Corex Network
  • Concept
  • INTRODUCTION
    • Capabilities
    • General Architectural Outline
  • Joint Computing Environments
    • Outline and Operation
    • Standards and Cryptography
    • Auxiliary Channel Protection
  • NODES
    • Setup & Configuration
    • Management & Incentives
    • Efficiency and Stability Monitoring
    • Secure Execution Zones
    • Node Staking
      • Delegation Dynamics & Vesting Durations
  • CLUSTERS
    • Function and Formation
      • Fork & Migrate
    • Authorization & Incentives
    • Acceptance & Allocation
  • COMPUTATIONS
    • Identifying a Computation
      • Computation Units
    • Computation Initiation
      • Computation Timeline
      • Computational Input Data
  • TOKENOMICS
    • $HEAI
    • Liquidity Management
  • SOCIALS
    • Website
    • Twitter
    • Telegram
Powered by GitBook
On this page
  • Acceptance:
  • Allocation:
  1. CLUSTERS

Acceptance & Allocation

PreviousAuthorization & IncentivesNextIdentifying a Computation

Last updated 7 months ago

Acceptance:

There are various configurable options for managing how the joint computing environments are admitted to a cluster, which determines if one is allowed to use that cluster's resources.

The standard procedure requires unanimous agreement from all nodes in the cluster. In practice, the nodes maintain off-chain blacklists of joint computing environments they won’t work with and accept others automatically. If even one node rejects a joint computing environment, the request fails and the computation customer must find another cluster.

However, some clusters are set to automatically approve all joint computing environment requests without needing unanimous consent.

Allocation:

In our network, the cryptographic key management within clusters starts with the shared key construction process. In this process, each node in the cluster receives a portion of the cryptographic key, referred to as a key share. These key shares work together to form the cryptographic key, enabling secure collaborative computations without exposing individual inputs.

To enhance security, nodes in a luster can optionally utilize the in order to create a secure section within a processor that protects the confidentiality and integrity of the code and data being used. As long as one node in the cluster remains uncompromised, the integrity of the computation is protected.

joint computing environments
Secure Execution Zones