Zk-SNARK Marketplace with Proof of Useful Work
- URL: http://arxiv.org/abs/2510.09729v1
- Date: Fri, 10 Oct 2025 10:38:42 GMT
- Title: Zk-SNARK Marketplace with Proof of Useful Work
- Authors: Samuel Oleksak, Richard Gazdik, Martin Peresini, Ivan Homoliak,
- Abstract summary: We propose a Proof of Useful Work consensus protocol that computes client-outsourced zk-SNARKs as a byproduct proof.<n>We further leverage this mechanism to design a decentralized marketplace for outsourcing zk-SNARK proof generation.
- Score: 0.3849857432787595
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Proof of Work (PoW) is widely regarded as the most secure permissionless blockchain consensus protocol. However, its reliance on computationally intensive yet externally useless puzzles results in excessive electric energy wasting. To alleviate this, Proof of Useful Work (PoUW) has been explored as an alternative to secure blockchain platforms while also producing real-world value. Despite this promise, existing PoUW proposals often fail to embed the integrity of the chain and identity of the miner into the puzzle solutions, not meeting necessary requirements for PoW and thus rendering them vulnerable. In this work, we propose a PoUW consensus protocol that computes client-outsourced zk-SNARKs proofs as a byproduct, which are at the same time used to secure the consensus protocol. We further leverage this mechanism to design a decentralized marketplace for outsourcing zk-SNARK proof generation, which is, to the best of our knowledge, the first such marketplace operating at the consensus layer, while meeting all necessary properties of PoW.
Related papers
- Proof of Trusted Execution: A Consensus Paradigm for Deterministic Blockchain Finality [0.391985484065646]
We propose Proof of Trusted Execution (PoTE), a consensus paradigm where agreement emerges from verifiable execution rather than replicated re-execution.<n>Because the execution is deterministic and the proposer is uniquely derived from public randomness, PoTE avoids forks, eliminates slot.time bottlenecks, and commits blocks in a single round of verification.
arXiv Detail & Related papers (2025-12-10T08:04:38Z) - Voting-Based Semi-Parallel Proof-of-Work Protocol [45.776687601070705]
We first consider the existing parallel PoW protocols and develop hard-coded incentive attack structures.<n>We introduce a voting-based semi-parallel PoW protocol that outperforms both Nakamoto consensus and the existing parallel PoW protocols.
arXiv Detail & Related papers (2025-08-08T17:57:35Z) - Trusted Compute Units: A Framework for Chained Verifiable Computations [41.94295877935867]
This paper introduces the Trusted Compute Unit (TCU), a unifying framework that enables composable and interoperable computations across heterogeneous technologies.<n>By enabling secure off-chain interactions without incurring on-chain confirmation delays or gas fees, TCUs significantly improve system performance and scalability.
arXiv Detail & Related papers (2025-04-22T09:01:55Z) - A Fair and Lightweight Consensus Algorithm for IoT [0.0]
This work introduces a fair and lightweight hybrid consensus algorithm tailored for IoT.<n>The proposed approach minimizes resource demands on the nodes while ensuring a secure and fair agreement process.<n>In addition, a reputation-based block voting mechanism is incorporated to enhance trust and establish finality.
arXiv Detail & Related papers (2025-03-11T16:45:51Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [43.253676241213626]
We propose an architecture for blockchain-based PAISs to preserve confidentiality and transparency.<n>Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.<n>We assess the security of our solution through a systematic threat model analysis and evaluate its practical feasibility.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.<n>Our measurements from the Aptos mainnet show that the optimistic approach reduces latency overhead by 71%.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - On Replacing Cryptopuzzles with Useful Computation in Blockchain Proof-of-Work Protocols [0.12289361708127873]
Researchers have been pursuing the idea of replacing cryptopuzzles with useful computing tasks for over a decade.
We provide insight into the effect of introducing "usefulness" and of transitioning to task classes other than cryptopuzzles.
We discuss pertinent techniques and present research gaps in the current state-of-the-art.
arXiv Detail & Related papers (2024-04-24T08:49:41Z) - Proof-of-Learning with Incentive Security [15.219480512237682]
Most concurrent blockchain systems rely heavily on the Proof-of-Work (PoW) or Proof-of-Stake (PoS) mechanisms for decentralized consensus and security assurance.<n>PoUW seeks to employ challenges of practical significance as PoW, thereby imbuing energy consumption with tangible value.<n>We introduce the concept of incentive-security that incentivizes rational provers to behave honestly for their best interest, bypassing the existing hardness to design a PoL mechanism with computational efficiency, a provable incentive-security guarantee and controllable difficulty.
arXiv Detail & Related papers (2024-04-13T13:18:40Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Securing Consensus from Long-Range Attacks through Collaboration [6.090550359575682]
We present the design of our Power-of-Collaboration protocol, which guards existing PoS/BFT blockchains against long-range attacks.<n>PoC guarantees fairness and accountability and only marginally degrades the throughput of the underlying system.
arXiv Detail & Related papers (2023-02-05T07:33:57Z) - Post-Quantum VRF and its Applications in Future-Proof Blockchain System [13.386254282693335]
A verifiable random function (VRF) is a powerful pseudo-random function that provides a non-interactively public verifiable proof for the correctness of its output.
We propose a generic compiler to obtain the post-quantum VRF from the simple VRF solution using symmetric-key primitives.
We show potential applications of a quantum-secure VRF, such as quantum-secure decentralized random beacon and lottery-based proof of stake consensus blockchain protocol.
arXiv Detail & Related papers (2021-09-05T07:10:41Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.