Three bold dots are connected in triangle shape PROVE-TO-EARN

zk proofs made practical

An open network to compute zero-knowledge proofs

Sharp repeat circle

Hardware Operators

Compute proofs & earn rewards

Former miner, gamer, or perhaps a data uses zk center operator with spare GPUs and access to cheap electricity? Monetize your resources by generating zk proofs for rollups, bridges, dexes, games, DIDs or generalized VMs.

two arrows in identical position

Software Developers

Improve UX by delegating proofs

Developing an app or service that proofs but not interested in spending countless hours on devops? Integrate our SDK to automatically route proof generation requests from clients to the permissionless Kalypso prover network.

5 dot pattern DECENTRALIZED

Trustless matching engine

Orderbook-based exchange architecture to connect specialized hardware operators with ZK-powered application users

trading chart with Kalypso
odd color grid square

Plug-and-play

Modular architecture with seamless integration options extensible through various zkVMs

two ropes connected with each other

Flexible

Ability to prioritize cost or speed anytime with the option to join or leave markets as a user or hardware operator

half-way circle with dual color

Open

Arbitrary circuits and proving schemes with no lock-in along with a choice of local, hosted or open market solutions

Upside trending Arrow ADVANTAGES

Why decentralize proving?

Liveness

Improve reliability guarantees and probability of timely proof generation through greater redundancy and strict penalties for failures

Censorship-resistance

Prevent apps from being vulnerable to the whims of provers who refuse to generate proofs for transactions that are against their interests

Efficiency

Increase resource utilization and reduce idle time of hardware by serving multiple apps, hence amortizing fixed cost and saving BD and setup time

tree ROBUST

Built on Oyster

Share secret inputs by harnessing the security of secure enclaves

Public and private input representation
lock icon looks like chat
Encrypted communication channels

Proxy re-encryption is used when sharing data between the matching engine and the prover’s enclaves

Encrypted Folder
Confidentiality of user data

Prevents stalling or battery loss at the client device while being as private as local compute

IC CPU chip
Consumer hardware

Machines with Intel SGX chips or AMD SEV support can be used by operators for use cases with low computational requirements

bulb DESIGN

Performant, reliable and secure

There's no such thing as a wrong proof

Users either gets a valid proof on time or the prover is slashed

Performant, reliable and secure
stripped globe ECOSYSTEM

Built on Kalypso

A lightweight, modular and extensible
architecture with support to build both
centralized and decentralized offerings

calander with repeat icon

Subscriptions

Protocols with recurring demand for proofs may benefit from capacity allocation, prioritization and discounts

flowchart hierarchy

Derivatives

Enable hedging against variable demand and pricing through futures and options markets

circle with dots connected each other

Niche markets

Develop proof markets for specialized segments while still leveraging the Kalypso market & matching engine