Cryptographically, how to evaluate linking "privacy" and "verifiability", and what are the limitations? 从密码学角度,如何评价将“隐私性”与“可验证性”结合的做法及其局限性? Cryptographically, how to evaluate linking "privacy" and "verifiability", and what are the limitations?
It uses the auditable nature of privacy protocols (like MPC) to prove model execution. Limitations: 1. Relies on underlying privacy security; 2. Assumes attackers cannot break both privacy and verification; 3. May require specific model encoding, limiting generality. 该做法基于MPC等隐私协议步骤可审计的特性来证明特定模型被执行。主要局限包括:1. 极度依赖底层隐私协议的安全性;2. 假设攻击者无法同时破坏隐私与验证机制;3. 需对特定模型结构进行编码以嵌入令牌,从而限制了通用性。 It uses the auditable nature of privacy protocols (like MPC) to prove model execution. Limitations: 1. Relies on underlying privacy security; 2. Assumes attackers cannot break both privacy and verification; 3. May require specific model encoding, limiting generality.