Back to Home

ProofSight Litepaper

Anonymous Prediction Markets on Solana: A Technical Overview of Privacy-Preserving Market Intelligence

Technical Specification v1.0

Published: January 2025 | Status: Active Development

Executive Summary

ProofSight is a next-generation anonymous prediction market protocol built on Solana, leveraging zero-knowledge cryptography to enable institutional-grade traders to participate without revealing their strategies, positions, or identities. The protocol solves the fundamental transparency paradox in prediction markets by maintaining public market odds while keeping individual positions completely private.

By combining Solana's high-throughput architecture with advanced zero-knowledge proof systems, ProofSight creates a permissionless, trust-minimized environment where high-signal capital can flow freely without the risks of front-running, strategy leakage, or position surveillance.

1. The Transparency Paradox in Prediction Markets

1.1 Current Market Limitations

Traditional prediction markets, both centralized and decentralized, suffer from inherent design flaws that limit their effectiveness as information aggregation mechanisms:

Strategy Exposure

All positions are publicly visible on-chain, allowing competitors to reverse-engineer trading strategies, identify whale movements, and exploit informational advantages.

MEV Exploitation

Transparent transaction pools enable front-running, sandwich attacks, and other forms of maximal extractable value that penalize informed traders.

Institutional Hesitancy

Professional traders and institutions avoid public prediction markets due to compliance requirements, competitive disadvantages, and regulatory concerns around position disclosure.

Market Inefficiency

The absence of high-signal capital results in shallow liquidity, wide spreads, and poor price discovery, undermining the predictive accuracy of these markets.

1.2 The Need for Privacy

Financial privacy is not merely a preference—it is an economic necessity. In traditional finance, dark pools facilitate over 40% of U.S. equity trading volume precisely because institutional traders require privacy to execute large orders without market impact. Prediction markets, as mechanisms for information aggregation and risk transfer, require similar privacy guarantees to attract sophisticated participants.

ProofSight addresses this critical gap by introducing cryptographic privacy to prediction markets while maintaining the transparency necessary for trustless settlement and fair market operations.

2. ProofSight Architecture

2.1 System Overview

ProofSight's architecture is built on three fundamental layers that work in concert to provide privacy-preserving market operations:

Privacy Layer

The privacy layer implements shielded pools using zero-knowledge proof circuits that allow users to deposit funds, place bets, and withdraw winnings without revealing their wallet addresses or position details.

Technical Components:

  • • Poseidon hash-based Merkle trees for commitment storage
  • • Groth16 proving system for efficient proof generation
  • • Nullifier mechanisms to prevent double-spending
  • • Encrypted memo fields for optional metadata

Market Engine

Built natively on Solana, the market engine handles order matching, liquidity provision, and price discovery while maintaining sub-second finality and low transaction costs.

Key Features:

  • • Automated market maker (AMM) with dynamic fee structures
  • • Batched transaction processing for privacy amplification
  • • Cross-program invocations for composability
  • • Real-time odds calculation and market state updates

Settlement Layer

The settlement layer uses zero-knowledge proofs to enable anonymous claims verification, ensuring traders can withdraw winnings without linking settlements to original positions.

Settlement Process:

  • • Oracle integration for outcome resolution
  • • ZK proofs of position ownership without revelation
  • • Time-locked withdrawals for security
  • • Dispute resolution via decentralized governance

2.2 Transaction Flow

Typical User Journey:

  1. 1

    Deposit Phase

    User deposits funds into shielded pool, receiving a commitment hash stored in Merkle tree

  2. 2

    Position Creation

    User generates ZK proof of fund ownership and submits shielded position to market contract

  3. 3

    Market Interaction

    Market engine updates public odds without revealing individual position details

  4. 4

    Settlement & Withdrawal

    User proves position ownership via ZK proof and withdraws winnings to any address

3. Cryptographic Foundations

3.1 Zero-Knowledge Proof System

ProofSight employs SNARKs (Succinct Non-Interactive Arguments of Knowledge) as the foundational cryptographic primitive. Specifically, we utilize the Groth16 proving system due to its optimal proof size and verification efficiency on Solana's constrained compute environment.

