CWPM

Concealed Work Proof Mode (CWPM) in Pinede

Data Encryption and Secure Signing

  • Workload data is encrypted at the device level to protect sensitive information, followed by signing with the device’s private key.

  • This encryption ensures data privacy, with Zero-Knowledge Proof technology available for verification without revealing the raw data.

Oracle’s Verification and Secure Transmission

  • The oracle first confirms the encrypted data’s signature, then securely transmits it to rule engines and connectors.

  • The Security Standard Score (SSS) and Connectivity Index (CI) are assessed during transmission to ensure data security and integrity.

Confidential Computing and ZK Proofs

  • In a confidential computing environment, the encrypted data is decrypted, and physical work statements are generated.

  • Zero-Knowledge Proof technology generates proofs for verifying work statements without disclosing specific data details.

Adaptive Reward Mechanisms in Smart Contracts

  • Smart contracts receive the verified work statements and ZK proofs, adjusting the reward mechanism based on the Scalability Score (SS) and Intelligence Level (IL).

  • The reward system also considers the Environmental Impact Factor (EIF) to promote environmentally friendly and efficient operations of devices.

Last updated