].

Figure 4: Schematic diagram of the RPOI phase II process

Last updated