Proofs of Useful Work from Arbitrary Matrix Multiplication
Ilan Komargodski, Hebrew University of Jerusalem
Itamar Schen
Omri Weinstein, Hebrew University of Jerusalem
Abstract
We revisit the longstanding open problem of implementing Nakamoto's proof-of-work (PoW) consensus based on a real-world computational task (as opposed to artificial random hashing), in a truly permissionless setting where the miner itself chooses the input . The challenge in designing such a Proof-of-Useful-Work (PoUW) protocol, is using the native computation of to produce a PoW certificate with prescribed hardness and with negligible computational overhead over the worst-case complexity of -- This ensures malicious miners cannot ``game the system" by fooling the verifier to accept with higher probability compared to honest miners (while using similar computational resources). Indeed, obtaining a PoUW with -factor overhead is trivial for any task , but also useless.
Our main result is a PoUW for the task of Matrix Multiplication of arbitrary matrices with multiplicative overhead compared to na\"ive (even in the presence of Fast Matrix Multiplication-style algorithms, which are currently impractical). We conjecture that our protocol has optimal security in the sense that a malicious prover cannot obtain any significant advantage over an honest prover. This conjecture is based on reducing hardness of our protocol to the task of solving a batch of low-rank random linear equations which is of independent interest.
Since s are the bottleneck of AI compute as well as countless industry-scale applications, this primitive suggests a concrete design of a new L1 base-layer protocol, which nearly eliminates the energy-waste of Bitcoin mining -- allowing GPU consumers to reduce their AI training and inference costs by ``re-using" it for blockchain consensus, in exchange for block rewards (2-for-1). This blockchain is currently under construction.
@misc{cryptoeprint:2025/685,
author = {Ilan Komargodski and Itamar Schen and Omri Weinstein},
title = {Proofs of Useful Work from Arbitrary Matrix Multiplication},
howpublished = {Cryptology {ePrint} Archive, Paper 2025/685},
year = {2025},
url = {https://eprint.iacr.org/2025/685}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.