EMETH White Paper
  • EMETH White Paper
  • 1. Introduction
    • 1-1. The Need for a Global Distributed Computing Platform
  • 2. Project
    • 2-1. EMETH's Vision
    • 2-2. Overview of EMETH Project
      • 2-2-1. Data Privacy Protection
      • 2-2-2. Hybrid Parallel Processing
      • 2-2-3. EMETH L2 Roll Up
  • 3.Token Economy
    • 3-1. EMETH ($EMETH) Token Overview
    • 3-2. Token Allocation
    • 3-3. EMETH Token Utility
    • 3-4. GPU Mining Program
      • 3-4-1. Staking Program.
    • 3-5. Calculation Method for JOB Execution Fees
    • 3-6. Overview of fee state transition
  • 4. Node
    • 4-1. Benefits that EMETH node can enjoy
    • 4-2. How to Become a EMETH Node
      • 4-2-1. How to set up EMETH Node for Windows users
      • 4-2-2. How to set up EMETH Node for Ubuntu users
      • 4-2-3. How to set up EMETH Portable for mobile device users
  • 5. Service
    • 5-1. AI Inference
      • 5-1-1 Pricing
    • 5-2. Rent GPUs
  • 6. DAO
    • 6-1. EMETH DAO
  • 7. EMETH Architecture
    • 7-1. Overview
      • 7-1-1. Splitter
      • 7-1-2. Aggregator
      • 7-1-3. Verifier
      • 7-1-4. Signer
    • 7-2. Layer 1 Entire Process
    • 7-3. Layer 2 Entire Process
  • 8. ROADMAP
Powered by GitBook
On this page
  1. 2. Project
  2. 2-2. Overview of EMETH Project

2-2-1. Data Privacy Protection

From AI video and image processing to highly confidential projects, the biggest challenge of distributed computing is privacy protection. There is a problem with current cloud computing systems that they cannot fully ensure the confidentiality of data during computation.

EMETH has developed distributed confidential computing technology to address this issue. This technology performs advanced computational processes while ensuring the confidentiality of data. It splits encrypted learning data, distributes it to multiple nodes, and each node processes the data while it remains encrypted. After processing, the generated model is securely integrated, ensuring the privacy and confidentiality of the data.

EMETH's distributed confidential computing significantly reduces security risks and balances privacy protection with high performance. Parallel computing through distributed processing effectively handles large-scale data, improving productivity in AI development and applications.

This groundbreaking technology promotes the development of innovative AI services that safely utilize confidential data and contributes to the protection of personal information and the establishment of data sovereignty. EMETH opens new possibilities in distributed computing and realizes a future of data utilization that is more secure and reliable.

Previous2-2. Overview of EMETH ProjectNext2-2-2. Hybrid Parallel Processing

Last updated 1 year ago