Evaluation Level: Secure and Verifiable Biomedical Computation
Evaluation Level: Secure and Verifiable Biomedical Computation
Although decentralized biomedical model fine-tuning can be achieved securely with Equivariant Encryption (EE), verifiable and privacy-preserving evaluation remains an open challenge.
Institutions must not only compute correct results, but also prove correctness to regulators and collaborators—without revealing sensitive patient data or proprietary model details.

EE-Enabled Encrypted Inference and Verification
Given an encrypted input ( x' = T x + \delta ) and EE-transformed model parameters ( (A', b') ), inference proceeds as:
No plaintext parameters or activations are revealed at any point.
The result is decrypted only by the requester:
To guarantee correctness and model integrity:
The hash of the deployed model ( \mathrm{hash}(A') ) is stored on-chain
A lightweight proof ( \pi ) may be generated to link ( y' ) to the authorized model
Decentralized Certification Workflow
The evaluation pipeline proceeds through four stages:
Encrypted Inference Query A user encrypts their private input ( x ) and submits ( x' = T x + \delta ) to the model host.
On-Chain Model Verification Before inference, smart contracts or validators check that the model hash ( \mathrm{hash}(A') ) matches the authorized version.
Inference and Optional Proof Generation The encrypted inference is computed as ( y' = R(A' x' + b') ), and the host may also produce a lightweight proof ( \pi ).
Decryption and On-Chain Logging The requester decrypts the output, and optionally logs ( \mathrm{hash}(y') ) and ( \pi ) to the blockchain for audit purposes.
Security Considerations
Privacy Preservation Intermediate states and final outputs remain encrypted unless explicitly decrypted by the user.
Verifiability and Integrity Cryptographic links between ( A' ), ( y' ), and ( \pi ) allow third-party verification—without exposing internal model logic or data.
Efficiency and Practicality This approach avoids the computational burden of full ZK proofs. Only commitments (e.g., hashes) are logged, enabling real-time, scalable inference.
Benefits for Biomedical Applications
This framework supports cryptographically verifiable evaluation in sensitive biomedical domains, including:
Genome-wide association studies
Regulatory audit of pharmaceutical trials
Clinical model validation across institutions
When combined with Rexis’s encrypted training and compute-to-data sharing, this final layer completes an end-to-end, privacy-first platform for decentralized biomedical AI.
It empowers institutions to share, train, and evaluate models—without ever compromising data integrity or privacy.
Last updated