Proof of Compute (PoC) Layer

"Proof of Compute" refers to mechanisms or methodologies that provide evidence or verification that a certain amount of computational work has been done. You can think of Proof of Compute as the umbrella term that encompasses mechanisms like Proof of Work, Proof of Stake, etc.

Cluster Protocol leverages "Proof of Compute" mechanism aimed at leveraging computing resources for AI workloads in a transparent, secure, and efficient manner. This architecture particularly addresses problems in training and inference tasks that require significant resources, such as Tensor Processing Units (TPUs), Graphics Processing Units (GPUs), and other specialized hardware technologies.

Key Components of the PoC Architecture:

  1. Decentralized Network of Compute Nodes: The foundation of this architecture is a network comprised of numerous decentralized nodes, each equipped with industrial-grade computing resources. These nodes could span across various locations globally, offering a diverse range of computational power and capabilities.

  2. Trustless Proof of Compute Layer: At the core of the network lies a trustless Proof of Compute layer. This layer is designed to validate the computational work performed by the nodes without requiring trust between parties. It ensures that the computational output provided by a node matches what was agreed upon, thereby preventing fraudulent activities and ensuring integrity.

  3. Transparent Resource Verification: The network implements mechanisms for verifying and displaying the specific attributes of each compute node, including the type of GPUs/TPUs, the infrastructure technology used, geographical location, throughput, uptime, and other relevant parameters. This transparency allows users to make informed decisions when selecting compute nodes for their AI tasks.

    More on this is discussed here.

  4. Smart Contracts for Task Assignment and Reward Distribution: Smart contracts are employed to automate the process of assigning computation tasks to nodes and distributing rewards based on the verified completion of tasks. These contracts can encode terms related to the required computational resources, expected output, deadlines, and compensation, ensuring fairness and efficiency.

  5. Security and Privacy Measures: This includes encryption, secure multi-party computation techniques, and anonymization protocols to safeguard sensitive information.

Last updated