Transmission of Model Updates, Merkle Proofs, and Hash Log to the Model Owner
Encrypt Model Updates:
After completing the training, each node encrypts the final model updates using a symmetric key to ensure secure transmission to the model owner.
Generate and Include Merkle Proofs:
Each node generates Merkle proofs for the data chunks used in training, confirming that each chunk belongs to the committed dataset (matching the Merkle root).
These proofs are attached to the encrypted model updates, allowing the model owner to verify the data used without direct data access.
Transmit the Hash Log, Encrypted Model Updates, and Merkle Proofs:
Each node securely transmits the following to the model owner:
Encrypted model updates.
Merkle proofs of data chunks used in training.
Hash log of accessed data chunks.
Last updated