Circuit Design

The core ZK circuits prove the following statements without revealing private inputs:

  • Deposit Circuit: Proves knowledge of private key corresponding to commitment without revealing the key itself
  • Position Circuit: Proves sufficient balance and valid position parameters without revealing amounts
  • Withdrawal Circuit: Proves ownership of winning position and nullifier validity without linking to original deposit

3.2 Hash Functions and Commitment Schemes

We use the Poseidon hash function, specifically designed for zero-knowledge circuits, to construct commitment schemes and Merkle trees. Poseidon offers significant advantages over traditional hash functions like SHA-256 in ZK contexts:

  • Reduced constraint counts (up to 10x fewer constraints than Pedersen hashes)
  • Native field arithmetic compatibility with modern proof systems
  • Proven security against algebraic attacks
  • Efficient implementation in both circuit and native code

3.3 Anonymity Set Construction

The security of ProofSight's privacy guarantees depends on the size and composition of the anonymity set—the group of users among whom any individual transaction cannot be distinguished. We implement several mechanisms to maximize anonymity set size:

  • Global Shielded Pool: All users across all markets share the same shielded pool, maximizing the anonymity set for deposits and withdrawals
  • Batched Transactions: Multiple transactions are aggregated and processed simultaneously, preventing timing analysis attacks
  • Decoy Mechanism: Optional decoy outputs can be generated to further obfuscate transaction graphs

4. Solana Integration

4.1 Why Solana?

The choice of Solana as the underlying blockchain infrastructure is driven by several critical technical requirements:

High Throughput

Prediction markets require rapid order execution. Solana's 400ms block times and 65,000 TPS capacity ensure minimal latency for market-sensitive operations.

Low Transaction Costs

ZK proof verification is compute-intensive. Solana's low fees ($0.00025 per transaction) make privacy-preserving operations economically viable.

Parallel Execution

Sealevel runtime enables parallel smart contract execution, allowing multiple market operations to process simultaneously without bottlenecks.

Growing Ecosystem

Solana's expanding DeFi ecosystem provides composability opportunities with lending protocols, DEXs, and oracle networks.

4.2 On-Chain Program Architecture

ProofSight's on-chain programs are written in Rust using the Anchor framework, consisting of four primary program modules:

proofsight_pool

Manages the shielded pool, Merkle tree updates, commitment storage, and nullifier tracking

proofsight_market

Handles market creation, AMM logic, liquidity provision, and public odds calculation

proofsight_verifier

Implements Groth16 proof verification logic, validating ZK proofs submitted by users

proofsight_oracle

Integrates with external oracle networks for market outcome resolution and settlement triggers

5. Privacy Guarantees and Threat Model

5.1 What ProofSight Hides

Protected Information

  • ✓ User wallet addresses and identity linkages
  • ✓ Individual position sizes and bet amounts
  • ✓ Trading timestamps and order patterns
  • ✓ Profit/loss per user and cumulative returns
  • ✓ Withdrawal destinations and timing
  • ✓ Correlation between deposits, positions, and withdrawals

5.2 What Remains Public

Transparent Information

  • ✓ Aggregate market odds and total volume
  • ✓ Total value locked in shielded pools
  • ✓ Market outcomes and settlement results
  • ✓ Protocol fee accrual and treasury balances
  • ✓ Number of active positions (without details)

5.3 Adversarial Considerations

ProofSight's security model assumes the following adversarial capabilities:

  • Network-level surveillance: Adversary can monitor all Solana network traffic and transaction patterns
  • Timing analysis: Adversary attempts to correlate deposits, positions, and withdrawals based on timing
  • Sybil attacks: Adversary creates multiple accounts to fragment the anonymity set
  • Side-channel attacks: Adversary attempts to extract information through gas usage patterns or computational timing

Our cryptographic constructions and protocol design specifically address these attack vectors through batched transactions, uniform gas costs, and decoy mechanisms.

6. Economic Model and Fee Structure

6.1 Fee Components

ProofSight implements a sustainable fee structure designed to incentivize liquidity provision while keeping costs competitive for traders:

Trading Fee

0.5%

Charged on position size, split between LPs and protocol

Settlement Fee

0.1%

Charged on winnings to cover oracle and verification costs

Privacy Fee

FREE

No additional cost for privacy features—built into base fee

6.2 Liquidity Provision

Market makers can provide liquidity to prediction markets and earn fees from trading activity. Liquidity providers (LPs) receive 80% of trading fees, with the remaining 20% allocated to protocol development and security audits.

LP Incentives

  • • Dynamic fee tiers based on market volatility and volume
  • • Impermanent loss protection for long-term LPs
  • • Priority market creation rights for established LPs
  • • Governance participation weighted by provided liquidity

7. Security Architecture

7.1 Trusted Setup Ceremony

Groth16 proofs require a trusted setup phase to generate proving and verification keys. ProofSight will conduct a multi-party computation (MPC) ceremony involving diverse stakeholders from academia, industry, and the community. The ceremony requires only one honest participant to ensure security.

7.2 Smart Contract Security

Formal Verification

Core protocol invariants will be formally verified using tools like Certora and symbolic execution to mathematically prove correctness

Multi-Signature Controls

Protocol upgrades and parameter changes require approval from a 4-of-7 multisig with time-locks

Bug Bounty Program

Up to $500,000 in rewards for critical vulnerability disclosures through Immunefi platform

Continuous Audits

Quarterly security audits by leading firms including Trail of Bits, Kudelski Security, and Zellic

7.3 Oracle Security

Market outcome resolution relies on oracle feeds. ProofSight integrates with multiple oracle providers including Chainlink, Pyth Network, and Switchboard, with dispute resolution mechanisms for edge cases.

