How Decentralized AI and Zero-Knowledge Proofs Will Democratize Compute
AI is at risk of the same centralization seen in earlier editions of the internet. But another way is possible, say Mahesh Ramakrishnan and Vinayak Kurup.
Decentralized AI promises to democratize compute, making it accessible to smaller developers and protecting against the consolidation of power by a few major actors.
In late July, Mark Zuckerberg penned a letter explaining why “open source is necessary for a positive AI future,” where he waxes poetic about the need for open-source AI development. The once-nerdy teen founder, now turned into the wakeboarding, gold chain-wearing, and jiu-jitsu fighting “Zuck,” has been branded as the messiah of open-source model development.
But thus-far, he and the Meta team haven’t articulated much about how these models are being deployed. As model complexity drives compute requirements higher, if model deployment is controlled by a handful of actors, then have we not succumbed to a similar form of centralization?
Decentralized AI promises to solve this challenge, but the technology requires advancements in industry-leading cryptographic techniques and unique hybrid solutions.
This op-ed is part of CoinDesk's new DePIN Vertical, covering the emerging industry of decentralized physical infrastructure.
Unlike centralized cloud providers, decentralized AI (DAI) distributes the computational processes for AI inference and training across multiple systems, networks, and locations. If implemented correctly, these networks, a type of decentralized physical infrastructure network (DePIN), bring benefits in censorship resistance, compute access, and cost.
DAI faces challenges in two main areas: the AI environment and the decentralized infrastructure itself. Compared to centralized systems, DAI requires additional safeguards to prevent unauthorized access to model details or the theft and replication of proprietary information. For this reason, there is an under-explored opportunity for teams who focus on open-source models, but recognize the potential performance disadvantage of open-sourced models compared to their closed-source counterparts.
Decentralized systems specifically face obstacles in network integrity and resource overhead. The distribution of client data across separate nodes, for instance, exposes more attack vectors. Attackers could spin up a node and analyze its computations, try to intercept data transmissions between nodes, or even introduce biases that degrade the system’s performance. Even in a secure decentralized inference model, there must be mechanisms to audit compute processes. Nodes are incentivized to save cost on resources by presenting incomplete computations, and verification is complicated by the lack of a trusted, centralized actor.
Zero-Knowledge Proofs
Zero-knowledge proofs (ZKPs), while currently too computationally expensive, are one potential solution to some DAI challenges. ZKP is a cryptographic mechanism that enables one party (the prover) to convince another party (the verifier) of the truth of a statement without divulging any details about the statement itself, except its validity. Verification of this proof is quick for other nodes to run and offers a way for each node to prove it acted in accordance with the protocol. The technical differences between proof systems and their implementations (deep-dive on this coming later) are important for investors in the space.
Centralized compute makes model training exclusive to a handful of well-positioned and resourced players. ZKPs could be one part of unlocking idle compute on consumer hardware; a MacBook, for example, could use its extra compute bandwidth to help train a large-language model while earning tokens for the user.
Deploying decentralized training or inference with consumer hardware is the focus of teams like Gensyn and Inference Labs; unlike a decentralized compute network like Akash or Render, sharding the computations adds complexity, namely the floating point problem. Making use of idle distributed compute resources opens the door for smaller developers to test and train their own networks — as long as they have access to tools that solve associated challenges.
At present, ZKP systems are seemingly four to six orders of magnitude more expensive than running the compute natively, and for tasks that require high-compute (like model training) or low latency (like model inference) using a ZKP is prohibitively slow. For comparison, a drop of six orders of magnitude means that a cutting edge system (like a16z’s Jolt) running on an M3 Max chip can prove a program 150 times slower than running it on a TI-84 graphing calculator.
AI's ability to process large amounts of data makes it compatible with zero-knowledge proofs (ZKPs), but more progress in cryptography is needed before ZKPs can be widely used. Work being done by teams such as Irreducible (who designed the Binius proof system and commitment scheme), Gensyn, TensorOpera, Hellas, and Inference Labs, among others, will be an important step in achieving this vision. Timelines, however, remain overly optimistic as true innovation takes time and mathematical advancement.
In the meantime, it’s worth noting other possibilities and hybrid solutions. HellasAI and others are developing new methods of representing models and computations that can enable an optimistic challenge game, allowing for only a subset of computation that needs to be handled in zero-knowledge. Optimistic proofs only work when there is staking, the ability to prove wrongdoing,
The above is the detailed content of How Decentralized AI and Zero-Knowledge Proofs Will Democratize Compute. For more information, please follow other related articles on the PHP Chinese website!

Recommended exchanges for bull market in May 2025: 1. Binance; 2. OKX; 3. Huobi; 4. gate.io; 5. Sesame Open Door and other exchanges. The above exchanges are safe and reliable, and support a variety of currencies. This article provides detailed download portal addresses.

Huobi APKV10.50.0 download guide: 1. Click the direct link in the article; 2. Select the correct download package; 3. Fill in the registration information; 4. Start the Huobi trading process.

Recommended exchanges for bull market in May 2025: 1. Binance; 2. OKX; 3. Huobi; 4. gate.io; 5. Sesame Open Door and other exchanges. The above exchanges are safe and reliable, and support a variety of currencies. This article provides detailed download portal addresses.

Huobi APKV10.50.0 download guide: 1. Click the direct link in the article; 2. Select the correct download package; 3. Fill in the registration information; 4. Start the Huobi trading process.

Huobi APKV10.50.0 download guide: 1. Click the direct link in the article; 2. Select the correct download package; 3. Fill in the registration information; 4. Start the Huobi trading process.

Coin friends who soared in the bull market in 2025: 1. PI currency (suming 57.12% in 24 hours); 2. WIF currency (suming 44.59% in 24 hours); 3. KAS currency (suming 18.9% in 24 hours); 4. FLOKI (suming 17.98%); 5. PEPE (suming 15.45%). The above cryptocurrencies can be purchased on exchanges such as Binance, OKX, Huobi, gateio, etc. This article provides a detailed download entry address.

Huobi APKV10.50.0 download guide: 1. Click the direct link in the article; 2. Select the correct download package; 3. Fill in the registration information; 4. Start the Huobi trading process.

Bull exchanges in May 2025: 1. Binance; 2. OKX; 3. Huobi; 4. gate.io; 5. Sesame Open Door and other exchanges. The above exchanges are safe and reliable, and support a variety of currencies. This article provides detailed download portal addresses.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Linux new version
SublimeText3 Linux latest version

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version
Useful JavaScript development tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool
