Proofs of Useful Work from Arbitrary Matrix Multiplication

We revisit the longstanding open problem of implementing Nakamoto's proof-of-work (PoW) consensus based on a real-world computational task (as opposed to artificial random hashing), in a truly permissionless setting where the miner itself chooses the input . The challenge in designing such a Proof-of-Useful-Work (PoUW) protocol, is using the native computation of to produce a PoW certificate with prescribed hardness and with negligible computational overhead over the worst-case complexity of -- This ensures malicious miners cannot ``game the system" by fooling the verifier to accept with higher probability compared to honest miners (while using similar computational resources). Indeed, obtaining a PoUW with -factor overhead is trivial for any task , but also useless.
View on arXiv@article{komargodski2025_2504.09971, title={ Proofs of Useful Work from Arbitrary Matrix Multiplication }, author={ Ilan Komargodski and Itamar Schen and Omri Weinstein }, journal={arXiv preprint arXiv:2504.09971}, year={ 2025 } }