Skip to main content

11 posts tagged with "Cryptography"

Cryptographic protocols and techniques

View all tags

The Privacy Stack Wars: ZK vs FHE vs TEE vs MPC - Which Technology Wins Blockchain's Most Important Race?

· 10 min read
Dora Noda
Software Engineer

The global confidential computing market was valued at $13.3 billion in 2024. By 2032, it is projected to reach $350 billion — a 46.4% compound annual growth rate. Over $1 billion has already been invested specifically into decentralized confidential computing (DeCC) projects, and more than 20 blockchain networks have formed the DeCC Alliance to promote privacy-preserving technologies.

Yet for builders deciding which privacy technology to use, the landscape is bewildering. Zero-knowledge proofs (ZK), fully homomorphic encryption (FHE), trusted execution environments (TEE), and multi-party computation (MPC) each solve fundamentally different problems. Choosing the wrong one wastes years of development and millions in funding.

This guide provides the comparison that the industry needs: real performance benchmarks, honest trust model assessments, production deployment status, and the hybrid combinations that are actually shipping in 2026.

What Each Technology Actually Does

Before comparing, it is essential to understand that these four technologies are not interchangeable alternatives. They answer different questions.

Zero-Knowledge Proofs (ZK) answer: "How do I prove something is true without revealing the data?" ZK systems generate cryptographic proofs that a computation was performed correctly — without disclosing the inputs. The output is binary: the statement is either valid or it is not. ZK is primarily about verification, not computation.

Fully Homomorphic Encryption (FHE) answers: "How do I compute on data without ever decrypting it?" FHE allows arbitrary computations directly on encrypted data. The result remains encrypted and can only be decrypted by the key holder. FHE is about privacy-preserving computation.

Trusted Execution Environments (TEE) answer: "How do I process sensitive data in an isolated hardware enclave?" TEEs use processor-level isolation (Intel SGX, AMD SEV, ARM CCA) to create secure enclaves where code and data are protected even from the operating system. TEEs are about hardware-enforced confidentiality.

Multi-Party Computation (MPC) answers: "How do multiple parties compute a joint result without revealing their individual inputs?" MPC distributes computation across multiple parties so that no single participant learns anything beyond the final output. MPC is about collaborative computation without trust.

Performance Benchmarks: The Numbers That Matter

Vitalik Buterin has argued that the industry should shift from absolute TPS metrics to a "cryptographic overhead ratio" — comparing task execution time with privacy versus without. This framing reveals the true cost of each approach.

FHE: From Unusable to Viable

FHE was historically millions of times slower than unencrypted computation. That is no longer true.

Zama, the first FHE unicorn (valued at $1 billion after raising $150+ million), reports speed improvements exceeding 2,300x since 2022. Current performance on CPU reaches approximately 20 TPS for confidential ERC-20 transfers. GPU acceleration pushes this to 20-30 TPS (Inco Network) with up to 784x improvements over CPU-only execution.

Zama's roadmap targets 500-1,000 TPS per chain by end of 2026 using GPU migration, with ASIC-based accelerators expected in 2027-2028 targeting 100,000+ TPS.

The architecture matters: Zama's Confidential Blockchain Protocol uses symbolic execution where smart contracts operate on lightweight "handles" instead of actual ciphertext. Heavy FHE operations run asynchronously on off-chain coprocessors, keeping on-chain gas fees low.

Bottom line: FHE overhead has dropped from 1,000,000x to roughly 100-1,000x for typical operations. Usable for confidential DeFi today; competitive with mainstream DeFi throughput by 2027-2028.

ZK: Mature and Performant

Modern ZK platforms have achieved remarkable efficiency. SP1, Libra, and other zkVMs demonstrate near-linear prover scaling with cryptographic overhead as low as 20% for large workloads. Proof generation for simple payments has dropped below one second on consumer hardware.

The ZK ecosystem is the most mature of the four technologies, with production deployments across rollups (zkSync, Polygon zkEVM, Scroll, Linea), identity (Worldcoin), and privacy protocols (Aztec, Zcash).

Bottom line: For verification tasks, ZK offers the lowest overhead. The technology is production-proven but does not support general-purpose private computation — it proves correctness, not confidentiality of ongoing computation.

TEE: Fast but Hardware-Dependent

TEEs operate at near-native speed — they add minimal computational overhead because the isolation is enforced by hardware, not cryptographic operations. This makes them the fastest option for confidential computing by a wide margin.

The trade-off is trust. You must trust the hardware manufacturer (Intel, AMD, ARM) and that no side-channel vulnerabilities exist. In 2022, a critical SGX vulnerability forced Secret Network to coordinate a network-wide key update — demonstrating the operational risk. Empirical research in 2025 shows that 32% of real-world TEE projects reimplement cryptography inside enclaves with risk of side-channel exposure, and 25% exhibit insecure practices that weaken TEE guarantees.

Bottom line: Fastest execution speed, lowest overhead, but introduces hardware trust assumptions. Best suited for applications where speed is critical and the risk of hardware compromise is acceptable.

MPC: Network-Bound but Resilient

MPC performance is primarily limited by network communication rather than computation. Each participant must exchange data during the protocol, creating latency proportional to the number of parties and the network conditions between them.

Partisia Blockchain's REAL protocol has improved pre-processing efficiency, enabling real-time MPC computations. Nillion's Curl protocol extends linear secret-sharing schemes to handle complex operations (divisions, square roots, trigonometric functions) that traditional MPC struggled with.

Bottom line: Moderate performance with strong privacy guarantees. The honest-majority assumption means privacy holds even if some participants are compromised, but any member can censor computation — a fundamental limitation compared to FHE or ZK.

Trust Models: Where the Real Differences Lie

Performance comparisons dominate most analyses, but trust models matter more for long-term architectural decisions.

TechnologyTrust ModelWhat Can Go Wrong
ZKCryptographic (no trusted party)Nothing — proofs are mathematically sound
FHECryptographic + key managementKey compromise exposes all encrypted data
TEEHardware vendor + attestationSide-channel attacks, firmware backdoors
MPCThreshold honest majorityCollusion above threshold breaks privacy; any party can censor

ZK requires no trust beyond the mathematical soundness of the proof system. This is the strongest trust model available.

FHE is cryptographically secure in theory, but introduces a "who holds the decryption key" problem. Zama solves this by splitting the private key across multiple parties using threshold MPC — meaning FHE in practice often depends on MPC for key management.

TEE requires trusting Intel, AMD, or ARM's hardware and firmware. This trust has been violated repeatedly. The WireTap attack presented at CCS 2025 demonstrated breaking SGX via DRAM bus interposition — a physical attack vector that no software update can fix.

MPC distributes trust across participants but requires an honest majority. If the threshold is exceeded, all inputs are exposed. Additionally, any single participant can refuse to cooperate, effectively censoring the computation.

Quantum resistance adds another dimension. FHE is inherently quantum-safe because it relies on lattice-based cryptography. TEEs offer no quantum resistance. ZK and MPC resistance depends on the specific schemes used.

Who Is Building What: The 2026 Landscape

FHE Projects

Zama ($150M+ raised, $1B valuation): The infrastructure layer powering most FHE blockchain projects. Launched mainnet on Ethereum in late December 2025. The $ZAMA token auction began January 12, 2026. Created the Confidential Blockchain Protocol and the fhEVM framework for encrypted smart contracts.

Fhenix ($22M raised): Builds an FHE-powered optimistic rollup L2 using Zama's TFHE-rs. Deployed the CoFHE coprocessor on Arbitrum as the first practical FHE coprocessor implementation. Received strategic investment from BIPROGY, one of Japan's largest IT providers.

Inco Network ($4.5M raised): Provides confidentiality-as-a-service using Zama's fhEVM. Offers both TEE-based fast processing and FHE+MPC secure computation modes.

Both Fhenix and Inco depend on Zama's core technology — meaning Zama captures value regardless of which FHE application chain dominates.

TEE Projects

Oasis Network: Pioneered the ParaTime architecture separating compute (in TEE) from consensus. Uses key management committees in TEE with threshold cryptography so no single node controls decryption keys.

Phala Network: Combines decentralized AI infrastructure with TEEs. All AI computations and Phat Contracts execute inside Intel SGX enclaves via pRuntime.

Secret Network: Every validator runs an Intel SGX TEE. Contract code and inputs are encrypted on-chain and decrypted only inside enclaves at execution time. The 2022 SGX vulnerability exposed the fragility of this single-TEE dependency.

MPC Projects

Partisia Blockchain: Founded by the team that pioneered practical MPC protocols in 2008. Their REAL protocol enables quantum-resistant MPC with efficient data pre-processing. Recent partnership with Toppan Edge uses MPC for biometric digital ID — matching facial recognition data without ever decrypting it.

Nillion ($45M+ raised): Launched mainnet March 24, 2025, followed by Binance Launchpool listing. Combines MPC, homomorphic encryption, and ZK proofs. Enterprise cluster includes STC Bahrain, Alibaba Cloud's Cloudician, Vodafone's Pairpoint, and Deutsche Telekom.

Hybrid Approaches: The Real Future

As Aztec's research team put it: there is no perfect single solution, and it is unlikely that one technique will emerge as that perfect solution. The future belongs to hybrid architectures.

ZK + MPC enables collaborative proof generation where each party holds only part of the witness. This is critical for multi-institutional scenarios (compliance checks, cross-border settlements) where no single entity should see all the data.

MPC + FHE solves FHE's key management problem. Zama's architecture uses threshold MPC to split the decryption key across multiple parties — eliminating the single point of failure while preserving FHE's ability to compute on encrypted data.

ZK + FHE allows proving that encrypted computations were performed correctly without revealing the encrypted data. The overhead is still significant — Zama reports that generating a proof for one correct bootstrapping operation takes 21 minutes on a large AWS instance — but hardware acceleration is narrowing this gap.

TEE + Cryptographic fallback uses TEEs for fast execution with ZK or FHE as a backup in case of hardware compromise. This "defense in depth" approach accepts TEE's performance benefits while mitigating its trust assumptions.

The most sophisticated production systems in 2026 combine two or three of these technologies. Nillion's architecture orchestrates MPC, homomorphic encryption, and ZK proofs depending on the computation requirements. Inco Network offers both TEE-fast and FHE+MPC-secure modes. This compositional approach is likely to become the standard.

Choosing the Right Technology

For builders making architectural decisions in 2026, the choice depends on three questions:

What are you doing?

  • Proving a fact without revealing data → ZK
  • Computing on encrypted data from multiple parties → FHE
  • Processing sensitive data at maximum speed → TEE
  • Multiple parties jointly computing without trusting each other → MPC

What are your trust constraints?

  • Must be completely trustless → ZK or FHE
  • Can accept hardware trust → TEE
  • Can accept threshold assumptions → MPC

What is your performance requirement?

  • Real-time, sub-second → TEE (or ZK for verification only)
  • Moderate throughput, high security → MPC
  • Privacy-preserving DeFi at scale → FHE (2026-2027 timeline)
  • Maximum verification efficiency → ZK

The confidential computing market is projected to grow from $24 billion in 2025 to $350 billion by 2032. The blockchain privacy infrastructure being built today — from Zama's FHE coprocessors to Nillion's MPC orchestration to Oasis's TEE ParaTimes — will determine which applications can exist in that $350 billion market and which cannot.

Privacy is not a feature. It is the infrastructure layer that makes regulation-compliant DeFi, confidential AI, and enterprise blockchain adoption possible. The technology that wins is not the fastest or the most theoretically elegant — it is the one that ships production-ready, composable primitives that developers can actually build on.

Based on current trajectories, the answer is probably all four.


BlockEden.xyz provides multi-chain RPC infrastructure supporting privacy-focused blockchain networks and confidential computing applications. As privacy-preserving protocols mature from research to production, reliable node infrastructure becomes the foundation for every encrypted transaction. Explore our API marketplace for enterprise-grade blockchain access.

Navigating the Privacy Technology Landscape: FHE, ZK, and TEE in Blockchain

· 10 min read
Dora Noda
Software Engineer

When Zama became the first fully homomorphic encryption unicorn in June 2025—valued at over $1 billion—it signaled something larger than one company's success. The blockchain industry had finally accepted a fundamental truth: privacy isn't optional, it's infrastructure.

But here's the uncomfortable reality developers face: there's no single "best" privacy technology. Fully Homomorphic Encryption (FHE), Zero-Knowledge Proofs (ZK), and Trusted Execution Environments (TEE) each solve different problems with different tradeoffs. Choosing wrong doesn't just impact performance—it can fundamentally compromise what you're trying to build.

This guide breaks down when to use each technology, what you're actually trading off, and why the future likely involves all three working together.

The Privacy Technology Landscape in 2026

The blockchain privacy market has evolved from niche experimentation to serious infrastructure. ZK-based rollups now secure over $28 billion in Total Value Locked. The Zero-Knowledge KYC market alone is projected to grow from $83.6 million in 2025 to $903.5 million by 2032—a 40.5% compound annual growth rate.

But market size doesn't help you choose a technology. Understanding what each approach actually does is the starting point.

Zero-Knowledge Proofs: Proving Without Revealing

ZK proofs allow one party to prove a statement is true without revealing any information about the content itself. You can prove you're over 18 without revealing your birthdate, or prove a transaction is valid without exposing the amount.

How it works: The prover generates a cryptographic proof that a computation was performed correctly. The verifier can check this proof quickly without re-running the computation or seeing the underlying data.

The catch: ZK excels at proving things about data you already hold. It struggles with shared state. You can prove your balance is sufficient for a transaction, but you can't easily ask questions like "how many fraud cases happened chain-wide?" or "who won this sealed-bid auction?" without additional infrastructure.

Leading projects: Aztec enables hybrid public/private smart contracts where users choose whether transactions are visible. zkSync focuses primarily on scalability with enterprise-focused "Prividiums" for permissioned privacy. Railgun and Nocturne provide shielded transaction pools.

Fully Homomorphic Encryption: Computing on Encrypted Data

FHE is often called the "holy grail" of encryption because it allows computation on encrypted data without ever decrypting it. The data stays encrypted during processing, and the results remain encrypted—only the authorized party can decrypt the output.

How it works: Mathematical operations are performed directly on ciphertexts. Addition and multiplication on encrypted values produce encrypted results that, when decrypted, match what you'd get from operating on plaintext.

The catch: Computational overhead is massive. Even with recent optimizations, FHE-based smart contracts on Inco Network achieve only 10-30 TPS depending on hardware—orders of magnitude slower than plaintext execution.

Leading projects: Zama provides the foundational infrastructure with FHEVM (their fully homomorphic EVM). Fhenix builds application-layer solutions using Zama's technology, having deployed CoFHE coprocessor on Arbitrum with decryption speeds up to 50x faster than competing approaches.

Trusted Execution Environments: Hardware-Based Isolation

TEEs create secure enclaves within processors where computations occur in isolation. Data inside the enclave remains protected even if the broader system is compromised. Unlike cryptographic approaches, TEEs rely on hardware rather than mathematical complexity.

How it works: Specialized hardware (Intel SGX, AMD SEV) creates isolated memory regions. Code and data inside the enclave are encrypted and inaccessible to the operating system, hypervisor, or other processes—even with root access.

The catch: You're trusting hardware manufacturers. Any single compromised enclave can leak plaintext, regardless of how many nodes participate. In 2022, a critical SGX vulnerability forced coordinated key updates across Secret Network, demonstrating the operational complexity of hardware-dependent security.

Leading projects: Secret Network pioneered private smart contracts using Intel SGX. Oasis Network's Sapphire is the first confidential EVM in production, processing up to 10,000 TPS. Phala Network operates over 1,000 TEE nodes for confidential AI workloads.

The Tradeoff Matrix: Performance, Security, and Trust

Understanding the fundamental tradeoffs helps match technology to use case.

Performance

TechnologyThroughputLatencyCost
TEENear-native (10,000+ TPS)LowLow operational cost
ZKModerate (varies by implementation)Higher (proof generation)Medium
FHELow (10-30 TPS currently)HighVery high operational cost

TEEs win on raw performance because they're essentially running native code in protected memory. ZK introduces proof generation overhead but verification is fast. FHE currently requires intensive computation that limits practical throughput.

Security Model

TechnologyTrust AssumptionPost-QuantumFailure Mode
TEEHardware manufacturerNot resistantSingle enclave compromise exposes all data
ZKCryptographic (often trusted setup)Varies by schemeProof system bugs can be invisible
FHECryptographic (lattice-based)ResistantComputationally intensive to exploit

TEEs require trusting Intel, AMD, or whoever manufactures the hardware—plus trusting that no firmware vulnerabilities exist. ZK systems often require "trusted setup" ceremonies, though newer schemes eliminate this. FHE's lattice-based cryptography is believed quantum-resistant, making it the strongest long-term security bet.

