Cryptographic Foundations
ComputeNet uses modern cryptographic primitives for security. This document outlines the algorithms and their applications in the protocol.
Hash Functions
- SHA-256 — Primary hash function for job IDs and input hashing
- Blake3 — Fast hashing for large data structures
- Poseidon — ZK-friendly hash for proof circuits
Digital Signatures
- Ed25519 — Validator attestation signatures
- BLS12-381 — Aggregate signatures for consensus
Zero-Knowledge Proofs
For verifiable computation, ComputeNet supports multiple ZK proof systems:
- Groth16 — Constant-size proofs for fixed circuits
- PLONK — Universal setup for flexible programs
- STARKs — Transparent proofs without trusted setup (planned)