Proof-of-Inference: Cryptographic Verification for Decentralized AI
Exploring cryptographic verification mechanisms for Infraxa's future decentralized node network with 100% detection of model substitution attacks.
This is a research proof-of-concept exploring cryptographic verification mechanisms for Infraxa's future decentralized node network. Not production-ready.
The Challenge
As Infraxa scales to a decentralized network of GPU nodes, we face critical verification challenges:
How do we verify nodes are running the claimed models and not cheaper substitutes?
How do we prove inference actually happened and wasn't cached or faked?
How do we audit efficiently without re-running every inference?
Key Results
Attack Scenarios Tested
- Attacker 1: Used Qwen3-0.6B instead of 4B (68% cost savings) - BLOCKED
- Attacker 2: Used Qwen3-1.7B instead of 4B (14% cost savings) - BLOCKED
- Hash Forgery: Attempted to fake model identity - BLOCKED
Performance Impact
- Audit Overhead: <1% of inference time
- Verification Cost: 90% reduction via probabilistic audits
- Real Models: Tested with MLX on Apple Silicon
Performance Analysis
We tested three different model sizes to understand the economic incentives for attackers to substitute cheaper models:
| Model | Size (MB) | Inference (s) | Throughput (tok/s) | Cost Savings | Status |
|---|---|---|---|---|---|
| Qwen3-0.6B-4bit | 335 | 0.30 | 101 | 68% | Blocked |
| Qwen3-1.7B-6bit | 1,024 | 0.81 | 37 | 14% | Blocked |
| Qwen3-4B-4bit | 2,560 | 0.94 | 32 | 0% (baseline) | Expected |
How It Works
Our proof-of-inference system uses four cryptographic mechanisms to verify model identity and prevent fraud:
Cryptographically bind responses to specific models. Providers include a model hash in every signed response.
model_hash = hash(model_weights)
signature = sign(model_hash + output)✓ Catches 100% of simple substitution attacks
Commit to every inference step's logits during generation to prevent output forgery.
for step in generation:
transcript.append(hash(logits))
merkle_root = build_tree(transcript)✓ Prevents output forgery without computation
Router selects random steps via VRF to verify, reducing verification cost by 90%.
challenge_steps = vrf_select([0, 5, 19])
# Verify only 3 of 30 steps
verify(merkle_proofs)✓ 90% cost reduction vs full verification
Digital signatures prevent hash forgery and ensure non-repudiation of responses.
signature = sign(
model_hash + transcript_root
)
verify(signature, public_key)✓ Prevents hash manipulation attacks
Relevance to Infraxa's Vision
Today: Infraxa provides unified access to 100+ AI models through a single API—aggregating OpenAI, Anthropic, Google, Meta, and xAI.
Future: As outlined in the Infraxa Whitepaper, Phase 2-4 will introduce a decentralized node network with independent GPU operators running inference workloads.
Centralized Gateway
CurrentImage Generation Nodes
LLM Inference Nodes
Model Verification
This ResearchWhy We're Open Sourcing This
We're open sourcing this proof-of-inference research because decentralized AI infrastructure requires community trust and collaboration. Here's why:
Cryptographic systems are only as strong as their scrutiny. By open sourcing our proof-of-inference mechanism, we invite:
- Security researchers to audit and improve the system
- Cryptographers to validate our approach
- Community feedback on potential vulnerabilities
The future of AI is decentralized, and we can't build it alone. Open sourcing enables:
- Faster iteration with community contributions
- Cross-pollination of ideas from other projects
- Industry standards that benefit everyone
A thriving decentralized AI ecosystem needs shared infrastructure:
- Other projects can build on our work
- Node operators can verify the system before joining
- Researchers can extend and improve the approach
Decentralized networks require trust. Open source provides:
- Transparency in how verification works
- Reproducibility of our results
- Community ownership of the infrastructure
"The best way to predict the future is to invent it—together."
We believe decentralized AI infrastructure should be built collaboratively, transparently, and for the benefit of everyone.
Current Limitations & Future Work
This is an experimental proof-of-concept. For production use in Infraxa's node network, we need:
- □Real ECDSA signatures (currently using HMAC for demo)
- □Cryptographic VRF (currently deterministic selection)
- □Actual model weight hashing (currently timestamp-based)
- □TEE attestation (SGX/SEV/TDX for hardware security)
- □Economic incentives (staking, slashing for misbehavior)
- □Multi-provider consensus (cross-verification)
- □Professional security audit
The full implementation is open source and ready to run on Apple Silicon:
Built with ❤️ for the future of decentralized AI
Part of the Infraxa ecosystem