Proofs of Useful Work from Arbitrary Matrix Multiplication
We revisit the longstanding open problem of implementing Nakamoto's proof-of-work (PoW) consensus based on a real-world computational task (as opposed to artificial random hashing), in a truly permissionless setting where the miner itself chooses the input . The challenge in designing such a Proof-of-Useful-Work (PoUW) protocol, is using the native computation of to produce a PoW certificate with prescribed hardness and with negligible computational overhead over the worst-case complexity of -- This ensures malicious miners cannot ``game the system" by fooling the verifier to accept with higher probability compared to honest miners (while using similar computational resources). Indeed, obtaining a PoUW with -factor overhead is trivial for any task , but also useless.
View on arXiv