8. Use Cases and Market Applications

Institutional Trading

Hedge funds and proprietary trading firms can execute large-scale prediction market strategies without revealing positions to competitors or triggering market impact.

Example: A macro fund betting on Fed policy decisions can maintain strategic opacity while contributing price discovery

Corporate Hedging

Companies can hedge business risks in prediction markets without publicly signaling concerns about future performance or strategic vulnerabilities.

Example: An airline hedging fuel prices or a tech company hedging regulatory outcomes

Political Markets

High-stakes political prediction markets attract sophisticated participants who require privacy for regulatory compliance and personal security reasons.

Example: Election forecasting with participation from policy experts and political insiders

DAO Governance

DAOs can create internal prediction markets for resource allocation decisions while maintaining voting privacy and preventing strategic manipulation.

Example: Predicting success of protocol upgrades or treasury investment decisions

9. Development Roadmap

Phase 1: Foundation & Token Launch

November 2025
  • • Launch ProofSight Token (TGE)
  • • Build community through social media and partnerships
  • • Circuit design and trusted setup ceremony
  • • Core smart contract development on Solana devnet
  • • Initial security audits of ZK circuits
  • • Testnet launch with limited markets

Phase 2: Mainnet Beta

December 2025
  • • Mainnet deployment with capped TVL
  • • Initial market categories (politics, crypto, sports)
  • • Web and mobile interface launch
  • • Early adopter incentive program
  • • Community governance participation

Phase 3: Full Launch

January 2026
  • • Remove TVL caps and scale infrastructure
  • • API access for institutional integrations
  • • Cross-chain bridge for multi-chain liquidity
  • • Decentralized governance activation
  • • Strategic partnerships with major DeFi protocols

Phase 4: Expansion

February 2026
  • • Advanced market types (conditional, combinatorial)
  • • Mobile SDK for third-party integrations
  • • Machine learning for market quality scoring
  • • Research partnerships with academic institutions
  • • Global community expansion and localization

10. Future Research and Open Problems

ProofSight represents the first generation of privacy-preserving prediction markets. Several areas of ongoing research will shape the protocol's evolution:

Recursive Proof Composition

Exploring recursive SNARKs to enable proof aggregation, reducing on-chain verification costs and enabling more complex market structures with nested privacy guarantees.

Cross-Chain Privacy Bridges

Developing ZK-based bridges to enable private deposits from Ethereum, Polygon, and other chains while maintaining anonymity across ecosystems.

Adaptive Anonymity Sets

Research into dynamic anonymity set construction that adapts to market conditions, balancing privacy strength with capital efficiency.

Post-Quantum Security

Investigating lattice-based and hash-based ZK proof systems resistant to quantum computing attacks, ensuring long-term protocol security.

Privacy-Preserving MEV

Exploring mechanisms to capture and redistribute MEV in privacy-preserving contexts, ensuring fair value distribution without compromising anonymity.

11. Conclusion

ProofSight represents a fundamental advancement in prediction market design, solving the transparency paradox that has limited institutional adoption and market efficiency. By leveraging zero-knowledge cryptography and Solana's high-performance infrastructure, we enable a new class of prediction markets where privacy and transparency coexist.

The protocol creates economic incentives for high-signal capital to participate in information aggregation without the strategic risks imposed by full transparency. As prediction markets mature into critical infrastructure for collective intelligence and risk management, privacy-preserving designs like ProofSight will become essential for unlocking their full potential.

Join the Revolution

ProofSight is open-source and community-driven. We invite researchers, developers, traders, and privacy advocates to contribute to the protocol's development and help shape the future of anonymous prediction markets.

Development Status

This litepaper describes ProofSight as of January 2025. The protocol is in active development and has not undergone full security audits. Specifications, parameters, and architectural decisions are subject to change as research progresses and community feedback is incorporated.

Do not use ProofSight with funds you cannot afford to lose. This litepaper is for informational purposes only and does not constitute investment advice or a solicitation to participate in any financial activity.

References

[1] Ben-Sasson et al. (2014) "Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture"

[2] Groth (2016) "On the Size of Pairing-based Non-interactive Arguments"

[3] Grassi et al. (2021) "Poseidon: A New Hash Function for Zero-Knowledge Proof Systems"

[4] Yakovenko (2017) "Solana: A new architecture for a high performance blockchain"

[5] Buterin (2022) "Privacy Pools for Privacy-Preserving Smart Contracts"

[6] Hanson (2003) "Combinatorial Information Market Design"

[7] Tornado Cash (2020) "Protocol Specification and Security Analysis"

[8] Zcash (2016) "Zcash Protocol Specification"