Verifiable Inference

Process of Inference on DeepSol

DeepSol aims to protect sensitive AI computations and ensure the integrity of results.

  • Data Confidentiality: AI tasks execute within hardware-based TEEs (Trusted Execution Environments) like Intel TDX and AMD SEV, ensuring data remains encrypted and inaccessible to external entities.

  • Result Integrity: ZK-SNARKs cryptographic proofs validate computation correctness without revealing underlying data or model details, preventing result tampering.

  • Network Security: Solana's consensus mechanism and DeepSol's Layer2 architecture provide robust protection against common blockchain attacks.

DeepSol delivers high-performance AI computations with several key performance advantages:

  • High Throughput: Our specialized Layer2 architecture supports matrix operation verification, achieving 23x higher throughput than traditional ZK Rollups.

  • Low Latency: Dynamic resource scheduling with a modified Hungarian algorithm matches tasks to resources within 200ms, ensuring rapid response times.

  • Scalability: The elastic compute fabric efficiently allocates resources across regions, maintaining performance during peak demands.

Tx flow in DeepSol
1

Transaction Initiation

  • User/AI Agent Action: A user or AI agent creates a transaction with input parameters, a signature, and specified fees.

  • AI Task Details: The transaction includes specifics about the AI model and computation requirements.

2

Resource Node Allocation

  • Network Distribution: The transaction is routed to a suitable resource node based on real-time network conditions and resource availability.

  • Dynamic Scheduling: Utilizing a modified Hungarian algorithm, tasks are matched to resources within 200ms, optimizing for computational, memory, and bandwidth needs.

3

AI Task Execution

  • Secure Environment: The AI task runs in an isolated environment ensuring data confidentiality and integrity.

  • Computation Process: The AI model processes input data to generate results.

4

Proof Generation

Cryptographic Proof: A ZK-SNARK proof is generated post-computation, validating the task's correctness without exposing sensitive information.

5

On-Chain Verification

  • Proof Submission: The ZK-SNARK proof and transaction results are submitted to Solana's blockchain.

  • Validation: Solana nodes verify the proof efficiently, ensuring the computation's validity.

  • Final Confirmation: Once verified, the transaction is included in a Solana block, ensuring immutability.

Last updated