491

Proofs of Useful Work from Arbitrary Matrix Multiplication

IACR Cryptology ePrint Archive (IACR ePrint), 2025
Main:16 Pages
Bibliography:3 Pages
Appendix:4 Pages
Abstract

We revisit the longstanding open problem of implementing Nakamoto's proof-of-work (PoW) consensus based on a real-world computational task T(x)T(x) (as opposed to artificial random hashing), in a truly permissionless setting where the miner itself chooses the input xx. The challenge in designing such a Proof-of-Useful-Work (PoUW) protocol, is using the native computation of T(x)T(x) to produce a PoW certificate with prescribed hardness and with negligible computational overhead over the worst-case complexity of T()T(\cdot) -- This ensures malicious miners cannot ``game the system" by fooling the verifier to accept with higher probability compared to honest miners (while using similar computational resources). Indeed, obtaining a PoUW with O(1)O(1)-factor overhead is trivial for any task TT, but also useless.

View on arXiv
Comments on this paper