Verifier Node

Verifier Nodes leverage the TEE (Trusted Execution Environment) and FHE (Fully Homomorphic Encryption) technologies, it plays a crucial role for checking quality of service foreach Subnet Protocol, validate data integrity and maintaining the privacy of user's data.

  • Data Versioning: Track changes in data and version control.

  • Cyclic Redundancy Check (CRC): Detect errors in data transmission.

  • Digital signatures: Use public key encryption to verify the origin and integrity of the data.

  • Hash functions: Use algorithms such as MD5, SHA-256 to create a unique fingerprint for the data.

Last updated