Programmability

TechnologyComposabilityState PrivacyFlexibility
TEEHighFullLimited by hardware availability
ZKLimitedLocal (client-side)High for verification
FHEFullGlobalLimited by performance

ZK excels at local privacy—protecting your inputs—but struggles with shared state across users. FHE maintains full composability because encrypted state can be computed upon by anyone without revealing contents. TEEs offer high programmability but are constrained to environments with compatible hardware.

Choosing the Right Technology: Use Case Analysis

Different applications demand different tradeoffs. Here's how leading projects are making these choices.

DeFi: MEV Protection and Private Trading

Challenge: Front-running and sandwich attacks extract billions from DeFi users by exploiting visible mempools.

FHE solution: Zama's confidential blockchain enables transactions where parameters remain encrypted until block inclusion. Front-running becomes mathematically impossible—there's no visible data to exploit. The December 2025 mainnet launch included the first confidential stablecoin transfer using cUSDT.

TEE solution: Oasis Network's Sapphire enables confidential smart contracts for dark pools and private order matching. Lower latency makes it suitable for high-frequency trading scenarios where FHE's computational overhead is prohibitive.

When to choose: FHE for applications requiring the strongest cryptographic guarantees and global state privacy. TEE when performance requirements exceed what FHE can deliver and hardware trust is acceptable.

Identity and Credentials: Privacy-Preserving KYC

Challenge: Proving identity attributes (age, citizenship, accreditation) without exposing documents.

ZK solution: Zero-knowledge credentials let users prove "KYC passed" without revealing underlying documents. This satisfies compliance requirements while protecting user privacy—a critical balance as regulatory pressure intensifies.

Why ZK wins here: Identity verification is fundamentally about proving statements about personal data. ZK is purpose-built for this: compact proofs that verify without revealing. The verification is fast enough for real-time use.

Confidential AI and Sensitive Computation

Challenge: Processing sensitive data (healthcare, financial models) without exposure to operators.

TEE solution: Phala Network's TEE-based cloud processes LLM queries without platform access to inputs. With GPU TEE support (NVIDIA H100/H200), confidential AI workloads run at practical speeds.

FHE potential: As performance improves, FHE enables computation where even the hardware operator can't access data—removing the trust assumption entirely. Current limitations restrict this to simpler computations.

Hybrid approach: Run initial data processing in TEEs for speed, use FHE for the most sensitive operations, and generate ZK proofs to verify results.

The Vulnerability Reality

Each technology has failed in production—understanding failure modes is essential.

TEE Failures

In 2022, critical SGX vulnerabilities affected multiple blockchain projects. Secret Network, Phala, Crust, and IntegriTEE required coordinated patches. Oasis survived because its core systems run on older SGX v1 (unaffected) and don't rely on enclave secrecy for funds safety.

Lesson: TEE security depends on hardware you don't control. Defense-in-depth (key rotation, threshold cryptography, minimal trust assumptions) is mandatory.

ZK Failures

On April 16, 2025, Solana patched a zero-day vulnerability in its Confidential Transfers feature. The bug could have enabled unlimited token minting. The dangerous aspect of ZK failures: when proofs fail, they fail invisibly. You can't see what shouldn't be there.

Lesson: ZK systems require extensive formal verification and audit. The complexity of proof systems creates attack surface that's difficult to reason about.

FHE Considerations

FHE hasn't experienced major production failures—largely because it's earlier in deployment. The risk profile differs: FHE is computationally intensive to attack, but implementation bugs in complex cryptographic libraries could enable subtle vulnerabilities.

Lesson: Newer technology means less battle-testing. The cryptographic guarantees are strong, but the implementation layer needs continued scrutiny.

Hybrid Architectures: The Future Isn't Either/Or

The most sophisticated privacy systems combine multiple technologies, using each where it excels.

ZK + FHE Integration

User states (balances, preferences) stored with FHE encryption. ZK proofs verify valid state transitions without exposing encrypted values. This enables private execution within scalable L2 environments—combining FHE's global state privacy with ZK's efficient verification.

TEE + ZK Combination

TEEs process sensitive computations at near-native speed. ZK proofs verify that TEE outputs are correct, removing the single-operator trust assumption. If the TEE is compromised, invalid outputs would fail ZK verification.

When to Use What

A practical decision framework:

Choose TEE when:

  • Performance is critical (high-frequency trading, real-time applications)
  • Hardware trust is acceptable for your threat model
  • You need to process large data volumes quickly

Choose ZK when:

  • You're proving statements about client-held data
  • Verification must be fast and low-cost
  • You don't need global state privacy

Choose FHE when:

  • Global state must remain encrypted
  • Post-quantum security is required
  • Computation complexity is acceptable for your use case

Choose hybrid when:

  • Different components have different security requirements
  • You need to balance performance with security guarantees
  • Regulatory compliance requires demonstrable privacy

What Comes Next

Vitalik Buterin recently pushed for standardized "efficiency ratios"—comparing cryptographic computation time to plaintext execution. This reflects the industry's maturation: we're moving from "does it work?" to "how efficiently does it work?"

FHE performance continues improving. Zama's December 2025 mainnet proves production-readiness for simple smart contracts. As hardware acceleration develops (GPU optimization, custom ASICs), the throughput gap with TEEs will narrow.

ZK systems are becoming more expressive. Aztec's Noir language enables complex private logic that would have been impractical years ago. Standards are slowly converging, enabling cross-chain ZK credential verification.

TEE diversity is expanding beyond Intel SGX. AMD SEV, ARM TrustZone, and RISC-V implementations reduce dependency on any single manufacturer. Threshold cryptography across multiple TEE vendors could address the single-point-of-failure concern.

The privacy infrastructure buildout is happening now. For developers building privacy-sensitive applications, the choice isn't about finding the perfect technology—it's about understanding tradeoffs well enough to combine them intelligently.


Building privacy-preserving applications on blockchain? BlockEden.xyz provides high-performance RPC endpoints across 30+ networks, including privacy-focused chains. Explore our API marketplace to access the infrastructure your confidential applications need.

Quantum Computing vs Bitcoin: Timeline, Threats, and What Holders Should Know

· 8 min read
Dora Noda
Software Engineer

Google's Willow quantum chip can solve in five minutes what would take classical supercomputers 10 septillion years. Meanwhile, $718 billion in Bitcoin sits in addresses that quantum computers could theoretically crack. Should you panic? Not yet—but the clock is ticking.

The quantum threat to Bitcoin isn't a matter of if but when. As we enter 2026, the conversation has shifted from dismissive skepticism to serious preparation. Here's what every Bitcoin holder needs to understand about the timeline, the actual vulnerabilities, and the solutions already in development.

The Quantum Threat: Breaking Down the Math

Bitcoin's security rests on two cryptographic pillars: the Elliptic Curve Digital Signature Algorithm (ECDSA) for transaction signatures and SHA-256 for mining and address hashing. Both face different levels of quantum risk.

Shor's algorithm, running on a sufficiently powerful quantum computer, could derive private keys from public keys—effectively picking the lock on any Bitcoin address where the public key is exposed. This is the existential threat.

Grover's algorithm offers a quadratic speedup for brute-forcing hash functions, reducing SHA-256's effective strength from 256 bits to 128 bits. This is concerning but not immediately catastrophic—128-bit security remains formidable.

The critical question: How many qubits does it take to run Shor's algorithm against Bitcoin?

Estimates vary wildly:

  • Conservative: 2,330 stable logical qubits could theoretically break ECDSA
  • Practical reality: Due to error correction needs, this requires 1-13 million physical qubits
  • University of Sussex estimate: 13 million qubits to break Bitcoin encryption in one day
  • Most aggressive estimate: 317 million physical qubits to crack a 256-bit ECDSA key within an hour

Google's Willow chip has 105 qubits. The gap between 105 and 13 million explains why experts aren't panicking—yet.

Where We Stand: The 2026 Reality Check

The quantum computing landscape in early 2026 looks like this:

Current quantum computers are crossing the 1,500 physical qubit threshold, but error rates remain high. Approximately 1,000 physical qubits are needed to create just one stable logical qubit. Even with aggressive AI-assisted optimization, jumping from 1,500 to millions of qubits in 12 months is physically impossible.

Timeline estimates from experts:

SourceEstimate
Adam Back (Blockstream CEO)20-40 years
Michele Mosca (U. of Waterloo)1-in-7 chance by 2026 for fundamental crypto break
Industry consensus10-30 years for Bitcoin-breaking capability
US Federal mandatePhase out ECDSA by 2035
IBM roadmap500-1,000 logical qubits by 2029

The 2026 consensus: no quantum doomsday this year. However, as one analyst put it, "the likelihood that quantum becomes a top-tier risk factor for crypto security awareness in 2026 is high."

The $718 Billion Vulnerability: Which Bitcoins Are at Risk?

Not all Bitcoin addresses face equal quantum risk. The vulnerability depends entirely on whether the public key has been exposed on the blockchain.

High-risk addresses (P2PK - Pay to Public Key):

  • Public key is directly visible on-chain
  • Includes all addresses from Bitcoin's early days (2009-2010)
  • Satoshi Nakamoto's estimated 1.1 million BTC falls into this category
  • Total exposure: approximately 4 million BTC (20% of supply)

Lower-risk addresses (P2PKH, P2SH, SegWit, Taproot):

  • Public key is hashed and only revealed when spending
  • As long as you never reuse an address after spending, the public key remains hidden
  • Modern wallet best practices naturally provide some quantum resistance

The critical insight: if you've never spent from an address, your public key isn't exposed. The moment you spend and reuse that address, you become vulnerable.

Satoshi's coins present a unique dilemma. Those 1.1 million BTC in P2PK addresses cannot be moved to safer formats—the private keys would need to sign a transaction, which we have no evidence Satoshi can or will do. If quantum computers reach sufficient capability, those coins become the world's largest crypto bounty.

"Harvest Now, Decrypt Later": The Shadow Threat

Even if quantum computers can't break Bitcoin today, adversaries may already be preparing for tomorrow.

The "harvest now, decrypt later" strategy involves collecting exposed public keys from the blockchain now, storing them, and waiting for quantum computers to mature. When Q-Day arrives, attackers with archives of public keys could immediately drain vulnerable wallets.

Nation-state actors and sophisticated criminal organizations are likely already implementing this strategy. Every public key exposed on-chain today becomes a potential target in 5-15 years.

This creates an uncomfortable reality: the security clock for any exposed public key may have already started ticking.

Solutions in Development: BIP 360 and Post-Quantum Cryptography

The Bitcoin developer community isn't waiting for Q-Day. Multiple solutions are progressing through development and standardization.

BIP 360: Pay to Quantum Resistant Hash (P2TSH)

BIP 360 proposes a quantum-resistant tapscript-native output type as a critical "first step" toward quantum-safe Bitcoin. The proposal outlines three quantum-resistant signature methods, enabling gradual migration without disrupting network efficiency.

By 2026, advocates hope to see widespread P2TSH adoption, allowing users to migrate funds to quantum-safe addresses proactively.

NIST-Standardized Post-Quantum Algorithms

As of 2025, NIST finalized three post-quantum cryptography standards:

  • FIPS 203 (ML-KEM): Key encapsulation mechanism
  • FIPS 204 (ML-DSA/Dilithium): Digital signatures (lattice-based)
  • FIPS 205 (SLH-DSA/SPHINCS+): Hash-based signatures

BTQ Technologies has already demonstrated a working Bitcoin implementation using ML-DSA to replace ECDSA signatures. Their Bitcoin Quantum Core Release 0.2 proves the technical feasibility of migration.

The Tradeoff Challenge

Lattice-based signatures like Dilithium are significantly larger than ECDSA signatures—potentially 10-50x larger. This directly impacts block capacity and transaction throughput. A quantum-resistant Bitcoin might process fewer transactions per block, increasing fees and potentially pushing smaller transactions off-chain.

What Bitcoin Holders Should Do Now

The quantum threat is real but not imminent. Here's a practical framework for different holder profiles:

For all holders:

  1. Avoid address reuse: Never send Bitcoin to an address you've already spent from
  2. Use modern address formats: SegWit (bc1q) or Taproot (bc1p) addresses hash your public key
  3. Stay informed: Follow BIP 360 development and Bitcoin Core releases

For significant holdings (>1 BTC):

  1. Audit your addresses: Check if any holdings are in P2PK format using block explorers
  2. Consider cold storage refresh: Periodically move funds to fresh addresses
  3. Document your migration plan: Know how you'll move funds when quantum-safe options become standard

For institutional holders:

  1. Include quantum risk in security assessments: BlackRock added quantum computing warnings to their Bitcoin ETF filing in 2025
  2. Monitor NIST standards and BIP developments: Budget for future migration costs
  3. Evaluate custody providers: Ensure they have quantum migration roadmaps

The Governance Challenge: Bitcoin's Unique Vulnerability

Unlike Ethereum, which has a more centralized upgrade path through the Ethereum Foundation, Bitcoin upgrades require broad social consensus. There's no central authority to mandate post-quantum migration.

This creates several challenges:

Lost and abandoned coins can't migrate. An estimated 3-4 million BTC are lost forever. These coins will remain in quantum-vulnerable states indefinitely, creating a permanent pool of potentially stealable Bitcoin once quantum attacks become viable.

Satoshi's coins raise philosophical questions. Should the community freeze Satoshi's P2PK addresses preemptively? Ava Labs CEO Emin Gün Sirer has proposed this, but it would fundamentally challenge Bitcoin's immutability principles. A hard fork to freeze specific addresses sets a dangerous precedent.

Coordination takes time. Research indicates performing a full network upgrade, including migrating all active wallets, could require at least 76 days of dedicated on-chain effort in an optimistic scenario. In practice, with continued network operation, migration could take months or years.

Satoshi Nakamoto foresaw this possibility. In a 2010 BitcoinTalk post, he wrote: "If SHA-256 became completely broken, I think we could come to some agreement about what the honest blockchain was before the trouble started, lock that in and continue from there with a new hash function."

The question is whether the community can achieve that agreement before, not after, the threat materializes.

The Bottom Line: Urgency Without Panic

Quantum computers capable of breaking Bitcoin are likely 10-30 years away. The immediate threat is low. However, the consequences of being unprepared are catastrophic, and migration takes time.

The crypto industry's response should match the threat: deliberate, technically rigorous, and proactive rather than reactive.

For individual holders, the action items are straightforward: use modern address formats, avoid reuse, and stay informed. For the Bitcoin ecosystem, the next five years are critical for implementing and testing quantum-resistant solutions before they're needed.

The quantum clock is ticking. Bitcoin has time—but not unlimited time—to adapt.


BlockEden.xyz provides enterprise-grade blockchain infrastructure across 25+ networks. As the crypto industry prepares for the quantum era, we're committed to supporting protocols that prioritize long-term security. Explore our API services to build on networks preparing for tomorrow's challenges.

Zama Protocol: The FHE Unicorn Building Blockchain's Confidentiality Layer

· 11 min read
Dora Noda
Software Engineer

Zama has established itself as the definitive leader in Fully Homomorphic Encryption (FHE) for blockchain, becoming the world's first FHE unicorn in June 2025 with a $1 billion valuation after raising over $150 million. The Paris-based company doesn't compete with blockchains—it provides the cryptographic infrastructure enabling any EVM chain to process encrypted smart contracts without ever decrypting the underlying data. With its mainnet launched on Ethereum in late December 2025 and the $ZAMA token auction beginning January 12, 2026, Zama sits at a critical inflection point where theoretical cryptographic breakthroughs meet production-ready deployment.

The strategic significance cannot be overstated: while Zero-Knowledge proofs prove computation correctness and Trusted Execution Environments rely on hardware security, FHE uniquely enables computation on encrypted data from multiple parties—solving the fundamental blockchain trilemma between transparency, privacy, and compliance. Institutions like JP Morgan have already validated this approach through Project EPIC, demonstrating confidential tokenized asset trading with full regulatory compliance. Zama's positioning as infrastructure rather than a competing chain means it captures value regardless of which L1 or L2 ultimately dominates.


Technical architecture enables encrypted computation without trust assumptions

Fully Homomorphic Encryption represents a breakthrough in cryptography that has existed in theory since 2009 but only recently became practical. The term "homomorphic" refers to the mathematical property where operations performed on encrypted data, when decrypted, yield identical results to operations on the original plaintext. Zama's implementation uses TFHE (Torus Fully Homomorphic Encryption), a scheme distinguished by fast bootstrapping—the fundamental operation that resets accumulated noise in ciphertexts and enables unlimited computation depth.

