Cryptography

Cryptographic primitives used in ComputeNet

Experimental Feature

This feature is experimental and may change significantly in future versions.

Cryptographic Foundations

ComputeNet uses modern cryptographic primitives for security. This document outlines the algorithms and their applications in the protocol.

Hash Functions

  • SHA-256 — Primary hash function for job IDs and input hashing
  • Blake3 — Fast hashing for large data structures
  • Poseidon — ZK-friendly hash for proof circuits

Digital Signatures

  • Ed25519 — Validator attestation signatures
  • BLS12-381 — Aggregate signatures for consensus

Zero-Knowledge Proofs

For verifiable computation, ComputeNet supports multiple ZK proof systems:

  • Groth16 — Constant-size proofs for fixed circuits
  • PLONK — Universal setup for flexible programs
  • STARKs — Transparent proofs without trusted setup (planned)