We have deployed an application capable of classifying encrypted images from the CIFAR-10 dataset. This page provides instructions on setting up the environment, preparing inputs, running the application, and obtaining the results.
Note that keyring backend test will store your private key in the open file, never use this option for mainnet
You can request tokens from someone or use our Faucet to obtain them. Tokens can be transferred between accounts using the following command:
$ ./fairmathd tx bank send <from address> <to address> 100stake --from <from account> --chain-id testnet --keyring-backend test
You can find the address using the keys list command:
$ ./fairmathd keys list --keyring-backend=test
- address: fairmath19wjlxxzef8nvlfr63xr9c8vkefmf54awtp8mk0
name: <accountname>
pubkey: '{"@type":"/cosmos.crypto.secp256k1.PubKey","key":"A2akCmQrGqdJWMjQw7xqR8I188pI+KVb5z/O+1GTXYbN"}'
type: local
Once you receive tokens you can run an application on FHE computer
Running Application
Each application comes with a configuration file that contains all the necessary information for preparing encrypted inputs. Ath te first step you have to get this config. The name of CIFAR application is cifar-split. To download an config use the following command:
$ ./fairmathd actor app-config cifar-split --grpc-addr=testnet.computer.fairmath.xyz:9090
If everything is set up correctly, you will see similar logs::
024/11/25 10:23:27 Download config for the following apps:
2024/11/25 10:23:27 Name: cifar-split ID: 12 Author: fairmath19wjlxxzef8nvlfr63xr9c8vkefmf54awtp8mk0
You can see a message about downloaded configs:
From the message above, we will need the ID later to run the application. Once this command is executed, an FHE configuration file named cifar-split-12-fhecfg.json will be generated with all parameters preconfigured.
Based on the configuration file, the fairmath-cli will generate all the required keys, cryptocontext and ciphertexts. At this stage, we only need to provide the plaintext value in the plaintext_value field. Images from the CIFAR dataset can be represented as a vector of numbers. We have prepared scripts that generate the corresponding vector from an image. Now we can put input for our applicaiton in config file in open form to generate cipheretx.
In this config you must provide just plaintext_value for the input object.
Now we can execute a command to prepare the data(encrypt input, generate keys etc.), upload it to the Data Layer, and run the application:
$ ./fairmathd actor start-app 12 ./cifar-split-12-fhecfg.json --keys-dir=/path/to/store/keys --key-generator=/path/to/fairmath-cli --from <accountname> --ipfs 167.235.197.94:5001 --keyring-backend=test
2024/11/25 10:35:38 application with id <12> has been started under process ID: <38>
If the execution is successful, you will receive a process ID for your run (e.g., 38 in this example). Additionally, all necessary keys and the cryptocontext will be generated and stored in the directory specified by the --keys-dir flag. The secret key and cryptocontext will be required later to decrypt the result.
Once the command completes, an updated configuration file named ./cifar-split-12-fhecfg.updated.json will be created. For future runs, you can use this updated configuration to avoid re-generating keys. Simply modify the input section in the updated config, and the FHE computer will use the existing keys.
To prevent saving an updated configuration, pass the flag --save-config=false. This is especially useful if you are running the application with an already updated config to avoid generating redundant files like cifar-split-12-fhecfg.updated.updated.json.
To observe the execution of your app you can go to the FHE computer terminal and run orders command
3os> orders
There is 3 orders related to the process 38. Once all of related orders is in done status the process considered as finished and you are able to see result.
To see result of the execution you need your account address(you discovered it during step 2 of registration). Run process command in the FHE computer termial and observe the
3os> process user=fairmath19wjlxxzef8nvlfr63xr9c8vkefmf54awtp8mk0
If everything is ok then Args column will contain ipfs link to the result of computation. In this case it is - /ipfs/QmQ1LHHuu4TheWvKz1UBy5VXsLWr3EWPUgSsk4xHQRHLcu. To download it paste the following address in your browser changing ipfs link to yours