Proof of Pi · Compute for Science

A useful computation network secured by mathematical verification.

Picoin transforms Proof of Work into Proof of Pi: miners perform deterministic pi computation, validators verify the work, and the protocol routes value toward scientific compute infrastructure.

Protocol

Proof of Pi turns computation into verifiable network security.

Deterministic work

Miners compute assigned hexadecimal ranges of pi using a deterministic algorithm, producing compact hashes and commitments instead of storing large decimal data on-chain.

Independent validation

Validators verify commitments, samples, hashes and block proposals. Quorum-based approval keeps the chain focused on accepted, reproducible computation.

Auditable state

Blocks, rewards, reserves, checkpoints and treasury balances are designed to remain inspectable through explorer and protocol-level audit tools.

Useful Computation

Scientific compute is part of the protocol design, not an afterthought.

Picoin extends beyond mathematical mining with a Science Compute Layer: staking-based access, job accounting, reward reserves, verification states, and lightweight on-chain records for scientific and AI compute workflows.

The L1 stores only what should be permanent: stake, access, hashes, metadata references, job states, compute units, reserve accounting and payment rules.

Economy

Continuous emission aligned with miners, validators and science.

67% Proof-of-Pi miners
20% Science Compute Reserve
10% Validators and auditors
3% Scientific Development Treasury

Design Principles

Built for clarity, verification and long-term scientific utility.

01

Do not store heavy compute data on-chain.

Use hashes, metadata pointers, proofs and state transitions for durable L1 records.

02

Pay only for accepted work.

Rewards are tied to completed, verified and accepted computation paths.

03

Keep science funding auditable.

The reserve and treasury are separated so marketplace rewards and protocol development remain clear.