The fhEVM architecture introduces a symbolic execution model that elegantly solves blockchain's performance constraints. Rather than processing actual encrypted data on-chain, smart contracts execute using lightweight handles (pointers) while actual FHE computations are offloaded asynchronously to specialized coprocessors. This design means host chains like Ethereum require no modifications, non-FHE transactions experience no slowdown, and FHE operations can execute in parallel rather than sequentially. The architecture comprises five integrated components: the fhEVM library for Solidity developers, coprocessor nodes performing FHE computation, a Key Management Service using 13 MPC nodes with threshold decryption, an Access Control List contract for programmable privacy, and a Gateway orchestrating cross-chain operations.

Performance benchmarks demonstrate rapid improvement. Bootstrapping latency—the critical metric for FHE—dropped from 53 milliseconds initially to under 1 millisecond on NVIDIA H100 GPUs, with throughput reaching 189,000 bootstraps per second across eight H100s. Current protocol throughput stands at 20+ TPS on CPU, sufficient for all encrypted Ethereum transactions today. The roadmap projects 500-1,000 TPS by end of 2026 with GPU migration, scaling to 100,000+ TPS with dedicated ASICs in 2027-2028. Unlike TEE solutions vulnerable to hardware side-channel attacks, FHE's security rests on lattice-based cryptographic hardness assumptions that provide post-quantum resistance.


Developer tooling has matured from research to production

Zama's open-source ecosystem comprises four interconnected products that have attracted over 5,000 developers, representing approximately 70% market share in blockchain FHE. The TFHE-rs library provides a pure Rust implementation with GPU acceleration via CUDA, FPGA support through AMD Alveo hardware, and multi-level APIs ranging from high-level operations to core cryptographic primitives. The library supports encrypted integers up to 256 bits with operations including arithmetic, comparisons, and conditional branching.

Concrete functions as a TFHE compiler built on LLVM/MLIR infrastructure, transforming standard Python programs into FHE-equivalent circuits. Developers require no cryptography expertise—they write normal Python code and Concrete handles the complexity of circuit optimization, key generation, and ciphertext management. For machine learning applications, Concrete ML provides drop-in replacements for scikit-learn models that automatically compile to FHE circuits, supporting linear models, tree-based ensembles, and even encrypted LLM fine-tuning. Version 1.8 demonstrated fine-tuning a LLAMA 8B model on 100,000 encrypted tokens in approximately 70 hours.

The fhEVM Solidity library enables developers to write confidential smart contracts using familiar syntax with encrypted types (euint8 through euint256, ebool, eaddress). An encrypted ERC-20 transfer, for example, uses TFHE.le() to compare encrypted balances and TFHE.select() for conditional logic—all without revealing values. The September 2025 partnership with OpenZeppelin established standardized confidential token implementations, sealed-bid auction primitives, and governance frameworks that accelerate enterprise adoption.


Business model captures value as infrastructure provider

Zama's funding trajectory reflects accelerating institutional confidence: a $73 million Series A in March 2024 led by Multicoin Capital and Protocol Labs, followed by a $57 million Series B in June 2025 led by Pantera Capital that achieved unicorn status. The investor roster reads as blockchain royalty—Juan Benet (Filecoin founder and board member), Gavin Wood (Ethereum and Polkadot co-founder), Anatoly Yakovenko (Solana co-founder), and Tarun Chitra (Gauntlet founder) all participated.

The revenue model employs BSD3-Clear dual licensing: technologies remain free for non-commercial research and prototyping, while production deployment requires purchasing patent usage rights. By March 2024, Zama had signed over $50 million in contract value within six months of commercialization, with hundreds of additional customers in pipeline. Transaction-based pricing applies for private blockchain deployments, while crypto projects often pay in tokens. The upcoming Zama Protocol introduces on-chain economics: operators stake $ZAMA to qualify for encryption and decryption work, with fees ranging from $0.005 - $0.50 per ZKPoK verification and $0.001 - $0.10 per decryption operation.

The team represents the largest dedicated FHE research organization globally: 96+ employees across 26 nationalities, with 37 holding PhDs (~40% of staff). Co-founder and CTO Pascal Paillier invented the Paillier encryption scheme used in billions of smart cards and received the prestigious IACR Fellowship in 2025. CEO Rand Hindi previously founded Snips, an AI voice platform acquired by Sonos. This concentration of cryptographic talent creates substantial intellectual property moats—Paillier holds approximately 25 patent families protecting core innovations.


Competitive positioning as the picks-and-shovels play for blockchain privacy

The privacy solution landscape divides into three fundamental approaches, each with distinct trade-offs. Trusted Execution Environments (TEEs), used by Secret Network and Oasis Network, offer near-native performance but rely on hardware security with a trust threshold of one—if the enclave is compromised, all privacy breaks. The October 2022 disclosure of TEE vulnerabilities affecting Secret Network underscored these risks. Zero-Knowledge proofs, employed by Aztec Protocol ($100M Series B from a16z), prove computation correctness without revealing inputs but cannot compute on encrypted data from multiple parties—limiting their applicability for shared state applications like lending pools.

FHE occupies a unique position: mathematically guaranteed privacy with configurable trust thresholds, no hardware dependencies, and the crucial ability to process encrypted data from multiple sources. This enables use cases impossible with other approaches—confidential AMMs computing over encrypted reserves from liquidity providers, or lending protocols managing encrypted collateral positions.

Within FHE specifically, Zama operates as the infrastructure layer while others build chains on top. Fhenix ($22M raised) builds an optimistic rollup L2 using Zama's TFHE-rs via partnership, having deployed CoFHE coprocessor on Arbitrum as the first practical FHE implementation. Inco Network ($4.5M raised) provides confidentiality-as-a-service for existing chains using Zama's fhEVM, offering both TEE-based fast processing and FHE+MPC secure computation. Both projects depend on Zama's core technology—meaning Zama captures value regardless of which FHE chain gains dominance. This infrastructure positioning mirrors how OpenZeppelin profits from smart contract adoption without competing with Ethereum directly.


Use cases span DeFi, AI, RWAs, and compliant payments

In DeFi, FHE fundamentally solves MEV (Maximal Extractable Value). Because transaction parameters remain encrypted until block inclusion, front-running and sandwich attacks become mathematically impossible—there is simply no visible mempool data to exploit. The ZamaSwap reference implementation demonstrates encrypted AMM swaps with fully encrypted balances and pool reserves. Beyond MEV protection, confidential lending protocols can maintain encrypted collateral positions and liquidation thresholds, enabling on-chain credit scoring computed over private financial data.

For AI and machine learning, Concrete ML enables privacy-preserving computation across healthcare (encrypted medical diagnosis), finance (fraud detection on encrypted transactions), and biometrics (authentication without revealing identity). The framework supports encrypted LLM fine-tuning—training language models on sensitive data that never leaves encrypted form. As AI agents proliferate across Web3 infrastructure, FHE provides the confidential computation layer ensuring data privacy without sacrificing utility.

Real-World Asset tokenization represents perhaps the largest opportunity. The JP Morgan Kinexys Project EPIC proof-of-concept demonstrated institutional asset tokenization with encrypted bid amounts, hidden investor holdings, and KYC/AML checks on encrypted data—maintaining full regulatory compliance. This addresses the fundamental barrier preventing traditional finance from using public blockchains: the inability to hide trading strategies and positions from competitors. With tokenized RWAs projected as a $100+ trillion addressable market, FHE unlocks institutional participation that private blockchains cannot serve.

Payment and stablecoin privacy completes the picture. The December 2025 mainnet launch included the first confidential stablecoin transfer using cUSDT. Unlike mixing-based approaches (Tornado Cash), FHE enables programmable compliance—developers define access control rules determining who can decrypt what, enabling regulatory-compliant privacy rather than absolute anonymity. Authorized auditors and regulators receive appropriate access without compromising general transaction privacy.


Regulatory landscape creates tailwinds for compliant privacy

The EU's MiCA framework, fully effective since December 30, 2024, creates strong demand for privacy solutions that maintain compliance. The Travel Rule requires crypto asset service providers to share originator and beneficiary data for all transfers, with no de minimis threshold—making privacy-by-default approaches like mixing impractical. FHE's selective disclosure mechanisms align precisely with this requirement: transactions remain encrypted from general observation while authorized parties access necessary information.

In the United States, the July 2025 signing of the GENIUS Act established the first comprehensive federal stablecoin framework, signaling regulatory maturation that favors compliant privacy solutions over regulatory evasion. The Asia-Pacific region continues advancing progressive frameworks, with Hong Kong's stablecoin regulatory regime effective August 2025 and Singapore maintaining leadership in crypto licensing. Across jurisdictions, the pattern favors solutions enabling both privacy and regulatory compliance—precisely Zama's value proposition.

The 2025 enforcement shift from reactive prosecution to proactive frameworks creates opportunity for FHE adoption. Projects building with compliant privacy architectures from inception—rather than retrofitting privacy-first designs for compliance—will find easier paths to institutional adoption and regulatory approval.


Technical and market challenges require careful navigation

Performance remains the primary barrier, though the trajectory is clear. FHE operations currently run approximately 100x slower than plaintext equivalents—acceptable for low-frequency high-value transactions but constraining for high-throughput applications. The scaling roadmap depends on hardware acceleration: GPU migration in 2026, FPGA optimization, and ultimately purpose-built ASICs. The DARPA DPRIVE program funding Intel, Duality, SRI, and Niobium for FHE accelerator development represents significant government investment accelerating this timeline.

Key management introduces its own complexities. The current 13-node MPC committee for threshold decryption requires honest majority assumptions—collusion among threshold nodes could enable "silent attacks" undetectable by other participants. The roadmap targets expansion to 100+ nodes with HSM integration and post-quantum ZK proofs, strengthening these guarantees.

Competition from TEE and ZK alternatives should not be dismissed. Secret Network and Oasis offer production-ready confidential computing with substantially better current performance. Aztec's $100M backing and team that invented PLONK—the dominant ZK-SNARK construction—means formidable competition in privacy-preserving rollups. The TEE performance advantage may persist if hardware security improves faster than FHE acceleration, though hardware trust assumptions create a fundamental ceiling ZK and FHE solutions don't share.


Conclusion: Infrastructure positioning captures value across ecosystem growth

Zama's strategic genius lies in its positioning as infrastructure rather than competing chain. Both Fhenix and Inco—the leading FHE blockchain implementations—build on Zama's TFHE-rs and fhEVM technology, meaning Zama captures licensing revenue regardless of which protocol gains adoption. The dual licensing model ensures open-source developer adoption drives commercial enterprise demand, while the $ZAMA token launching in January 2026 creates on-chain economics aligning operator incentives with network growth.

Three factors will determine Zama's ultimate success: execution on the performance roadmap from 20 TPS today to 100,000+ TPS with ASICs; institutional adoption following the JP Morgan validation; and developer ecosystem growth beyond current 5,000 developers to mainstream Web3 penetration. The regulatory environment has shifted decisively in favor of compliant privacy, and FHE's unique capability for encrypted multi-party computation addresses use cases neither ZK nor TEE can serve.

For Web3 researchers and investors, Zama represents the canonical "picks and shovels" opportunity in blockchain privacy—infrastructure that captures value as the confidential computing layer matures across DeFi, AI, RWAs, and institutional adoption. The $1 billion valuation prices significant execution risk, but successful delivery of the technical roadmap could position Zama as essential infrastructure for the next decade of blockchain development.

Building Decentralized Encryption with @mysten/seal: A Developer's Tutorial

· 13 min read
Dora Noda
Software Engineer

Privacy is becoming public infrastructure. In 2025, developers need tools that make encryption as easy as storing data. Mysten Labs' Seal provides exactly that—decentralized secrets management with onchain access control. This tutorial will teach you how to build secure Web3 applications using identity-based encryption, threshold security, and programmable access policies.


Introduction: Why Seal Matters for Web3

Traditional cloud applications rely on centralized key management systems where a single provider controls access to encrypted data. While convenient, this creates dangerous single points of failure. If the provider is compromised, goes offline, or decides to restrict access, your data becomes inaccessible or vulnerable.

Seal changes this paradigm entirely. Built by Mysten Labs for the Sui blockchain, Seal is a decentralized secrets management (DSM) service that enables:

  • Identity-based encryption where content is protected before it leaves your environment
  • Threshold encryption that distributes key access across multiple independent nodes
  • Onchain access control with time locks, token-gating, and custom authorization logic
  • Storage agnostic design that works with Walrus, IPFS, or any storage solution

Whether you're building secure messaging apps, gated content platforms, or time-locked asset transfers, Seal provides the cryptographic primitives and access control infrastructure you need.


Getting Started

Prerequisites

Before diving in, ensure you have:

  • Node.js 18+ installed
  • Basic familiarity with TypeScript/JavaScript
  • A Sui wallet for testing (like Sui Wallet)
  • Understanding of blockchain concepts

Installation

Install the Seal SDK via npm:

npm install @mysten/seal

You'll also want the Sui SDK for blockchain interactions:

npm install @mysten/sui

Project Setup

Create a new project and initialize it:

mkdir seal-tutorial
cd seal-tutorial
npm init -y
npm install @mysten/seal @mysten/sui typescript @types/node

Create a simple TypeScript configuration:

// tsconfig.json
{
"compilerOptions": {
"target": "ES2020",
"module": "commonjs",
"strict": true,
"esModuleInterop": true,
"skipLibCheck": true,
"forceConsistentCasingInFileNames": true
}
}

Core Concepts: How Seal Works

Before writing code, let's understand Seal's architecture:

1. Identity-Based Encryption (IBE)

Unlike traditional encryption where you encrypt to a public key, IBE lets you encrypt to an identity (like an email address or Sui address). The recipient can only decrypt if they can prove they control that identity.

2. Threshold Encryption

Instead of trusting a single key server, Seal uses t-of-n threshold schemes. You might configure 3-of-5 key servers, meaning any 3 servers can cooperate to provide decryption keys, but 2 or fewer cannot.

3. Onchain Access Control

Access policies are enforced by Sui smart contracts. Before a key server provides decryption keys, it verifies that the requestor meets the onchain policy requirements (token ownership, time constraints, etc.).

4. Key Server Network

Distributed key servers validate access policies and generate decryption keys. These servers are operated by different parties to ensure no single point of control.


Basic Implementation: Your First Seal Application

Let's build a simple application that encrypts sensitive data and controls access through Sui blockchain policies.

Step 1: Initialize the Seal Client

// src/seal-client.ts
import { SealClient } from '@mysten/seal';
import { SuiClient } from '@mysten/sui/client';

export async function createSealClient() {
// Initialize Sui client for testnet
const suiClient = new SuiClient({
url: 'https://fullnode.testnet.sui.io'
});

// Configure Seal client with testnet key servers
const sealClient = new SealClient({
suiClient,
keyServers: [
'https://keyserver1.seal-testnet.com',
'https://keyserver2.seal-testnet.com',
'https://keyserver3.seal-testnet.com'
],
threshold: 2, // 2-of-3 threshold
network: 'testnet'
});

return { sealClient, suiClient };
}

Step 2: Simple Encryption/Decryption

// src/basic-encryption.ts
import { createSealClient } from './seal-client';

async function basicExample() {
const { sealClient } = await createSealClient();

// Data to encrypt
const sensitiveData = "This is my secret message!";
const recipientAddress = "0x742d35cc6d4c0c08c0f9bf3c9b2b6c64b3b4f5c6d7e8f9a0b1c2d3e4f5a6b7c8";

try {
// Encrypt data for a specific Sui address
const encryptedData = await sealClient.encrypt({
data: Buffer.from(sensitiveData, 'utf-8'),
recipientId: recipientAddress,
// Optional: add metadata
metadata: {
contentType: 'text/plain',
timestamp: Date.now()
}
});

console.log('Encrypted data:', {
ciphertext: encryptedData.ciphertext.toString('base64'),
encryptionId: encryptedData.encryptionId
});

// Later, decrypt the data (requires proper authorization)
const decryptedData = await sealClient.decrypt({
ciphertext: encryptedData.ciphertext,
encryptionId: encryptedData.encryptionId,
recipientId: recipientAddress
});

console.log('Decrypted data:', decryptedData.toString('utf-8'));

} catch (error) {
console.error('Encryption/decryption failed:', error);
}
}

basicExample();

Access Control with Sui Smart Contracts

The real power of Seal comes from programmable access control. Let's create a time-locked encryption example where data can only be decrypted after a specific time.

