zkSystems
Technology

Scalable Decentralized Turing Machine

zkSystems is developing a scalable Layer One DLT protocol for incentivized computation and distributed data storage. We use asynchronous BFT consensus, post-quantum encryption and verifiable computation, based on non-interactive zero-knowledge proofs.

zkSystems addresses both scalability of smart contracts and horizontal scalability of the network.

aBFT Consensus

Better scalability (hundred thousands tps) and finality within seconds in comparison to blockchain principle and proof-of-work mechanism.

aBFT Consensus

Verifiable Computation

Proof of computation ensures that smart contracts are executed only by a small number of competing nodes, thus reducing run time redundancy.

Verifiable Computation

Proof of Encryption

Only encrypted data is permitted to be stored; this ensures data privacy and stops illegal file hosters from using the system.

Proof of Encryption

Proof of Storage

This ensures that payments to the nodes are only processed when the system provides a proof that the data is still being stored.

Proof of Storage

Proof of Redundancy

If data disappears from one of the nodes, another node automatically restores the data (i.e. self-healing principle).

Proof of Redundancy

Post-Quantum Encryption

This enables General Data Protection Regulation/DRM-conformity and enhances data protection.

Post-Quantum Encryption

Get involved in the process

INTRODUCING

Our Team

Our team combines a deep background in consensus algorithms, cryptography and academic research with software development, entrepreneurship and real-world business experience.

"We are building the first truly decentralized Turing machine as the Layer One infrastructure solution"

Diana Rees
Business Development
Amine Ünal
Software Development

Scalability of Smart Contracts

Verifiable Computation

In our system, only a small number of competing nodes execute the smart contracts – as opposed to the usual setting, in which smart contracts are executed by all the nodes in the network, causing energy waste and unnecessary redundancy.

Highest Level of Security

Resistant Against DoS Attacks

By having no single point of failure, a decentralized system with a multitude of nodes enables the highest possible level of security against DoS attacks. This also saves companies between 1 to 10 Mln. € IT security cost.

Data Protection for Decentralized Storage

Conform with GDPR/DRM

Highest standard of data protection and GDPR/DRM-conformity is enabled through post-quantum encryption. Furthermore, a decentralized system eliminates any danger of data espionage, which cannot be guaranteed by central authorities.

Horizontal Scalability

Replacement of PoW and Blockchain Principle

With 25 GB data produced per day per car, this amounts to zettabytes of data per year – only a decentralized system with a truly scalable aBFT consensus can handle this scale efficiently.

INTRODUCING

Our Medium zkSystems Blog

Feel free to follow us on Medium for the most up to date news regarding zkSystems and the current progress on the development of our technology stack.

2.5 exabytes of data are produced every day. Paired with increasing complexity of data streams, managing these data volumes poses a challenge to any central solution. We think only a scalable decentralized system with a distributed data storage can handle this efficiently.

Contact Us

cool good eh love2 cute confused notgood numb disgusting fail