Phone:
(701)814-6992

Physical address:
​6296 Donnelly Plaza
Ratkeville, ​Bahamas.

A black and white artistic representation of two hands reaching towards each other, inspired by Michelangelo's 'The Creation of Adam,' with a minimalistic bonsai tree logo labeled Bonsol

Unlocking Verifiable Compute on Solana with Bonsol

As blockchain technologies evolve, the integration of advanced cryptographic techniques such as Verifiable Compute (VC) and Zero Knowledge (ZK) proofs are becoming increasingly important.

These technologies enhance security and expand the potential for new kinds of decentralized applications.

The terms Zero Knowledge (ZK) and Verifiable Compute (VC) both refer to cryptographic techniques used to enhance privacy and security, particularly on the blockchain.

Together, these technologies reduce the attack surfaces in applications, shifting verifications from standard security measures to cryptographic proofs. However, they focus on different aspects of security and privacy.

Zero Knowledge Proofs (ZK)

ZK proofs are a method by which the prover can prove to the verifier that a given statement is true, without revealing any information beyond the validity of the statement itself, enabling verification of truthfulness without disclosing any sensitive data or revealing the method of computation.

This means that the verifier learns nothing other than the fact that the statement is indeed true.

Key characteristics of ZK:

Privacy-preserving: ZK proofs are designed to protect sensitive information. For instance, a ZK proof can confirm the correctness of a transaction without revealing the transaction’s details.

Security: They do not expose underlying data, which reduces the risk of data leaks or exposure during the verification process.

Efficiency in Certain Contexts: While ZK proofs can be computationally intensive, they are particularly useful in scenarios where privacy needs to be maintained, such as in voting systems or secure multiparty computations.

Verifiable Compute (VC)

Verifiable Compute, on the other hand, involves ensuring that a computation has been performed correctly and can be independently verified by others.

VC is especially useful in decentralized environments where trust is minimal, and there needs to be a way to verify that a computation was executed correctly without having to re-execute the entire computation.

What makes VC significant:

Trust and Integrity: VC allows a user to trust the outcome of a computation without needing to trust the entity performing the computation. This is achieved by providing cryptographic proof that a computation was performed correctly.

Public Verification: The proofs generated allow anyone to verify the correctness of the computation, which can be crucial for public audits and transparency.

Applicability: VC is widely applicable in distributed systems, blockchain transactions, and any scenario where outsourcing computation needs to be reliably verified.

Introducing Bonsol

Recognizing the power of these technologies, Anagram Build has developed Bonsol, a tool designed to leverage Verifiable Compute (VC) and Zero Knowledge (ZK) proofs within the Solana blockchain.

Bonsol is designed to facilitate ease of use while maintaining robust security protocols, and integrates seamlessly with Solana programs, allowing developers to create verifiable computations that leverage both private and public data.

Bonsol utilizes the popular RISC0 toolchain to facilitate verifiable computations on the Solana blockchain.

How Bonsol Works

The integration of Bonsol proofs within Solana programs allows developers to utilize the results of verifiable computations, expanding their functionality and enhancing their security.

The operational workflow of Bonsol involves several steps that ensure smooth and secure execution of verifiable computations:

  1. Execution Request – Developers or dApps issue an execution request to Bonsol, specifying the ZK program to be run along with its inputs.
  2. Relay and Compute – Relay operators in the Bonsol network pick up these requests. They compute the requested operations using the specified ZK programs.
  3. Proof Generation and Submission – Once a computation is performed, Bonsol generates a proof of correctness. This proof is then submitted to the Solana blockchain, ensuring the integrity of the computation without needing to trust the executor.
  4. Verification and Integration – Solana smart contracts verify the submitted proof and, upon successful verification, use the results of the computation as part of the contract’s logic.

Relayer Incentive Model

Bonsol incorporates an incentive model to encourage relay operators to perform computations efficiently and correctly.

Relays are rewarded based on the speed and accuracy of their computation and proof generation. This model ensures high levels of performance and reliability and fosters a competitive and secure network environment.
Conclusion

Bonsol represents a big leap forward in the integration of cryptographic technologies within the Solana blockchain. Enabling a wide range of applications, from complex financial models to privacy-preserving data analytics, all benefiting from the speed and security of Solana.

Developers are invited to explore the Bonsol repository on GitHub and apply for the Anagram EIR program.

Bonsol: Verifiable Compute for Solana

Mike Hale
Mike Hale

Mike Hale has more than 20 years of experience in software & web development, marketing, and product management.