Step 1: Deploy Access Control Contract

First, we need a Move smart contract that defines our access policy:

// contracts/time_lock.move
module time_lock::policy {
use sui::clock::{Self, Clock};
use sui::object::{Self, UID};
use sui::tx_context::{Self, TxContext};

public struct TimeLockPolicy has key, store {
id: UID,
unlock_time: u64,
authorized_user: address,
}

public fun create_time_lock(
unlock_time: u64,
authorized_user: address,
ctx: &mut TxContext
): TimeLockPolicy {
TimeLockPolicy {
id: object::new(ctx),
unlock_time,
authorized_user,
}
}

public fun can_decrypt(
policy: &TimeLockPolicy,
user: address,
clock: &Clock
): bool {
let current_time = clock::timestamp_ms(clock);
policy.authorized_user == user && current_time >= policy.unlock_time
}
}

Step 2: Integrate with Seal

// src/time-locked-encryption.ts
import { createSealClient } from './seal-client';
import { TransactionBlock } from '@mysten/sui/transactions';

async function createTimeLocked() {
const { sealClient, suiClient } = await createSealClient();

// Create access policy on Sui
const txb = new TransactionBlock();

const unlockTime = Date.now() + 60000; // Unlock in 1 minute
const authorizedUser = "0x742d35cc6d4c0c08c0f9bf3c9b2b6c64b3b4f5c6d7e8f9a0b1c2d3e4f5a6b7c8";

txb.moveCall({
target: 'time_lock::policy::create_time_lock',
arguments: [
txb.pure(unlockTime),
txb.pure(authorizedUser)
]
});

// Execute transaction to create policy
const result = await suiClient.signAndExecuteTransactionBlock({
transactionBlock: txb,
signer: yourKeypair, // Your Sui keypair
});

const policyId = result.objectChanges?.find(
change => change.type === 'created'
)?.objectId;

// Now encrypt with this policy
const sensitiveData = "This will unlock in 1 minute!";

const encryptedData = await sealClient.encrypt({
data: Buffer.from(sensitiveData, 'utf-8'),
recipientId: authorizedUser,
accessPolicy: {
policyId,
policyType: 'time_lock'
}
});

console.log('Time-locked data created. Try decrypting after 1 minute.');

return {
encryptedData,
policyId,
unlockTime
};
}

Practical Examples

Example 1: Secure Messaging Application

// src/secure-messaging.ts
import { createSealClient } from './seal-client';

class SecureMessenger {
private sealClient: any;

constructor(sealClient: any) {
this.sealClient = sealClient;
}

async sendMessage(
message: string,
recipientAddress: string,
senderKeypair: any
) {
const messageData = {
content: message,
timestamp: Date.now(),
sender: senderKeypair.toSuiAddress(),
messageId: crypto.randomUUID()
};

const encryptedMessage = await this.sealClient.encrypt({
data: Buffer.from(JSON.stringify(messageData), 'utf-8'),
recipientId: recipientAddress,
metadata: {
type: 'secure_message',
sender: senderKeypair.toSuiAddress()
}
});

// Store encrypted message on decentralized storage (Walrus)
return this.storeOnWalrus(encryptedMessage);
}

async readMessage(encryptionId: string, recipientKeypair: any) {
// Retrieve from storage
const encryptedData = await this.retrieveFromWalrus(encryptionId);

// Decrypt with Seal
const decryptedData = await this.sealClient.decrypt({
ciphertext: encryptedData.ciphertext,
encryptionId: encryptedData.encryptionId,
recipientId: recipientKeypair.toSuiAddress()
});

return JSON.parse(decryptedData.toString('utf-8'));
}

private async storeOnWalrus(data: any) {
// Integration with Walrus storage
// This would upload the encrypted data to Walrus
// and return the blob ID for retrieval
}

private async retrieveFromWalrus(blobId: string) {
// Retrieve encrypted data from Walrus using blob ID
}
}

Example 2: Token-Gated Content Platform

// src/gated-content.ts
import { createSealClient } from './seal-client';

class ContentGating {
private sealClient: any;
private suiClient: any;

constructor(sealClient: any, suiClient: any) {
this.sealClient = sealClient;
this.suiClient = suiClient;
}

async createGatedContent(
content: string,
requiredNftCollection: string,
creatorKeypair: any
) {
// Create NFT ownership policy
const accessPolicy = await this.createNftPolicy(
requiredNftCollection,
creatorKeypair
);

// Encrypt content with NFT access requirement
const encryptedContent = await this.sealClient.encrypt({
data: Buffer.from(content, 'utf-8'),
recipientId: 'nft_holders', // Special recipient for NFT holders
accessPolicy: {
policyId: accessPolicy.policyId,
policyType: 'nft_ownership'
}
});

return {
contentId: encryptedContent.encryptionId,
accessPolicy: accessPolicy.policyId
};
}

async accessGatedContent(
contentId: string,
userAddress: string,
userKeypair: any
) {
// Verify NFT ownership first
const hasAccess = await this.verifyNftOwnership(
userAddress,
contentId
);

if (!hasAccess) {
throw new Error('Access denied: Required NFT not found');
}

// Decrypt content
const decryptedContent = await this.sealClient.decrypt({
encryptionId: contentId,
recipientId: userAddress
});

return decryptedContent.toString('utf-8');
}

private async createNftPolicy(collection: string, creator: any) {
// Create Move contract that checks NFT ownership
// Returns policy object ID
}

private async verifyNftOwnership(user: string, contentId: string) {
// Check if user owns required NFT
// Query Sui for NFT ownership
}
}

Example 3: Time-Locked Asset Transfer

// src/time-locked-transfer.ts
import { createSealClient } from './seal-client';

async function createTimeLockTransfer(
assetData: any,
recipientAddress: string,
unlockTimestamp: number,
senderKeypair: any
) {
const { sealClient, suiClient } = await createSealClient();

// Create time-lock policy on Sui
const timeLockPolicy = await createTimeLockPolicy(
unlockTimestamp,
recipientAddress,
senderKeypair,
suiClient
);

// Encrypt asset transfer data
const transferData = {
asset: assetData,
recipient: recipientAddress,
unlockTime: unlockTimestamp,
transferId: crypto.randomUUID()
};

const encryptedTransfer = await sealClient.encrypt({
data: Buffer.from(JSON.stringify(transferData), 'utf-8'),
recipientId: recipientAddress,
accessPolicy: {
policyId: timeLockPolicy.policyId,
policyType: 'time_lock'
}
});

console.log(`Asset locked until ${new Date(unlockTimestamp)}`);

return {
transferId: encryptedTransfer.encryptionId,
unlockTime: unlockTimestamp,
policyId: timeLockPolicy.policyId
};
}

async function claimTimeLockTransfer(
transferId: string,
recipientKeypair: any
) {
const { sealClient } = await createSealClient();

try {
const decryptedData = await sealClient.decrypt({
encryptionId: transferId,
recipientId: recipientKeypair.toSuiAddress()
});

const transferData = JSON.parse(decryptedData.toString('utf-8'));

// Process the asset transfer
console.log('Asset transfer unlocked:', transferData);

return transferData;
} catch (error) {
console.error('Transfer not yet unlocked or access denied:', error);
throw error;
}
}

Integration with Walrus Decentralized Storage

Seal works seamlessly with Walrus, Sui's decentralized storage solution. Here's how to integrate both:

// src/walrus-integration.ts
import { createSealClient } from './seal-client';

class SealWalrusIntegration {
private sealClient: any;
private walrusClient: any;

constructor(sealClient: any, walrusClient: any) {
this.sealClient = sealClient;
this.walrusClient = walrusClient;
}

async storeEncryptedData(
data: Buffer,
recipientAddress: string,
accessPolicy?: any
) {
// Encrypt with Seal
const encryptedData = await this.sealClient.encrypt({
data,
recipientId: recipientAddress,
accessPolicy
});

// Store encrypted data on Walrus
const blobId = await this.walrusClient.store(
encryptedData.ciphertext
);

// Return reference that includes both Seal and Walrus info
return {
blobId,
encryptionId: encryptedData.encryptionId,
accessPolicy: encryptedData.accessPolicy
};
}

async retrieveAndDecrypt(
blobId: string,
encryptionId: string,
userKeypair: any
) {
// Retrieve from Walrus
const encryptedData = await this.walrusClient.retrieve(blobId);

// Decrypt with Seal
const decryptedData = await this.sealClient.decrypt({
ciphertext: encryptedData,
encryptionId,
recipientId: userKeypair.toSuiAddress()
});

return decryptedData;
}
}

// Usage example
async function walrusExample() {
const { sealClient } = await createSealClient();
const walrusClient = new WalrusClient('https://walrus-testnet.sui.io');

const integration = new SealWalrusIntegration(sealClient, walrusClient);

const fileData = Buffer.from('Important document content');
const recipientAddress = '0x...';

// Store encrypted
const result = await integration.storeEncryptedData(
fileData,
recipientAddress
);

console.log('Stored with Blob ID:', result.blobId);

// Later, retrieve and decrypt
const decrypted = await integration.retrieveAndDecrypt(
result.blobId,
result.encryptionId,
recipientKeypair
);

console.log('Retrieved data:', decrypted.toString());
}

Threshold Encryption Advanced Configuration

For production applications, you'll want to configure custom threshold encryption with multiple key servers:

// src/advanced-threshold.ts
import { SealClient } from '@mysten/seal';

async function setupProductionSeal() {
// Configure with multiple independent key servers
const keyServers = [
'https://keyserver-1.your-org.com',
'https://keyserver-2.partner-org.com',
'https://keyserver-3.third-party.com',
'https://keyserver-4.backup-provider.com',
'https://keyserver-5.fallback.com'
];

const sealClient = new SealClient({
keyServers,
threshold: 3, // 3-of-5 threshold
network: 'mainnet',
// Advanced options
retryAttempts: 3,
timeoutMs: 10000,
backupKeyServers: [
'https://backup-1.emergency.com',
'https://backup-2.emergency.com'
]
});

return sealClient;
}

async function robustEncryption() {
const sealClient = await setupProductionSeal();

const criticalData = "Mission critical encrypted data";

// Encrypt with high security guarantees
const encrypted = await sealClient.encrypt({
data: Buffer.from(criticalData, 'utf-8'),
recipientId: '0x...',
// Require all 5 servers for maximum security
customThreshold: 5,
// Add redundancy
redundancy: 2,
accessPolicy: {
// Multi-factor requirements
requirements: ['nft_ownership', 'time_lock', 'multisig_approval']
}
});

return encrypted;
}

Security Best Practices

1. Key Management

// src/security-practices.ts

// GOOD: Use secure key derivation
import { generateKeypair } from '@mysten/sui/cryptography/ed25519';

const keypair = generateKeypair();

// GOOD: Store keys securely (example with environment variables)
const keypair = Ed25519Keypair.fromSecretKey(
process.env.PRIVATE_KEY
);

// BAD: Never hardcode keys
const badKeypair = Ed25519Keypair.fromSecretKey(
"hardcoded-secret-key-12345" // Don't do this!
);

2. Access Policy Validation

// Always validate access policies before encryption
async function secureEncrypt(data: Buffer, recipient: string) {
const { sealClient } = await createSealClient();

// Validate recipient address
if (!isValidSuiAddress(recipient)) {
throw new Error('Invalid recipient address');
}

// Check policy exists and is valid
const policy = await validateAccessPolicy(policyId);
if (!policy.isValid) {
throw new Error('Invalid access policy');
}

return sealClient.encrypt({
data,
recipientId: recipient,
accessPolicy: policy
});
}

3. Error Handling and Fallbacks

// Robust error handling
async function resilientDecrypt(encryptionId: string, userKeypair: any) {
const { sealClient } = await createSealClient();

try {
return await sealClient.decrypt({
encryptionId,
recipientId: userKeypair.toSuiAddress()
});
} catch (error) {
if (error.code === 'ACCESS_DENIED') {
throw new Error('Access denied: Check your permissions');
} else if (error.code === 'KEY_SERVER_UNAVAILABLE') {
// Try with backup configuration
return await retryWithBackupServers(encryptionId, userKeypair);
} else if (error.code === 'THRESHOLD_NOT_MET') {
throw new Error('Insufficient key servers available');
} else {
throw new Error(`Decryption failed: ${error.message}`);
}
}
}

4. Data Validation

// Validate data before encryption
function validateDataForEncryption(data: Buffer): boolean {
// Check size limits
if (data.length > 1024 * 1024) { // 1MB limit
throw new Error('Data too large for encryption');
}

// Check for sensitive patterns (optional)
const dataStr = data.toString();
if (containsSensitivePatterns(dataStr)) {
console.warn('Warning: Data contains potentially sensitive patterns');
}

return true;
}

Performance Optimization

1. Batching Operations

// Batch multiple encryptions for efficiency
async function batchEncrypt(dataItems: Buffer[], recipients: string[]) {
const { sealClient } = await createSealClient();

const promises = dataItems.map((data, index) =>
sealClient.encrypt({
data,
recipientId: recipients[index]
})
);

return Promise.all(promises);
}

2. Caching Key Server Responses

// Cache key server sessions to reduce latency
class OptimizedSealClient {
private sessionCache = new Map();

async encryptWithCaching(data: Buffer, recipient: string) {
let session = this.sessionCache.get(recipient);

if (!session || this.isSessionExpired(session)) {
session = await this.createNewSession(recipient);
this.sessionCache.set(recipient, session);
}

return this.encryptWithSession(data, session);
}
}

Testing Your Seal Integration

Unit Testing

// tests/seal-integration.test.ts
import { describe, it, expect } from 'jest';
import { createSealClient } from '../src/seal-client';

describe('Seal Integration', () => {
it('should encrypt and decrypt data successfully', async () => {
const { sealClient } = await createSealClient();
const testData = Buffer.from('test message');
const recipient = '0x742d35cc6d4c0c08c0f9bf3c9b2b6c64b3b4f5c6d7e8f9a0b1c2d3e4f5a6b7c8';

const encrypted = await sealClient.encrypt({
data: testData,
recipientId: recipient
});

expect(encrypted.encryptionId).toBeDefined();
expect(encrypted.ciphertext).toBeDefined();

const decrypted = await sealClient.decrypt({
ciphertext: encrypted.ciphertext,
encryptionId: encrypted.encryptionId,
recipientId: recipient
});

expect(decrypted.toString()).toBe('test message');
});

it('should enforce access control policies', async () => {
// Test that unauthorized users cannot decrypt
const { sealClient } = await createSealClient();

const encrypted = await sealClient.encrypt({
data: Buffer.from('secret'),
recipientId: 'authorized-user'
});

await expect(
sealClient.decrypt({
ciphertext: encrypted.ciphertext,
encryptionId: encrypted.encryptionId,
recipientId: 'unauthorized-user'
})
).rejects.toThrow('Access denied');
});
});

Deployment to Production

Environment Configuration

// config/production.ts
export const productionConfig = {
keyServers: [
process.env.KEY_SERVER_1,
process.env.KEY_SERVER_2,
process.env.KEY_SERVER_3,
process.env.KEY_SERVER_4,
process.env.KEY_SERVER_5
],
threshold: 3,
network: 'mainnet',
suiRpc: process.env.SUI_RPC_URL,
walrusGateway: process.env.WALRUS_GATEWAY,
// Security settings
maxDataSize: 1024 * 1024, // 1MB
sessionTimeout: 3600000, // 1 hour
retryAttempts: 3
};

Monitoring and Logging

// utils/monitoring.ts
export class SealMonitoring {
static logEncryption(encryptionId: string, recipient: string) {
console.log(`[SEAL] Encrypted data ${encryptionId} for ${recipient}`);
// Send to your monitoring service
}

static logDecryption(encryptionId: string, success: boolean) {
console.log(`[SEAL] Decryption ${encryptionId}: ${success ? 'SUCCESS' : 'FAILED'}`);
}

static logKeyServerHealth(serverUrl: string, status: string) {
console.log(`[SEAL] Key server ${serverUrl}: ${status}`);
}
}

Resources and Next Steps

Official Documentation

Community and Support

  • Sui Discord: Join the #seal channel for community support
  • GitHub Issues: Report bugs and request features
  • Developer Forums: Sui community forums for discussions

Advanced Topics to Explore

  1. Custom Access Policies: Build complex authorization logic with Move contracts
  2. Cross-Chain Integration: Use Seal with other blockchain networks
  3. Enterprise Key Management: Set up your own key server infrastructure
  4. Audit and Compliance: Implement logging and monitoring for regulated environments

Sample Applications

  • Secure Chat App: End-to-end encrypted messaging with Seal
  • Document Management: Enterprise document sharing with access controls
  • Digital Rights Management: Content distribution with usage policies
  • Privacy-Preserving Analytics: Encrypted data processing workflows

Conclusion

Seal represents a fundamental shift toward making privacy and encryption infrastructure-level concerns in Web3. By combining identity-based encryption, threshold security, and programmable access control, it provides developers with powerful tools to build truly secure and decentralized applications.

