This document describes the design of the Pearl network – the first useful proof-of-work L1 protocol for native AI computations. The heart of the protocol is a new and efficient implementation of the core GPU opcode (matrix-multiplication), allowing GPUs to implement proof-of-work as a side-effect of native AI training and inference workloads (2-for-1). As such, the Pearl protocol intertwines energy, data, and money into a single atomic operation. This document outlines the protocol design, key implementation choices, and various economic aspects of the system.
"If... we can find some useful computation which is easy to verify,then cryptocurrency mining could actually become a huge boon to society..."
One of the biggest conceptual contributions of Bitcoin, is turning electricity into currency: Bitcoin showed that scarce, verifiable energy can be transmuted into digital scarcity and credible neutrality. Alongside its sweeping success and adoption, Bitcoin mining taps merely to a niche, artificial source of energy (random hashing), applicable only to specialized hardware (ASICs). By contrast, Artificial intelligence (AI) is projected to consume the vast majority of global electricity within a decade1. Indeed, it is increasingly clear that in the age of LLMs, the fundamental barrier of AI progress is neither models, algorithms nor hardware (GPUs) – but the production and availability of energy for training and inference. Our central thesis is simple:
A permissionless monetary network, which replaces Bitcoin's wasteful proof-of-work mining (artificial hashing) with the native operation underlying modern AI: matrix multiplication (GEMM). As such, Pearl is able to turn general compute on commodity hardware (GPUs) into a monetary currency, directly leveraging AI growth to secure the trust layer of AI agents. Pearl is the Bitcoin of the AI compute era.
Two observations motivate the design of the network.
Observation 1: AI is governed by physics. As many have argued, intelligence is expensive in joules.
If this is correct, the right meter for the AI economy is not clicks or API calls but verifiable floating-point or integer operations powered by energy. Pearl operationalizes this idea by turning the blockchain into an AI compute meter: block rewards are minted in direct proportion to verifiable multiply–accumulate work, tying issuance to a measurable physical substrate.
Observation 2: AI and Bitcoin now compete for the same resource. The binding constraint is electricity. A sharp claim from recent debate makes the point vivid:
Whether or not the exact figure proves correct, the direction is clear: energy is finite, and both AI training and Bitcoin mining bid for it. Today, in many environments, GPU-based AI compute margins exceed ASIC-based Bitcoin mining margins, yet little of that surplus contributes to decentralized consensus or a credibly neutral state layer. Pearl stitches these worlds together so that each kilowatt-hour spent on AI can simultaneously earn mining rewards and secure a monetary commons.
Pearl is designed as a state layer where AI agents live, transact, and reach consensus. Agents optimize explicit rewards; Pearl makes those rewards on-chain, verifiable, and mineable.
Classical Proof of Work monetizes security. Pearl monetizes security and utility. As with Bitcoin, volatility and speculation fund the security budget. In Pearl, that same demand subsidizes useful work: miners can repurpose AI workloads (training and inference) for mining, creating a parallel revenue stream from the exact same GPU cycles. The result is a virtuous loop:
This dual-utility design also increases the throughput of GPU providers. Because Pearl mining is tiled, kernel-level, and parallel, it interleaves with normal AI computation with negligible overhead. Providers extract yield from idle fragments, pipeline stalls, and micro-batches, turning once-wasted headroom into block-eligible work without sacrificing service-level objectives.
Pearl merges the world's two largest energy-consuming digital markets (AI compute and cryptocurrency mining) into a single GPU-native operation. Practically, we integrate a new MatMul mining kernel into existing AI frameworks and runtimes. Training and inference jobs call into the same vendor-optimized matrix-multiplication primitives they already use; a Pearl drop-in path augments these calls with negligible additional operations to facilitate mining. ML practitioners keep their stacks and models; miners keep their data-centers; the network gains security from useful AI work.
At the heart of Pearl is a Proof of Useful Work that maps ordinary matrix multiplication into Nakamoto-style mining while preserving three properties: fairness, verifiability, and privacy.
This construction retains the security semantics of Nakamoto consensus: any adversary must still accumulate almost all of the effective work. It is ASIC-resistant by universality: matrix multiplication is the canonical throughput path on commodity GPUs and accelerators and is already relentlessly optimized by vendors and open-source stacks. Rather than fighting specialization, Pearl harnesses the industry's existing optimization roadmap.
Three converging shifts make Pearl timely:
Our system is a Proof of Useful Work (PoUW) blockchain built as a fork of the Bitcoin protocol, integrating the cryptographic proof of useful work mechanisms proposed to replace traditional hash-based PoW with verifiable matrix multiplication tasks. While maintaining the features of Bitcoin's security and consensus model, the blockchain introduces key adaptations to support the new proof of work protocol as well as other improvements.
At its core, our blockchain maintains a ledger of unspent transaction outputs (UTXOs), which represent coins available for spending. Transactions in our network consume existing UTXOs as inputs and create new ones as outputs, effectively transferring value. Each transaction is digitally signed using the sender's private key, ensuring authenticity and authorization. All nodes in the network propagate transactions and blocks using a gossip-like protocol over the P2P network, allowing for robust dissemination and fault tolerance.
At the core of our blockchain lies the Proof of Useful Work (PoUW) protocol, which we describe in this section. Our objective is twofold: to design a Proof-of-Work (PoW) protocol that upholds the essential properties required for secure blockchain maintenance, while simultaneously computing a useful result—namely, the product of two arbitrary matrices. Crucially, we demonstrate that this useful computation can be performed concurrently with the PoW mechanism, incurring essentially no additional overhead.
Section coming soon...
Section coming soon...
Section coming soon...
Section coming soon...
Section coming soon...