The key advantages of building with Seal include:

  • No Single Point of Failure: Distributed key servers eliminate central authorities
  • Programmable Security: Smart contract-based access policies provide flexible authorization
  • Developer-Friendly: TypeScript SDK integrates seamlessly with existing Web3 tooling
  • Storage Agnostic: Works with Walrus, IPFS, or any storage solution
  • Production Ready: Built by Mysten Labs with enterprise security standards

Whether you're securing user data, implementing subscription models, or building complex multi-party applications, Seal provides the cryptographic primitives and access control infrastructure you need to build with confidence.

Start building today, and join the growing ecosystem of developers making privacy a fundamental part of public infrastructure.


Ready to start building? Install @mysten/seal and begin experimenting with the examples in this tutorial. The decentralized web is waiting for applications that put privacy and security first.

Seal on Sui: A Programmable Secrets Layer for On-Chain Access Control

· 4 min read
Dora Noda
Software Engineer

Public blockchains give every participant a synchronized, auditable ledger—but they also expose every piece of data by default. Seal, now live on Sui Mainnet as of September 3, 2025, addresses this by pairing on-chain policy logic with decentralized key management so that Web3 builders can decide exactly who gets to decrypt which payloads.

TL;DR

  • What it is: Seal is a secrets-management network that lets Sui smart contracts enforce decryption policies on-chain while clients encrypt data with identity-based encryption (IBE) and rely on threshold key servers for key derivation.
  • Why it matters: Instead of custom backends or opaque off-chain scripts, privacy and access control become first-class Move primitives. Builders can store ciphertexts anywhere—Walrus is the natural companion—but still gate who can read.
  • Who benefits: Teams shipping token-gated media, time-locked reveals, private messaging, or policy-aware AI agents can plug into Seal’s SDK and focus on product logic, not bespoke crypto plumbing.

Policy Logic Lives in Move

Seal packages come with seal_approve* Move functions that define who can request keys for a given identity string and under which conditions. Policies can mix NFT ownership, allowlists, time locks, or custom role systems. When a user or agent asks to decrypt, key servers evaluate these policies via Sui full-node state and only approve if the chain agrees.

Because the access rules are part of your on-chain package, they are transparent, auditable, and versionable alongside the rest of your smart contract code. Governance updates can be rolled out like any other Move upgrade, with community review and on-chain history.

Threshold Cryptography Handles the Keys

Seal encrypts data to application-defined identities. A committee of independent key servers—chosen by the developer—shares the IBE master secret. When a policy check passes, each server derives a key share for the requested identity. Once a quorum of t servers responds, the client combines the shares into a usable decryption key.

You get to set the trade-off between liveness and confidentiality by picking committee members (Ruby Nodes, NodeInfra, Overclock, Studio Mirai, H2O Nodes, Triton One, or Mysten’s Enoki service) and selecting the threshold. Need stronger availability? Choose a larger committee with a lower threshold. Want higher privacy assurances? Tighten the quorum and lean on permissioned providers.

Developer Experience: SDKs and Session Keys

Seal ships a TypeScript SDK (npm i @mysten/seal) that handles encrypt/decrypt flows, identity formatting, and batching. It also issues session keys so wallets are not constantly spammed with prompts when an app needs repeated access. For advanced workflows, Move contracts can request on-chain decryption via specialized modes, allowing logic like escrow reveals or MEV-resistant auctions to run directly in smart contract code.

Because Seal is storage-agnostic, teams can pair it with Walrus for verifiable blob storage, with IPFS, or even with centralized stores when that fits operational realities. The encryption boundary—and its policy enforcement—travels with the data regardless of where the ciphertext lives.

Designing with Seal: Best Practices

  • Model availability risk: Thresholds such as 2-of-3 or 3-of-5 map directly to uptime guarantees. Production deployments should mix providers, monitor telemetry, and negotiate SLAs before entrusting critical workflows.
  • Be mindful of state variance: Policy evaluation depends on full nodes performing dry_run calls. Avoid rules that hinge on rapidly changing counters or intra-checkpoint ordering to prevent inconsistent approvals across servers.
  • Plan for key hygiene: Derived keys live on the client. Instrument logging, rotate session keys, and consider envelope encryption—use Seal to protect a symmetric key that encrypts the larger payload—to limit blast radius if a device is compromised.
  • Architect for rotation: A ciphertext’s committee is fixed at encryption time. Build upgrade paths that re-encrypt data through new committees when you need to swap providers or adjust trust assumptions.

What Comes Next

Seal’s roadmap points toward validator-operated MPC servers, DRM-style client tooling, and post-quantum KEM options. For builders exploring AI agents, premium content, or regulated data flows, today’s release already provides a clear blueprint: encode your policy in Move, compose a diverse key committee, and deliver encrypted experiences that respect user privacy without leaving Sui’s trust boundary.

If you are considering Seal for your next launch, start by prototyping a simple NFT-gated policy with a 2-of-3 open committee, then iterate toward the provider mix and operational controls that match your app’s risk profile.

Sui Blockchain: Engineering the Future of AI, Robotics, and Quantum Computing

· 22 min read
Dora Noda
Software Engineer

Sui blockchain has emerged as the most technically advanced platform for next-generation computational workloads, achieving 297,000 transactions per second with 480ms finality while integrating quantum-resistant cryptography and purpose-built robotics infrastructure. Led by Chief Cryptographer Kostas Chalkias—who has 50+ academic publications and pioneered cryptographic innovations at Meta's Diem project—Sui represents a fundamental architectural departure from legacy blockchains, designed specifically to enable autonomous AI agents, multi-robot coordination, and post-quantum security.

Unlike competitors retrofitting blockchain for advanced computing, Sui's object-centric data model, Move programming language, and Mysticeti consensus protocol were engineered from inception for parallel AI operations, real-time robotics control, and cryptographic agility—capabilities validated through live deployments including 50+ AI projects, multi-robot collaboration demonstrations, and the world's first backward-compatible quantum-safe upgrade path for blockchain wallets.

Sui's revolutionary technical foundation enables the impossible

Sui's architecture breaks from traditional account-based blockchain models through three synergistic innovations that uniquely position it for AI, robotics, and quantum applications.

The Mysticeti consensus protocol achieves unprecedented performance through uncertified DAG architecture, reducing consensus latency to 390-650ms (80% faster than its predecessor) while supporting 200,000+ TPS sustained throughput. This represents a fundamental breakthrough: traditional blockchains like Ethereum require 12-15 seconds for finality, while Sui's fast path for single-owner transactions completes in just 250ms. The protocol's multiple leaders per round and implicit commitment mechanism enable real-time AI decision loops and robotics control systems requiring sub-second feedback—applications physically impossible on sequential execution chains.

The object-centric data model treats every asset as an independently addressable object with explicit ownership and versioning, enabling static dependency analysis before execution. This architectural choice eliminates retroactive conflict detection overhead plaguing optimistic execution models, allowing thousands of AI agents to transact simultaneously without contention. Objects bypass consensus entirely when owned by single parties, saving 70% processing time for common operations. For robotics, this means individual robots maintain owned objects for sensor data while coordinating through shared objects only when necessary—precisely mirroring real-world autonomous system architectures.

Move programming language provides resource-oriented security impossible in account-based languages like Solidity. Assets exist as first-class types that cannot be copied or destroyed—only moved between contexts—preventing entire vulnerability classes including reentrancy attacks, double-spending, and unauthorized asset manipulation. Move's linear type system and formal verification support make it particularly suitable for AI agents managing valuable assets autonomously. Programmable Transaction Blocks compose up to 1,024 function calls atomically, enabling complex multi-step AI workflows with guaranteed consistency.

Kostas Chalkias architects quantum resistance as competitive advantage

Kostas "Kryptos" Chalkias brings unparalleled cryptographic expertise to Sui's quantum computing strategy, having authored the Blockchained Post-Quantum Signature (BPQS) algorithm, led cryptography for Meta's Diem blockchain, and published 50+ peer-reviewed papers cited 1,374+ times. His July 2025 research breakthrough demonstrated the first backward-compatible quantum-safe upgrade path for blockchain wallets, applicable to EdDSA-based chains including Sui, Solana, Near, and Cosmos.

Chalkias's vision positions quantum resistance not as distant concern but immediate competitive differentiator. He warned in January 2025 that "governments are well aware of the risks posed by quantum computing. Agencies worldwide have issued mandates that classical algorithms like ECDSA and RSA must be deprecated by 2030 or 2035." His technical insight: even if users retain private keys, they may be unable to generate post-quantum proofs of ownership without exposing keys to quantum attacks. Sui's solution leverages zero-knowledge STARK proofs to prove knowledge of key generation seeds without revealing sensitive data—a cryptographic innovation impossible on blockchains lacking built-in agility.

The cryptographic agility framework represents Chalkias's signature design philosophy. Sui uses 1-byte flags to distinguish signature schemes (Ed25519, ECDSA Secp256k1/r1, BLS12-381, multisig, zkLogin), enabling protocol-level support for new algorithms without smart contract overhead or hard forks. This architecture allows "flip of a button" transitions to NIST-standardized post-quantum algorithms including CRYSTALS-Dilithium (2,420-byte signatures) and FALCON (666-byte signatures) when quantum threats materialize. Chalkias architected multiple migration paths: proactive (new accounts generate PQ keys at creation), adaptive (STARK proofs enable PQ migration from existing seeds), and hybrid (time-limited multisig combining classical and quantum-resistant keys).

His zkLogin innovation demonstrates cryptographic creativity applied to usability. The system enables users to authenticate via Google, Facebook, or Twitch credentials using Groth16 zero-knowledge proofs over BN254 curves, with user-controlled salt preventing Web2-Web3 identity correlation. zkLogin addresses include quantum considerations from design—the STARK-based seed knowledge proofs provide post-quantum security even when underlying JWT signatures transition from RSA to lattice-based alternatives.

At Sui Basecamp 2025, Chalkias unveiled native verifiable randomness, zk tunnels for off-chain logic, lightning transactions (zero-gas, zero-latency), and time capsules for encrypted future data access. These features power private AI agent simulations, gambling applications requiring trusted randomness, and zero-knowledge poker games—all impossible without protocol-level cryptographic primitives. His vision: "A goal for Sui was to become the first blockchain to adopt post-quantum technologies, thereby improving security and preparing for future regulatory standards."

AI agent infrastructure reaches production maturity on Sui

Sui hosts the blockchain industry's most comprehensive AI agent ecosystem with 50+ projects spanning infrastructure, frameworks, and applications—all leveraging Sui's parallel execution and sub-second finality for real-time autonomous operations.

Atoma Network launched on Sui mainnet in December 2024 as the first fully decentralized AI inference layer, positioning itself as the "decentralized hyperscaler for open-source AI." All processing occurs in Trusted Execution Environments (TEEs) ensuring complete privacy and censorship resistance while maintaining API compatibility with OpenAI endpoints. The Utopia chat application demonstrates production-ready privacy-preserving AI with performance matching ChatGPT, settling payments and validation through Sui's sub-second finality. Atoma enables DeFi portfolio management, social media content moderation, and personal assistant applications—use cases requiring both AI intelligence and blockchain settlement impossible to achieve on slower chains.

OpenGraph Labs achieved a technical breakthrough as the first fully on-chain AI inference system designed specifically for AI agents. Their TensorflowSui SDK automates deployment of Web2 ML models (TensorFlow, PyTorch) onto Sui blockchain, storing training data on Walrus decentralized storage while executing inferences using Programmable Transaction Blocks. OpenGraph provides three flexible inference approaches: PTB inference for critical computations requiring atomicity, split transactions for cost optimization, and hybrid combinations customized per use case. This architecture eliminates "black box" AI risks through fully verifiable, auditable inference processes with clearly defined algorithmic ownership—critical for regulated industries requiring explainable AI.

Talus Network launched on Sui in February 2025 with the Nexus framework enabling developers to build composable AI agents executing workflows directly on-chain. Talus's Idol.fun platform demonstrates consumer-facing AI agents as tokenized entities operating autonomously 24/7, making real-time decisions leveraging Walrus-stored datasets for market sentiment, DeFi statistics, and social trends. Example applications include dynamic NFT profile management, DeFi liquidity strategy agents loading models in real-time, and fraud detection agents analyzing historical transaction patterns from immutable Sui checkpoints.

The Alibaba Cloud partnership announced in August 2025 integrated AI coding assistants into ChainIDE development platform with multi-language support (English, Chinese, Korean). Features include natural language to Move code generation, intelligent autocompletion, real-time security vulnerability detection, and automated documentation generation—lowering barriers for 60% of Sui's non-English-speaking developer target. This partnership validates Sui's positioning as the AI development platform, not merely an AI deployment platform.

Sui's sponsored transactions eliminate gas payment friction for AI agents—builders can cover transaction fees allowing agents to operate without holding SUI tokens. The MIST denomination (1 SUI = 1 billion MIST) enables micropayments as small as fractions of a cent, perfect for pay-per-inference AI services. With average transaction costs around $0.0023, AI agents can execute thousands of operations daily for pennies, making autonomous agent economies economically viable.

Multi-robot collaboration proves Sui's real-time coordination advantage

Sui demonstrated the blockchain industry's first multi-robot collaboration system using Mysticeti consensus, validated by Tiger Research's comprehensive 2025 analysis. The system enables robots to share consistent state in distributed environments while maintaining Byzantine Fault Tolerance—ensuring consensus even when robots malfunction or are compromised by adversaries.

The technical architecture leverages Sui's object model where robots exist as programmable objects with metadata, ownership, and capabilities. Tasks get assigned to specific robot objects with smart contracts automating sequencing and resource allocation rules. The system maintains reliability without central servers, with parallel block proposals from multiple validators preventing single points of failure. Sub-second transaction finality enables real-time adjustment loops—robots receive task confirmations and state updates in under 400ms, matching control system requirements for responsive autonomous operation.

Physical testing with dog-like robots already demonstrated feasibility, with teams from NASA, Meta, and Uber backgrounds developing Sui-based robotics applications. Sui's unique "internetless mode" capability—operating via radio waves without stable internet connectivity—provides revolutionary advantages for rural deployments in Africa, rural Asia, and emergency scenarios. This offline capability exists exclusively on Sui among major blockchains, validated by testing during Spain/Portugal power outages.

The 3DOS partnership announced in September 2024 validates Sui's manufacturing robotics capabilities at scale. 3DOS integrated 79,909+ 3D printers across 120+ countries as Sui's exclusive blockchain partner, creating an "Uber for 3D printing" network enabling peer-to-peer manufacturing. Notable clients include John Deere, Google, MIT, Harvard, Bosch, British Army, US Navy, US Air Force, and NASA—demonstrating enterprise-grade trust in Sui's infrastructure. The system enables robots to autonomously order and print replacement parts through smart contract automation, facilitating robot self-repair with near-zero human intervention. This addresses the $15.6 trillion global manufacturing market through on-demand production eliminating inventory, waste, and international shipping.

Sui's Byzantine Fault Tolerance proves critical for safety-critical robotics applications. The consensus mechanism tolerates up to f faulty/malicious robots in a 3f+1 system, ensuring autonomous vehicle fleets, warehouse robots, and manufacturing systems maintain coordination despite individual failures. Smart contracts enforce safety constraints and operating boundaries, with immutable audit trails providing accountability for autonomous decisions—requirements impossible to meet with centralized coordination servers vulnerable to single points of failure.

Quantum resistance roadmap delivers cryptographic superiority

Sui's quantum computing strategy represents the blockchain industry's only comprehensive, proactive approach aligned with NIST mandates requiring classical algorithm deprecation by 2030 and full quantum-resistant standardization by 2035.

Chalkias's July 2025 breakthrough research demonstrated that EdDSA-based chains including Sui can implement quantum-safe wallet upgrades without hard forks, address changes, or account freezing through zero-knowledge proofs proving seed knowledge. This enables secure migration even for dormant accounts—solving the existential threat facing blockchains where millions of wallets "could be drained instantly" once quantum computers arrive. The technical innovation uses STARK proofs (quantum-resistant hash-based security) to prove knowledge of EdDSA key generation seeds without exposing sensitive data, allowing users to establish PQ key ownership tied to existing addresses.

Sui's cryptographic agility architecture enables multiple transition strategies: proactive (PQ keys sign PreQ public keys at creation), adaptive (STARK proofs migrate existing addresses), and hybrid (time-limited multisig with both classical and PQ keys). The protocol supports immediate deployment of NIST-standardized algorithms including CRYSTALS-Dilithium (ML-DSA), FALCON (FN-DSA), and SPHINCS+ (SLH-DSA) for lattice-based and hash-based post-quantum security. Validator BLS signatures transition to lattice-based alternatives, hash functions upgrade from 256-bit to 384-bit outputs for quantum-resistant collision resistance, and zkLogin circuits migrate from Groth16 to STARK-based zero-knowledge proofs.

The Nautilus framework launched in June 2025 provides secure off-chain computation using self-managed TEEs (Trusted Execution Environments), currently supporting AWS Nitro Enclaves with future Intel TDX and AMD SEV compatibility. For AI applications, Nautilus enables private AI inference with cryptographic attestations verified on-chain, solving the tension between computational efficiency and verifiability. Launch partners including Bluefin (TEE-based order matching at \u003c1ms), TensorBlock (AI agent infrastructure), and OpenGradient demonstrate production readiness for privacy-preserving quantum-resistant computation.

Comparative analysis reveals Sui's quantum advantage: Ethereum remains in planning phase with Vitalik Buterin stating quantum resistance is "at least a decade away," requiring hard forks and community consensus. Solana launched Winternitz Vault in January 2025 as an optional hash-based signature feature requiring user opt-in, not protocol-wide implementation. Other major blockchains (Aptos, Avalanche, Polkadot) remain in research phase without concrete implementation timelines. Only Sui designed cryptographic agility as a foundational principle enabling rapid algorithm transitions without governance battles or network splits.

Technical architecture synthesis creates emergent capabilities

Sui's architectural components interact synergistically to create capabilities exceeding the sum of individual features—a characteristic distinguishing truly innovative platforms from incremental improvements.

The Move language resource model combined with parallel object execution enables unprecedented throughput for AI agent swarms. Traditional blockchains using account-based models require sequential execution to prevent race conditions, limiting AI agent coordination to single-threaded bottlenecks. Sui's explicit dependency declaration through object references allows validators to identify independent operations before execution, scheduling thousands of AI agent transactions simultaneously across CPU cores. This state access parallelization (versus optimistic execution requiring conflict detection) provides predictable performance without retroactive transaction failures—critical for AI systems requiring reliability guarantees.

Programmable Transaction Blocks amplify Move's composability by enabling up to 1,024 heterogeneous function calls in atomic transactions. AI agents can execute complex workflows—swap tokens, update oracle data, trigger machine learning inference, mint NFTs, send notifications—all guaranteed to succeed or fail together. This heterogeneous composition moves logic from smart contracts to transaction level, dramatically reducing gas costs while increasing flexibility. For robotics, PTBs enable atomic multi-step operations like "check inventory, order parts, authorize payment, update status" with cryptographic guarantees of consistency.

The consensus bypass fast path for single-owner objects creates a two-tier performance model perfectly matching AI/robotics access patterns. Individual robots maintain private state (sensor readings, operational parameters) as owned objects processed in 250ms without validator consensus. Coordination points (task queues, resource pools) exist as shared objects requiring 390ms consensus. This architecture mirrors real-world autonomous systems where agents maintain local state but coordinate through shared resources—Sui's object model provides blockchain-native primitives matching these patterns naturally.

zkLogin solves the onboarding friction preventing mainstream AI agent adoption. Traditional blockchain requires users to manage seed phrases and private keys—cognitively demanding and error-prone. zkLogin enables authentication via familiar OAuth credentials (Google, Facebook, Twitch) with user-controlled salt preventing Web2-Web3 identity correlation. AI agents can operate under Web2 authentication while maintaining blockchain security, dramatically lowering barriers for consumer applications. The 10+ dApps already integrating zkLogin demonstrate practical viability for non-crypto-native audiences.

Competitive positioning reveals technical leadership and ecosystem growth

Comparative analysis across major blockchains (Solana, Ethereum, Aptos, Avalanche, Polkadot) reveals Sui's technical superiority for advanced computing workloads balanced against Ethereum's ecosystem maturity and Solana's current DePIN adoption.

Performance metrics establish Sui as the throughput leader with 297,000 TPS tested on 100 validators maintaining 480ms finality, versus Solana's 65,000-107,000 TPS theoretical (3,000-4,000 sustained) and Ethereum's 15-30 TPS base layer. Aptos achieves 160,000 TPS theoretical with similar Move-based architecture but different execution models. For AI workloads requiring real-time decisions, Sui's 480ms finality enables immediate response loops impossible on Ethereum's 12-15 minute finality or even Solana's occasional network congestion (75% transaction failures in April 2024 during peak load).

Quantum resistance analysis shows Sui as the only blockchain with quantum-resistant cryptography designed into core architecture from inception. Ethereum addresses quantum in "The Splurge" roadmap phase but Vitalik Buterin estimates 20% probability quantum breaks crypto by 2030, relying on emergency "recovery fork" plans reactive rather than proactive. Solana's Winternitz Vault provides optional quantum protection requiring user opt-in, not automatic network-wide security. Aptos, Avalanche, and Polkadot remain in research phase without concrete timelines. Sui's cryptographic agility with multiple migration paths, STARK-based zkLogin, and NIST-aligned roadmap positions it as the only blockchain ready for mandated 2030/2035 post-quantum transitions.

AI agent ecosystems show Solana currently leading adoption with mature tooling (SendAI Agent Kit, ElizaOS) and largest developer community, but Sui demonstrates superior technical capability through 300,000 TPS capacity, sub-second latency, and 50+ projects including production platforms (Atoma mainnet, Talus Nexus, OpenGraph on-chain inference). Ethereum focuses on institutional AI standards (ERC-8004 for AI identity/trust) but 15-30 TPS base layer limits real-time AI applications to Layer 2 solutions. The Alibaba Cloud partnership positioning Sui as the AI development platform (not merely deployment platform) signals strategic differentiation from pure financial blockchains.

Robotics capabilities exist exclusively on Sui among major blockchains. No competitor demonstrates multi-robot collaboration infrastructure, Byzantine Fault Tolerant coordination, or "internetless mode" offline operation. Tiger Research's analysis concludes "blockchain may be more suitable infrastructure for robots than for humans" given robots' ability to leverage decentralized coordination without centralized trust. With Morgan Stanley projecting 1 billion humanoid robots by 2050, Sui's purpose-built robotics infrastructure creates first-mover advantage in the emerging robot economy where autonomous systems require identity, payments, contracts, and coordination—primitives Sui provides natively.

Move programming language advantages position both Sui and Aptos above Solidity-based chains for complex applications requiring security. Move's resource-oriented model prevents vulnerability classes impossible to fix in Solidity, evidenced by $1.1+ billion lost to exploits in 2024 on Ethereum. Formal verification support, linear type system, and first-class asset abstractions make Move particularly suitable for AI agents managing valuable assets autonomously. Sui Move's object-centric variant (versus account-based Diem Move) enables parallel execution advantages unavailable on Aptos despite shared language heritage.

Real-world implementations validate technical capabilities

Sui's production deployments demonstrate the platform transitioning from technical potential to practical utility across AI, robotics, and quantum domains.

AI infrastructure maturity shows clear traction with Atoma Network's December 2024 mainnet launch serving production AI inference, Talus's February 2025 Nexus framework deployment enabling composable agent workflows, and Swarm Network's $13 million funding round backed by Kostas Chalkias selling 10,000+ AI Agent Licenses on Sui. The Alibaba Cloud partnership provides enterprise-grade validation with AI coding assistants integrated into developer tooling, demonstrating strategic commitment beyond speculative applications. OpenGraph Labs winning first place at Sui AI Typhoon Hackathon with on-chain ML inference signals technical innovation recognized by expert judges.

Manufacturing robotics reached commercial scale through 3DOS's 79,909-printer network across 120+ countries serving NASA, US Navy, US Air Force, John Deere, and Google. This represents the largest blockchain-integrated manufacturing network globally, processing 4.2+ million parts with 500,000+ users. The peer-to-peer model enabling robots to autonomously order replacement parts demonstrates smart contract automation eliminating coordination overhead at industrial scale—proof of concept validated by demanding government and aerospace clients requiring reliability and security.

Financial metrics show growing adoption with $538 million TVL, 17.6 million monthly active wallets (February 2025 peak), and SUI token market cap exceeding $16 billion. Mysten Labs achieved $3+ billion valuation backed by a16z, Binance Labs, Coinbase Ventures, and Jump Crypto—institutional validation of technical potential. Swiss banks (Sygnum, Amina Bank) offering Sui custody and trading provides traditional finance onramps, while Grayscale, Franklin Templeton, and VanEck institutional products signal mainstream recognition.

Developer ecosystem growth demonstrates sustainability with comprehensive tooling (TypeScript, Rust, Python, Swift, Dart, Golang SDKs), AI coding assistants in ChainIDE, and active hackathon programs where 50% of winners focused on AI applications. The 122 active validators on mainnet provide adequate decentralization while maintaining performance, balancing security with throughput better than highly centralized alternatives.

Strategic vision positions Sui for convergence era

Kostas Chalkias and Mysten Labs leadership articulate a coherent long-term vision distinguishing Sui from competitors focused on narrow use cases or iterative improvements.

Chalkias's bold prediction that "eventually, blockchain will surpass even Visa for speed of transaction. It will be the norm. I don't see how we can escape from this" signals confidence in technical trajectory backed by architectural decisions enabling that future. His statement that Mysten Labs "could surpass what Apple is today" reflects ambition grounded in building foundational infrastructure for next-generation computing rather than incremental DeFi applications. The decision to name his son "Kryptos" (Greek for "secret/hidden") symbolizes personal commitment to cryptographic innovation as civilizational infrastructure.

The three-pillar strategy integrating AI, robotics, and quantum computing creates mutually reinforcing advantages. Quantum-resistant cryptography enables long-term asset security for AI agents operating autonomously. Sub-second finality supports real-time robotics control loops. Parallel execution allows thousands of AI agents coordinating simultaneously. The object model provides natural abstraction for both AI agent state and robot device representation. This architectural coherence distinguishes purposeful platform design from bolted-on features.

Sui Basecamp 2025 technology unveils demonstrate continuous innovation with native verifiable randomness (eliminates oracle dependencies for AI inference), zk tunnels enabling private video calls directly on Sui, lightning transactions for zero-gas operations during emergencies, and time capsules for encrypted future data access. These features address real user problems (privacy, reliability, accessibility) rather than academic exercises, with clear applications for AI agents requiring trusted randomness, robotics systems needing offline operation, and quantum-resistant encryption for sensitive data.

The positioning as "coordination layer for wide range of applications" from healthcare data management to personal data ownership to robotics reflects platform ambitions beyond financial speculation. Chalkias's identification of healthcare data inefficiency as problem requiring common database showcases thinking about societal infrastructure rather than narrow blockchain enthusiast niches. This vision attracts research labs, hardware startups, and governments—audiences seeking reliable infrastructure for long-term projects, not speculative yield farming.

Technical roadmap delivers actionable execution timeline

Sui's development roadmap provides concrete milestones demonstrating progression from vision to implementation across all three focus domains.

Quantum resistance timeline aligns with NIST mandates: 2025-2027 completes cryptographic agility infrastructure and testing, 2028-2030 introduces protocol upgrades for Dilithium/FALCON signatures with hybrid PreQ-PQ operation, 2030-2035 achieves full post-quantum transition deprecating classical algorithms. The multiple migration paths (proactive, adaptive, hybrid) provide flexibility for different user segments without forcing single adoption strategy. Hash function upgrades to 384-bit outputs and zkLogin PQ-zkSNARK research proceed in parallel, ensuring comprehensive quantum readiness rather than piecemeal patches.

AI infrastructure expansion shows clear milestones with Walrus mainnet launch (Q1 2025) providing decentralized storage for AI models, Talus Nexus framework enabling composable agent workflows (February 2025 deployment), and Nautilus TEE framework expanding to Intel TDX and AMD SEV beyond current AWS Nitro Enclaves support. The Alibaba Cloud partnership roadmap includes expanded language support, deeper ChainIDE integration, and demo days across Hong Kong, Singapore, and Dubai targeting developer communities. OpenGraph's on-chain inference explorer and TensorflowSui SDK maturation provide practical tools for AI developers beyond theoretical frameworks.

Robotics capabilities advancement progresses from multi-robot collaboration demos to production deployments with 3DOS network expansion, "internetless mode" radio wave transaction capabilities, and zkTunnels enabling zero-gas robot commands. The technical architecture supporting Byzantine Fault Tolerance, sub-second coordination loops, and autonomous M2M payments exists today—adoption barriers are educational and ecosystem-building rather than technical limitations. NASA, Meta, and Uber alumni involvement signals serious engineering talent addressing real-world robotics challenges versus academic research projects.

Protocol improvements include Mysticeti consensus refinements maintaining 80% latency reduction advantage, horizontal scaling through Pilotfish multi-machine execution, and storage optimization for growing state. The checkpoint system (every ~3 seconds) provides verifiable snapshots for AI training data and robotics audit trails. Transaction size shrinking to single-byte preset formats reduces bandwidth requirements for IoT devices. Sponsored transaction expansion eliminates gas friction for consumer applications requiring seamless Web2-like UX.

Technical excellence positions Sui for advanced computing dominance

Comprehensive analysis across technical architecture, leadership vision, real-world implementations, and competitive positioning reveals Sui as the blockchain platform uniquely prepared for AI, robotics, and quantum computing convergence.

Sui achieves technical superiority through measured performance metrics: 297,000 TPS with 480ms finality surpasses all major competitors, enabling real-time AI agent coordination and robotics control impossible on slower chains. The object-centric data model combined with Move language security provides programming model advantages preventing vulnerability classes plaguing account-based architectures. Cryptographic agility designed from inception—not retrofitted—enables quantum-resistant transitions without hard forks or governance battles. These capabilities exist in production today on mainnet with 122 validators, not as theoretical whitepapers or distant roadmaps.

Visionary leadership through Kostas Chalkias's 50+ publications, 8 US patents, and cryptographic innovations (zkLogin, BPQS, Winterfell STARK, HashWires) provides intellectual foundation distinguishing Sui from technically competent but unimaginative competitors. His quantum computing breakthrough research (July 2025), AI infrastructure support (Swarm Network backing), and public communication (Token 2049, Korea Blockchain Week, London Real) establish thought leadership attracting top-tier developers and institutional partners. The willingness to architect for 2030+ timeframes versus quarterly metrics demonstrates long-term strategic thinking required for platform infrastructure.

Ecosystem validation through production deployments (Atoma mainnet AI inference, 3DOS 79,909-printer network, Talus agent frameworks) proves technical capabilities translate to real-world utility. Institutional partnerships (Alibaba Cloud, Swiss bank custody, Grayscale/Franklin Templeton products) signal mainstream recognition beyond blockchain-native enthusiasts. Developer growth metrics (50% of hackathon winners in AI, comprehensive SDK coverage, AI coding assistants) demonstrate sustainable ecosystem expansion supporting long-term adoption.

The strategic positioning as blockchain infrastructure for the robot economy, quantum-resistant financial systems, and autonomous AI agent coordination creates differentiated value proposition versus competitors focused on incremental improvements to existing blockchain use cases. With Morgan Stanley projecting 1 billion humanoid robots by 2050, NIST mandating quantum-resistant algorithms by 2030, and McKinsey forecasting 40% productivity gains from agentic AI—Sui's technical capabilities align precisely with macro technology trends requiring decentralized infrastructure.

For organizations building advanced computing applications on blockchain, Sui offers unmatched technical capabilities (297K TPS, 480ms finality), future-proof quantum-resistant architecture (only blockchain designed for quantum from inception), proven robotics infrastructure (only demonstrated multi-robot collaboration), superior programming model (Move language security and expressiveness), and real-time performance enabling AI/robotics applications physically impossible on sequential execution chains. The platform represents not incremental improvement but fundamental architectural rethinking for blockchain's next decade.

Sui's Quantum-Ready Foundation for Autonomous Intelligence

· 24 min read
Dora Noda
Software Engineer

Sui blockchain stands apart from competitors through its foundational cryptographic agility and object-centric architecture, positioning it as the only major Layer 1 blockchain simultaneously advancing AI integration, robotics coordination, and quantum-resistant security. This isn't marketing positioning—it's architectural reality. Co-founder and Chief Cryptographer Kostas "Kryptos" Chalkias has systematically built these capabilities into Sui's core design since inception, creating what he describes as infrastructure that will "surpass even Visa for speed" while remaining secure against quantum threats that could "destroy all modern cryptography" within a decade.

The technical foundation is already production-ready: 390-millisecond consensus finality enables real-time AI agent coordination, parallel execution processes 297,000 transactions per second at peak, and EdDSA signature schemes provide a proven migration path to post-quantum cryptography without requiring hard forks. Meanwhile, Bitcoin and Ethereum face existential threats from quantum computing with no backward-compatible upgrade path. Chalkias's vision centers on three converging pillars—AI as coordination layer, autonomous robotic systems requiring sub-second finality, and cryptographic frameworks that remain secure through 2035 and beyond. His statements across conferences, research papers, and technical implementations reveal not speculative promises but systematic execution of a roadmap established at Mysten Labs' founding in 2022.

This matters beyond blockchain tribalism. By 2030, NIST mandates require deprecation of current encryption standards. Autonomous systems from manufacturing robots to AI agents will require trustless coordination at scale. Sui's architecture addresses both inevitabilities simultaneously while competitors scramble to retrofit solutions. The question isn't whether these technologies converge but which platforms survive the convergence intact.

The cryptographer who named his son Kryptos

Kostas Chalkias brings uncommon credibility to blockchain's intersection with emerging technologies. Before co-founding Mysten Labs, he served as Lead Cryptographer for Meta's Diem project and Novi wallet, worked with Mike Hearn (one of Bitcoin's first developers associated with Satoshi Nakamoto) at R3's Corda blockchain, and holds a PhD in Identity-Based Cryptography with 50+ scientific publications, 8 US patents, and 1,374 academic citations. His dedication to the field extends to naming his son Kryptos—"I'm so deep into the technology of the blockchain and cryptography, that I actually convinced my wife to have a child that is called Kryptos," he explained during a Sui blog interview.

His career trajectory reveals consistent focus on practical cryptography for massive scale. At Facebook, he built security infrastructure for WhatsApp and authentication systems serving billions. At R3, he pioneered zero-knowledge proofs and post-quantum signatures for enterprise blockchain. His early career included founding Betmanager, an AI-powered platform predicting soccer results using stock market techniques—experience informing his current perspective on blockchain-AI integration. This blend of AI exposure, production cryptography, and blockchain infrastructure positions him uniquely to architect systems bridging these domains.

Chalkias's technical philosophy emphasizes "cryptographic agility"—building flexibility into foundational protocols rather than assuming permanence. At the Emergence Conference in Prague (December 2024), he articulated this worldview: "Eventually, blockchain will surpass even Visa for speed of transaction. It will be the norm. I don't see how we can escape from this." But speed alone doesn't suffice. His work consistently pairs performance with forward-looking security, recognizing that quantum computers pose threats requiring action today, not when the danger materializes. This dual focus—present performance and future resilience—defines Sui's architectural decisions across AI, robotics, and quantum resistance.

Architecture built for intelligent agents

Sui's technical foundation diverges fundamentally from account-based blockchains like Ethereum and Solana. Every entity exists as an object with globally unique 32-byte ID, version number, ownership field, and typed contents. This object-centric model isn't aesthetic preference but enabler of parallel execution at scale. When AI agents operate as owned objects, they bypass consensus entirely for single-writer operations, achieving ~400ms finality. When multiple agents coordinate through shared objects, Sui's Mysticeti consensus delivers 390ms latency—still sub-second but through Byzantine Fault Tolerant agreement.

The Move programming language, originally developed at Meta for Diem and enhanced for Sui, enforces resource safety at the type system level. Assets cannot be accidentally copied, destroyed, or created without permission. For AI applications managing valuable data or model weights, this prevents entire vulnerability classes plaguing Solidity smart contracts. Chalkias highlighted this during Sui Basecamp 2025 in Dubai: "We introduced zero knowledge proofs, privacy preserving technologies, inside Sui from day one. So someone can now create a KYC system with as much privacy as they want."

Parallel transaction execution reaches theoretical limits through explicit dependency declaration. Unlike optimistic execution requiring retroactive verification, Sui's scheduler identifies non-overlapping transactions upfront via unique object IDs. Independent operations execute concurrently across validator cores without interference. This architecture demonstrated 297,000 TPS peak throughput in testing—not theoretical maximums but measured performance on production hardware. For AI applications, this means thousands of inference requests process simultaneously, multiple autonomous agents coordinate without blocking, and real-time decision-making operates at human-perceptible speeds.

The Mysticeti consensus protocol, introduced in 2024, achieves what Chalkias and co-authors proved mathematically optimal: three message rounds for commitment. By eliminating explicit block certification and implementing uncertified DAG structures, Mysticeti reduced latency 80% from prior Narwhal-Bullshark consensus. The protocol commits blocks every round rather than every two rounds, using direct and indirect decision rules derived from DAG patterns. For robotics applications requiring real-time control feedback, this sub-second finality becomes non-negotiable. During Korea Blockchain Week 2025, Chalkias positioned Sui as "a coordination layer for applications and AI," emphasizing how partners in payments, gaming, and AI leverage this performance foundation.

Walrus: solving AI's data problem

AI workloads demand storage at scales incompatible with traditional blockchain economics. Training datasets span terabytes, model weights require gigabytes, and inference logs accumulate rapidly. Sui addresses this through Walrus, a decentralized storage protocol using erasure coding to achieve 4-5x replication instead of the 100x replication typical of on-chain storage. The "Red Stuff" algorithm splits data into slivers distributed across storage nodes, remaining recoverable with 2/3 nodes unavailable. Metadata and availability proofs live on Sui's blockchain while actual data resides in Walrus, creating cryptographically verifiable storage at exabyte scale.

During Walrus testnet's first month, the network stored over 4,343 GB across 25+ community nodes, validating the architecture's viability. Projects like TradePort, Tusky, and Decrypt Media integrated Walrus for media storage and retrieval. For AI applications, this enables practical scenarios: training datasets tokenized as programmable assets with licensing terms encoded in smart contracts, model weights persisted with version control, inference results logged immutably for audit trails, and AI-generated content stored cost-effectively. Atoma Network's AI inference layer, announced as Sui's first blockchain integration partner, leverages this storage foundation for automated code generation, workflow automation, and DeFi risk analysis.

The integration extends beyond storage into computation orchestration. Sui's Programmable Transaction Blocks (PTBs) bundle up to 1,024 heterogeneous operations atomically, executing all-or-nothing. An AI workflow might retrieve training data from Walrus, update model weights in a smart contract, record inference results on-chain, and distribute rewards to data contributors—all in a single atomic transaction. This composability, combined with Move's type safety, creates building blocks for complex AI systems without the fragility of cross-contract calls in other environments.

Chalkias emphasized capability over marketing during the Just The Metrics podcast (July 2025), pointing to "inefficiencies in healthcare data management" as practical application areas. Healthcare AI requires coordination across institutions, privacy preservation for sensitive data, and verifiable computation for regulatory compliance. Sui's architecture—combining on-chain coordination, Walrus storage, and zero-knowledge privacy—addresses these requirements technically rather than conceptually. The Google Cloud partnership announced in 2024 reinforced this direction, integrating Sui data into BigQuery for analytics and training Google's Vertex AI platform on Move language for AI-assisted development.

When robots need sub-second settlement

The robotics vision materializes more concretely through technical capabilities than announced partnerships. Sui's object model represents robots, tools, and tasks as first-class on-chain citizens with granular access control. Unlike account-based systems where robots interact through account-level permissions, Sui's objects enable multi-level permission systems from basic operation to full control with multi-signature requirements. PassKeys and FaceID integration support human-in-the-loop scenarios while zkTunnels enable gas-free command transmission for real-time remote operation.

During discussions on social media, Chalkias (posting as "Kostas Kryptos") revealed Sui engineers from NASA, Meta, and Uber backgrounds testing dog-like quadruped robots on the network. The object-based architecture suits robotics coordination: each robot owns objects representing its state and capabilities, tasks exist as transferable objects with execution parameters, and resource allocation happens through object composition rather than centralized coordination. A manufacturing facility could deploy robot fleets where each unit autonomously accepts tasks, coordinates with peers through shared objects, executes operations with cryptographic verification, and settles micropayments for services rendered—all without central authority or human intervention.

The "internetless" transaction mode, discussed during Sui Basecamp 2025 and London Real podcast (April 2025), addresses robotics' real-world constraints. Chalkias described how the system maintained functionality during power outages in Spain and Portugal, with transaction sizes optimized toward single bytes using preset formats. For autonomous systems operating in disaster zones, rural areas, or environments with unreliable connectivity, this resilience becomes critical. Robots can transact peer-to-peer for immediate coordination, synchronizing with the broader network when connectivity restores.

The 3DOS project exemplifies this vision practically: a blockchain-based 3D printing network enabling on-demand manufacturing where machines autonomously print parts. Future iterations envision self-repairing robots that detect component failures, order replacements via smart contracts, identify nearby 3D printers through on-chain discovery, coordinate printing and delivery, and install components—all autonomously. This isn't science fiction but logical extension of existing capabilities: ESP32 and Arduino microcontroller integration already supports basic IoT devices, BugDar provides security auditing for robotic smart contracts, and multi-signature approvals enable graduated autonomy with human oversight for critical operations.

The quantum clock is ticking

Kostas Chalkias's tone shifts from philosophical to urgent when discussing quantum computing. In a July 2025 research report, he warned bluntly: "Governments are well aware of the risks posed by quantum computing. Agencies worldwide have issued mandates that classical algorithms like ECDSA and RSA must be deprecated by 2030 or 2035." His announcement on Twitter accompanied Mysten Labs' breakthrough research published to the IACR ePrint Archive, demonstrating how EdDSA-based blockchains like Sui, Solana, Near, and Cosmos possess structural advantages for quantum transition unavailable to Bitcoin and Ethereum.

The threat stems from quantum computers running Shor's Algorithm, which efficiently factors large numbers—the mathematical hardness underlying RSA, ECDSA, and BLS cryptography. Google's Willow quantum processor with 105 qubits signals accelerated progress toward machines capable of breaking classical encryption. The "store now, decrypt later" attack compounds urgency: adversaries collect encrypted data today, waiting for quantum computers to decrypt it retroactively. For blockchain assets, Chalkias explained to Decrypt Magazine, "Even if someone still holds their Bitcoin or Ethereum private key, they may not be able to generate a post-quantum secure proof of ownership, and this comes down to how that key was originally generated, and how much of its associated data has been exposed over time."

Bitcoin's particular vulnerability stems from "sleeping" wallets with exposed public keys. Satoshi Nakamoto's estimated 1 million BTC resides in early addresses using pay-to-public-key format—the public key sits visible on-chain rather than hidden behind hashed addresses. Once quantum computers scale sufficiently, these wallets become instantly drainable. Chalkias's assessment: "Once quantum computers arrive, millions of wallets, including Satoshi's, could be drained instantly. If your public key is visible, it will eventually be cracked." Ethereum faces similar challenges, though fewer exposed public keys mitigate immediate risk. Both chains require community-wide hard forks with unprecedented coordination to migrate—assuming consensus forms around post-quantum algorithms.

Sui's EdDSA foundation provides elegant escape path. Unlike ECDSA's random private keys, EdDSA derives keys deterministically from a seed using hash functions per RFC 8032. This structural difference enables zero-knowledge proofs via zk-STARKs (which are post-quantum secure) proving knowledge of the underlying seed without exposing elliptic curve data. Users construct post-quantum key pairs from the same seed randomness, submit ZK proofs demonstrating identical ownership, and transition to quantum-safe schemes while preserving addresses—no hard fork required. Chalkias detailed this during the June 2022 Sui AMA: "If you're using deterministic algorithms, like EdDSA, there is a way with Stark proofs to prove knowledge of the pyramids of your private key on an EdDSA key generation, because it uses a hash function internally."

Cryptographic agility as strategic moat

Sui supports multiple signature schemes simultaneously through unified type aliases across the codebase—EdDSA (Ed25519), ECDSA (for Ethereum compatibility), and planned post-quantum algorithms. Chalkias designed this "cryptographic agility" recognizing permanence is fantasy in cryptography. The architecture resembles "changing a lock core" rather than rebuilding the entire security system. When NIST-recommended post-quantum algorithms deploy—CRYSTALS-Dilithium for signatures, FALCON for compact alternatives, SPHINCS+ for hash-based schemes—Sui integrates them through straightforward updates rather than fundamental protocol rewrites.

The transition strategies balance proactive and adaptive approaches. For new addresses, users can generate PQ-signs-PreQ configurations where post-quantum keys sign pre-quantum public keys at creation, enabling smooth future migration. For existing addresses, the zk-STARK proof method preserves addresses while proving quantum-safe ownership. Layered defense prioritizes high-value data—wallet private keys receive immediate PQ protection, while transitory privacy data follows slower upgrade paths. Hash function outputs expand from 256 bits to 384 bits for collision resistance against Grover's algorithm, and symmetric encryption key lengths double (AES remains quantum-resistant with larger keys).

Zero-knowledge proof systems require careful consideration. Linear PCPs like Groth16 (currently powering zkLogin) rely on pairing-friendly elliptic curves vulnerable to quantum attacks. Sui's transition roadmap moves toward hash-based STARK systems—Winterfell, co-developed by Mysten Labs, uses only hash functions and remains plausibly post-quantum secure. The zkLogin migration maintains same addresses while updating internal circuits, requiring coordination with OpenID providers as they adopt PQ-JWT tokens. Randomness beacons and distributed key generation protocols transition from threshold BLS signatures to lattice-based alternatives like HashRand or HERB schemes—internal protocol changes invisible to on-chain APIs.

Chalkias's expertise proves critical here. As author of BPQS (Blockchain Post-Quantum Signature), a variant of XMSS hash-based scheme, he brings implementation experience beyond theoretical knowledge. His June 2022 commitment proved prescient: "We will build out our chain in a way where, with the flip of a button, people can actually move to post quantum keys." The NIST deadlines—2030 for classical algorithm deprecation, 2035 for complete PQ adoption—compress timelines dramatically. Sui's head start positions it favorably, but Chalkias emphasizes urgency: "If your blockchain supports sovereign assets, national treasuries in crypto, ETFs, or CBDCs, it will soon be required to adopt post-quantum cryptographic standards, if your community cares about long-term credibility and mass adoption."

AI agents already generating $1.8 billion in value

The ecosystem moves beyond infrastructure into production applications. Dolphin Agent (DOLA), specializing in blockchain data tracking and analytics, achieved $1.8+ billion market capitalization—validating demand for AI-enhanced blockchain tooling. SUI Agents provides one-click AI agent deployment with Twitter persona creation, tokenization, and trading within decentralized ecosystems. Sentient AI raised $1.5 million for conversational chatbots leveraging Sui's security and scalability. DeSci Agents promotes scientific compounds like Epitalon and Rapamycin through 24/7 AI-driven engagement, bridging research and investment through token pairing.

Atoma Network's integration as Sui's first blockchain AI inference partner enables capabilities spanning automated code generation and auditing, workflow automation, DeFi risk analysis, gaming asset generation, social media content classification, and DAO management. The partnership selection reflected technical requirements: Atoma needed low latency for interactive AI, high throughput for scale, secure ownership for AI assets, verifiable computation, cost-effective storage, and privacy-preserving options. Sui delivered all six. During Sui Basecamp 2025, Chalkias highlighted projects like Aeon, Atoma's AI agents, and Nautilus's work on verifiable offchain computation as examples of "how Sui could serve as a foundation for the next wave of intelligent, decentralized systems."

The Google Cloud partnership deepens integration through BigQuery access to Sui blockchain data for analytics, Vertex AI training on Move programming language for AI-assisted development, zkLogin support using OAuth credentials (Google) for simplified access, and infrastructure supporting network performance and scalability. Alibaba Cloud's ChainIDE integration enables natural language prompts for Move code generation—developers write "create a staking contract with 10% APY" in English, Chinese, or Korean, receiving syntactically correct, documented Move code with security checks. This AI-assisted development democratizes blockchain building while maintaining Move's safety guarantees.

The technical advantages compound for AI applications. Object ownership models suit autonomous agents operating independently. Parallel execution enables thousands of simultaneous AI operations without interference. Sub-second finality supports interactive user experiences. Walrus storage handles training datasets economically. Sponsored transactions remove gas friction for users. zkLogin eliminates seed phrase barriers. Programmable Transaction Blocks orchestrate complex workflows atomically. Formal verification options prove AI agent correctness mathematically. These aren't disconnected features but integrated capabilities forming coherent development environment.

Comparing the contenders

Sui's 297,000 TPS peak and 390ms consensus latency surpass Ethereum's 11.3 average TPS and 12-13 minute finality by orders of magnitude. Against Solana—its closest performance competitor—Sui achieves 32x faster finality (0.4 seconds versus 12.8 seconds) despite Solana's 400ms slot times, because Solana requires multiple confirmations for economic finality. Real-world measurement from Phoenix Group's August 2025 report showed Sui processing 3,900 TPS versus Solana's 92.1 TPS, reflecting operational rather than theoretical performance. Transaction costs remain predictably low on Sui (~$0.0087 average, under one cent) without Solana's historical congestion and outage issues.

Architectural differences explain performance gaps. Sui's object-centric model enables inherent parallelization—300,000 simple transfers per second don't require consensus coordination. Ethereum and Bitcoin process every transaction sequentially through full consensus. Solana parallelizes through Sealevel but uses optimistic execution requiring retroactive verification. Aptos, also using Move language, implements Block-STM optimistic execution rather than Sui's state access method. For AI and robotics applications requiring predictable low latency, Sui's explicit dependency declaration provides determinism that optimistic approaches cannot guarantee.

The quantum positioning diverges even more starkly. Bitcoin and Ethereum use secp256k1 ECDSA signatures with no backward-compatible upgrade path—quantum transition requires hard forks, address changes, asset migrations, and community governance likely to cause chain splits. Solana shares Sui's EdDSA advantage, enabling similar zk-STARK transition strategies and introducing Winternitz Vault hash-based one-time signatures. Near and Cosmos benefit from EdDSA as well. Aptos uses Ed25519 but less developed quantum readiness roadmap. Chalkias's July 2025 research paper explicitly stated the findings "work for Sui, Solana, Near, Cosmos and other EdDSA-based chains, but not for Bitcoin and Ethereum."

Ecosystem maturity favors competitors temporarily. Solana launched 2020 with established DeFi protocols, NFT marketplaces, and developer communities. Ethereum's 2015 launch provided first-mover advantages in smart contracts, institutional adoption, and network effects. Sui launched May 2023—barely two and half years old—with $2+ billion TVL and 65.9K active addresses growing rapidly but well below Solana's 16.1 million. The technical superiority creates opportunity: developers building on Sui today position for ecosystem growth rather than joining mature, crowded platforms. Chalkias's London Real interview reflected this confidence: "Honestly, I won't be surprised at all if Mysten Labs, and anything it touches, surpasses what Apple is today."

Synergies between seemingly disparate visions

The AI, robotics, and quantum resistance narratives appear disconnected until recognizing their technical interdependencies. AI agents require low latency and high throughput—Sui provides both. Robotic coordination demands real-time operations without central authority—Sui's object model and sub-second finality deliver. Post-quantum security needs cryptographic flexibility and forward-looking architecture—Sui built this from inception. These aren't separate product lines but unified technical requirements for the 2030-2035 technology landscape.

Consider autonomous manufacturing: AI systems analyze demand forecasts and material availability, determining optimal production schedules. Robotic agents receive verified instructions through blockchain coordination, ensuring authenticity without centralized control. Each robot operates as owned object processing tasks in parallel, coordinating through shared objects when necessary. Micropayments settle instantly for services rendered—robot A providing materials to robot B, robot B processing components for robot C. The system functions internetless during connectivity disruptions, synchronizing when networks restore. And critically, all communications remain secure against quantum adversaries through post-quantum cryptographic schemes, protecting intellectual property and operational data from "store now, decrypt later" attacks.

Healthcare data management exemplifies another convergence. AI models train on medical datasets stored in Walrus with cryptographic availability proofs. Zero-knowledge proofs preserve patient privacy while enabling research. Robotic surgical systems coordinate through blockchain for audit trails and liability documentation. Post-quantum encryption protects sensitive medical records from long-term threats. The coordination layer (Sui's blockchain) enables institutional data sharing without trust, AI computation without compromising privacy, and future-proof security without periodic infrastructure replacement.

Chalkias's vision statement during Sui Basecamp 2025 captures this synthesis: positioning Sui as "foundation for the next wave of intelligent, decentralized systems" with "growing capacity to support AI-native and computation-heavy applications." The modular architecture—Sui for computation, Walrus for storage, Scion for connectivity, zkLogin for identity—creates what team members describe as "blockchain operating system" rather than narrow financial ledger. The internetless mode, quantum-safe cryptography, and sub-second finality aren't feature checklists but prerequisites for autonomous systems operating in adversarial environments with unreliable infrastructure.

The innovation methodology behind technical leadership

Understanding Mysten Labs' approach explains execution consistency. Chalkias articulated the philosophy during his "Build Beyond" blog post: "Mysten Labs is really good at finding new theories in the space that nobody has ever implemented, where some of the assumptions may not be accurate. But we're marrying it with the existing technology we have, and eventually, this drives us in creating a novel product." This describes systematic process: identify academic research with practical potential, challenge untested assumptions through engineering rigor, integrate with production systems, and validate through deployment.

The Mysticeti consensus protocol exemplifies this. Academic research established three message rounds as theoretical minimum for Byzantine consensus commitment. Previous implementations required 1.5 round trips with quorum signatures per block. Mysten Labs engineered uncertified DAG structures eliminating explicit certification, implemented optimal commit rules via DAG patterns rather than voting mechanisms, and demonstrated 80% latency reduction from prior Narwhal-Bullshark consensus. The result: peer-reviewed paper with formal proofs accompanied by production deployment processing billions of transactions.

Similar methodology applies to cryptography. BPQS (Chalkias's blockchain post-quantum signature scheme) adapts XMSS hash-based signatures for blockchain constraints. Winterfell implements first open-source STARK prover using only hash functions for post-quantum security. zkLogin combines OAuth authentication with zero-knowledge proofs, eliminating additional trusted parties while preserving privacy. Each innovation addresses practical barrier (post-quantum security, ZK proof accessibility, user onboarding friction) through novel cryptographic construction backed by formal analysis.

The team composition reinforces this capability. Engineers from Meta built authentication for billions, from NASA developed safety-critical distributed systems, from Uber scaled real-time coordination globally. Chalkias brings cryptographic expertise from Facebook/Diem, R3/Corda, and academic research. This isn't traditional startup team learning on the fly but veterans executing systems they've built before, now unconstrained by corporate priorities. The $336 million funding from a16z, Coinbase Ventures, and Binance Labs reflects investor confidence in execution capability over speculative technology.

Challenges and considerations beyond the hype

Technical superiority doesn't guarantee market adoption—a lesson learned repeatedly in technology history. Sui's 65.9K active addresses pale against Solana's 16.1 million despite arguably better technology. Network effects compound: developers build where users congregate, users arrive where applications exist, creating lock-in advantages for established platforms. Ethereum's "slower and expensive" blockchain commands orders of magnitude more developer mindshare than technically superior alternatives through sheer incumbency.

The "blockchain operating system" positioning risks dilution—attempting to excel at finance, social applications, gaming, AI, robotics, IoT, and decentralized storage simultaneously may result in mediocrity across all domains rather than excellence in one. Critics noting this concern point to limited robotics deployment beyond proof-of-concepts, AI projects primarily in speculation phase rather than production utility, and quantum security preparation for threats five to ten years distant. The counterargument holds that modular components enable focused development—teams building AI applications use Atoma inference and Walrus storage without concerning themselves with robotics integration.

Post-quantum cryptography introduces non-trivial overheads. CRYSTALS-Dilithium signatures measure 3,293 bytes at security level 2 versus Ed25519's 64 bytes—over 50x larger. Network bandwidth, storage costs, and processing time increase proportionally. Batch verification improvements remain limited (20-50% speedup versus independent verification) compared to classical schemes' efficient batching. Migration risks include user error during transition, coordination across ecosystem participants (wallets, dApps, exchanges), backward compatibility requirements, and difficulty testing at scale without real quantum computers. The timeline uncertainty compounds planning challenges—quantum computing progress remains unpredictable, NIST standards continue evolving, and new cryptanalytic attacks may emerge against PQ schemes.

Market timing presents perhaps the greatest risk. Sui's advantages materialize most dramatically in 2030-2035 timeframe: when quantum computers threaten classical cryptography, when autonomous systems proliferate requiring trustless coordination, when AI agents manage significant economic value necessitating secure infrastructure. If blockchain adoption stagnates before this convergence, technical leadership becomes irrelevant. Conversely, if adoption explodes sooner, Sui's newer ecosystem may lack applications and liquidity to attract users despite superior performance. The investment thesis requires believing not just in Sui's technology but in timing alignment between blockchain maturation and emerging technology adoption.

The decade-long bet on first principles

Kostas Chalkias's naming his son Kryptos isn't charming anecdote but signal of commitment depth. His career trajectory—from AI research to cryptography, from academic publication to production systems at Meta, from enterprise blockchain at R3 to Layer 1 architecture at Mysten Labs—demonstrates consistent focus on foundational technologies at scale. The quantum resistance work began before Google's Willow announcement, when post-quantum cryptography seemed theoretical concern. The robotics integration started before AI agents commanded billion-dollar valuations. The architectural decisions enabling these capabilities predate market recognition of their importance.

This forward-looking orientation contrasts with reactive development common in crypto. Ethereum introduces Layer 2 rollups to address scaling bottlenecks emerging after deployment. Solana implements QUIC communication and stake-weighted QoS responding to network outages and congestion. Bitcoin debates block size increases and Lightning Network adoption as transaction fees spike. Sui designed parallel execution, object-centric data models, and cryptographic agility before launching mainnet—addressing anticipated requirements rather than discovered problems.

The research culture reinforces this approach. Mysten Labs publishes academic papers with formal proofs before claiming capabilities. The Mysticeti consensus paper appeared in peer-reviewed venues with correctness proofs and performance benchmarks. The quantum transition research submitted to IACR ePrint Archive demonstrates EdDSA advantages through mathematical construction, not marketing claims. The zkLogin paper (arXiv 2401.11735) details zero-knowledge authentication before deployment. Chalkias maintains active GitHub contributions (kchalkias), posts technical insights on LinkedIn and Twitter, presents at PQCSA workshops on quantum threats, and engages substantively with cryptography community rather than exclusively promoting Sui.

The ultimate validation arrives in 5-10 years when quantum computers mature, autonomous systems proliferate, and AI agents manage trillion-dollar economies. If Sui executes consistently on its roadmap—deploying post-quantum signatures before 2030 NIST deadline, demonstrating robotics coordination at scale, and supporting AI inference layers processing millions of requests—it becomes infrastructure layer for technologies reshaping civilization. If quantum computers arrive later than predicted, autonomous adoption stalls, or competitors successfully retrofit solutions, Sui's early investments may prove premature. The bet centers not on technology capability—Sui demonstrably delivers promised performance—but on market timing and problem urgency.

Chalkias's perspective during Emergence Conference frames this succinctly: "Eventually, blockchain will surpass even Visa for speed of transaction. It will be the norm. I don't see how we can escape from this." The inevitability claim assumes correct technical direction, sufficient execution quality, and aligned timing. Sui positions to capitalize if these assumptions hold. The object-centric architecture, cryptographic agility, sub-second finality, and systematic research methodology aren't retrofits but foundational choices designed for the technology landscape emerging over the next decade. Whether Sui captures market leadership or these capabilities become table stakes across all blockchains, Kostas Chalkias and Mysten Labs are architecting infrastructure for the quantum era's autonomous intelligence—one cryptographic primitive, one millisecond of latency reduction, one proof-of-concept robot at a time.

Verifiable AI in Motion: How Lagrange Labs’ Dynamic zk-SNARKs Enable Continuous Trust

· 7 min read
Dora Noda
Software Engineer

In the rapidly converging worlds of artificial intelligence and blockchain, the demand for trust and transparency has never been higher. How can we be certain that an AI model's output is accurate and untampered with? How can we perform complex computations on vast on-chain datasets without compromising security or scalability? Lagrange Labs is tackling these questions head-on with its suite of zero-knowledge (ZK) infrastructure, aiming to build a future of "AI You Can Prove." This post provides an objective overview of their mission, technology, and recent breakthroughs, culminating in their latest paper on Dynamic zk-SNARKs.

1. The Team and Its Mission

Lagrange Labs is building the foundational infrastructure to generate cryptographic proofs for any AI inference or on-chain application. Their goal is to make computation verifiable, bringing a new layer of trust to the digital world. Their ecosystem is built on three core product lines:

  • ZK Prover Network: A decentralized network of over 85 proving nodes that supplies the computational power needed for a wide range of proving tasks, from AI and rollups to decentralized applications (dApps).
  • DeepProve (zkML): A specialized system for generating ZK proofs of neural network inferences. Lagrange claims it is up to 158 times faster than competing solutions, making verifiable AI a practical reality.
  • ZK Coprocessor 1.0: The first SQL-based ZK Coprocessor, allowing developers to run custom queries on massive on-chain datasets and receive verifiably accurate results.

2. A Roadmap to Verifiable AI

Lagrange has been methodically executing a roadmap designed to solve the challenges of AI verifiability one step at a time.

  • Q3 2024: ZK Coprocessor 1.0 Launch: This release introduced hyper-parallel recursive circuits, which delivered an average speed increase of approximately 2x. Projects like Azuki and Gearbox are already leveraging the coprocessor for their on-chain data needs.
  • Q1 2025: DeepProve Unveiled: Lagrange announced DeepProve, its solution for Zero-Knowledge Machine Learning (zkML). It supports popular neural network architectures like Multi-Layer Perceptrons (MLPs) and Convolutional Neural Networks (CNNs). The system achieves significant, order-of-magnitude acceleration across all three critical stages: one-time setup, proof generation, and verification, with speed-ups reaching as high as 158x.
  • Q2 2025: The Dynamic zk-SNARKs Paper (Latest Milestone): This paper introduces a groundbreaking "update" algorithm. Instead of re-generating a proof from scratch every time the underlying data or computation changes, this method can patch an old proof (π) into a new proof (π'). This update can be performed with a complexity of just O(√n log³n), a dramatic improvement over full re-computation. This innovation is particularly suited for dynamic systems like continuously learning AI models, real-time game logic, and evolving smart contracts.

3. Why Dynamic zk-SNARKs Matter

The introduction of updatable proofs represents a fundamental shift in the cost model of zero-knowledge technology.

  • A New Cost Paradigm: The industry moves from a model of "full-recomputation for every proof" to "incremental proofing based on the size of the change." This dramatically lowers the computational and financial cost for applications that undergo frequent, minor updates.

  • Implications for AI:

    • Continuous Fine-Tuning: When fine-tuning less than 1% of a model's parameters, the proof generation time grows almost linearly with the number of changed parameters (Δ parameters), rather than with the overall size of the model.
    • Streaming Inference: This enables the generation of proofs concurrently with the inference process itself. This drastically reduces the latency between an AI making a decision and that decision being settled and verified on-chain, unlocking use cases like on-chain AI services and compressed proofs for rollups.
  • Implications for On-Chain Applications:

    • Dynamic zk-SNARKs offer massive gas and time optimizations for applications characterized by frequent, small-state changes. This includes decentralized exchange (DEX) order books, evolving game states, and ledger updates involving frequent additions or deletions.

4. A Glimpse into the Tech Stack

Lagrange's powerful infrastructure is built on a sophisticated and integrated technology stack:

  • Circuit Design: The system is flexible, supporting the embedding of ONNX (Open Neural Network Exchange) models, SQL parsers, and custom operators directly into its circuits.
  • Recursion & Parallelism: The ZK Prover Network facilitates distributed recursive proofs, while the ZK Coprocessor leverages the sharding of "micro-circuits" to execute tasks in parallel, maximizing efficiency.
  • Economic Incentives: Lagrange is planning to launch a native token, LA, which will be integrated into a Double-Auction-for-Recursive-Auction (DARA) system. This will create a robust marketplace for bidding on prover computation, complete with incentives and penalties to ensure network integrity.

5. Ecosystem and Real-World Adoption

Lagrange is not just building in a vacuum; its technology is already being integrated by a growing number of projects across different sectors:

  • AI & ML: Projects like 0G Labs and Story Protocol are using DeepProve to verify the outputs of their AI models, ensuring provenance and trust.
  • Rollups & Infrastructure: Key players like EigenLayer, Base, and Arbitrum are participating in the ZK Prover Network as validation nodes or integration partners, contributing to its security and computational power.
  • NFT & DeFi Applications: Brands like Azuki and DeFi protocols like Gearbox are using the ZK Coprocessor to enhance the credibility of their data queries and reward distribution mechanisms.

6. Challenges and the Road Ahead

Despite its impressive progress, Lagrange Labs and the broader ZK field face several hurdles:

  • Hardware Bottlenecks: Even with a distributed network, updatable SNARKs still demand high bandwidth and rely on GPU-friendly cryptographic curves to perform efficiently.
  • Lack of Standardization: The process of mapping AI frameworks like ONNX and PyTorch to ZK circuits still lacks a universal, standardized interface, creating friction for developers.
  • A Competitive Landscape: The race to build zkVMs and generalized zkCompute platforms is heating up. Competitors like Risc-Zero and Succinct are also making significant strides. The ultimate winner may be the one who can first commercialize a developer-friendly, community-driven toolchain.

7. Conclusion

Lagrange Labs is methodically reshaping the intersection of AI and blockchain through the lens of verifiability. Their approach provides a comprehensive solution:

  • DeepProve addresses the challenge of trusted inference.
  • The ZK Coprocessor solves the problem of trusted data.
  • Dynamic zk-SNARKs incorporate the real-world need for continuous updates directly into the proving system.

If Lagrange can maintain its performance edge, solve the critical challenge of standardization, and continue to grow its robust network, it is well-positioned to become a cornerstone player in the emerging "AI + ZK Infrastructure" sector.