Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
green-blockchain-energy-and-sustainability
Blog

Why Proof-of-Inclusion is Critical for the Next Generation of Verifiable Data

An analysis of how Proof-of-Inclusion, the cryptographic method for verifying data is part of a larger set, underpins scalable data availability layers and validity proofs, forming the non-negotiable foundation for modular blockchain architectures.

introduction
THE VERIFICATION GAP

Introduction

Proof-of-Inclusion is the foundational primitive for scaling verifiable data beyond simple transaction finality.

Proof-of-Inclusion (PoI) is the atomic unit of trust for decentralized systems. It is a cryptographic proof that specific data exists within a larger, agreed-upon dataset, like a blockchain or a data availability layer. This moves verification from checking the entire chain to validating a single, succinct proof.

Current blockchains only prove finality, not content. L2s like Arbitrum and Optimism prove a batch of transactions was finalized on Ethereum, but they do not natively prove that your specific transaction is inside that batch. This creates a verification gap for cross-chain applications and data consumers.

The next generation of interoperability depends on PoI. Protocols like LayerZero and Axelar rely on off-chain attestations. A standardized PoI primitive, akin to what Celestia's Blobstream provides for rollups, would allow these systems to move from trusted relayers to cryptographically verifiable data proofs.

Evidence: Without PoI, intent-based systems like UniswapX and CowSwap require centralized sequencers to resolve cross-chain trades. A universal PoI standard would decentralize this process, enabling verifiable inclusion of orders and settlements across any chain.

thesis-statement
THE VERIFIABILITY GAP

Thesis Statement

Proof-of-Inclusion is the foundational primitive that closes the verifiability gap between raw data and actionable state, enabling the next generation of scalable, trust-minimized applications.

Proof-of-Inclusion (PoI) is the atomic unit of verifiability. It cryptographically proves a specific piece of data exists within a larger dataset without revealing the whole set, moving beyond simple data availability to actionable data verification.

Current systems like Celestia or EigenDA provide data availability, not verification. They guarantee data is published, but applications must still download and recompute entire blocks to verify specific transactions, creating a scalability bottleneck for light clients and cross-chain protocols.

PoI enables stateless verification for protocols like Uniswap and Aave. A light client can verify a single user's swap or liquidation event with a Merkle proof, eliminating the need to sync the entire chain state, which is the core innovation behind intent-based architectures.

The metric is verification overhead. Without PoI, a zkRollup's proof verification on Ethereum costs ~500k gas; with PoI, a light client verifies a single inclusion in sub-100k gas, enabling verifiable data feeds for oracles like Chainlink and cross-chain messaging like LayerZero.

market-context
THE VERIFIABILITY GAP

Market Context: The Modular Data Wars

The proliferation of modular blockchains and data availability layers has created a critical need for proof-of-inclusion to verify data authenticity across fragmented systems.

Proof-of-inclusion is non-negotiable. Modular architectures like Celestia and EigenDA separate execution from data availability, creating a trust gap between where data is stored and where it is used. Rollups on Arbitrum or Optimism must prove their transaction data was published to the base layer.

The alternative is re-centralization. Without cryptographic proofs, users and bridges like LayerZero and Across must trust operator honesty. This recreates the custodial risk that decentralized systems were built to eliminate, making data availability a meaningless promise.

Verifiable data enables new primitives. Proofs allow protocols like UniswapX to execute intents across chains with guaranteed settlement. They are the foundation for shared sequencers, like those proposed by Espresso, to prove censorship resistance.

Evidence: The Ethereum Dencun upgrade's proto-danksharding (EIP-4844) reduces costs but increases the attack surface for data withholding, making proofs essential for L2s like Base and zkSync to maintain security guarantees.

deep-dive
THE VERIFICATION LAYER

Deep Dive: Merkle Proofs, KZG Commitments, and the DA Guarantee

Data availability is worthless without a cheap, universal proof-of-inclusion mechanism.

Proof-of-inclusion is the bottleneck. A blockchain's state is a function of its data. Without a cheap way to prove data exists, you cannot rebuild state or verify fraud proofs. This is the core challenge for modular architectures like Celestia and EigenDA.

Merkle proofs are the incumbent standard. They provide cryptographic proof that a transaction is in a block. Their simplicity powers light clients and bridges like Across. The scaling limitation is bandwidth; proofs grow logarithmically with data size, creating overhead for high-throughput chains.

KZG commitments are the polynomial alternative. A single, constant-sized KZG commitment can prove any piece of data within a larger blob. This eliminates the bandwidth problem, enabling efficient validity proofs for voluminous data in Ethereum's EIP-4844 blobs.

The trade-off is trust versus complexity. Merkle trees require no trusted setup but have larger proofs. KZG commitments need a one-time trusted ceremony but offer optimal proof size. The choice dictates the cost structure for L2s like Arbitrum or Optimism posting data.

The endgame is universal verification. A user's device must verify data from any chain. Projects like Avail and Near's Nightshade are building this infrastructure. Without it, data availability layers become trusted data providers, negating their cryptographic value.

PROOF-OF-INCLUSION IMPLEMENTATIONS

DA Layer Comparison: The PoI Implementation Spectrum

A feature and performance matrix comparing how leading Data Availability layers implement Proof-of-Inclusion, the critical primitive for verifiable data retrieval.

Feature / MetricCelestia (Blobstream)EigenDA (EigenLayer AVS)Avail (Data Availability Committee)Near DA (NEAR Protocol)

PoI Attestation Method

Data Root Commitment to Ethereum L1 via Blobstream

Dispersed Data Attestation via EigenLayer Operators

KZG Commitments + Validity Proofs

NEAR Light Client Proofs on Ethereum

Data Availability Guarantee

Economic Security (Celestia Validator Stake)

Cryptoeconomic Security (Restaked ETH via EigenLayer)

Committee Security + Cryptographic Proofs

NEAR Protocol Consensus Security

Time to Data Attestation on Ethereum

< 1 hour

< 10 minutes

< 20 minutes

< 2 hours

Cost per MB (Ethereum Calldata Equivalent)

$0.001 - $0.01

$0.0005 - $0.005

$0.002 - $0.015

$0.0001 - $0.001

Supports Direct Data Proofs (No Full Node)

Integration Complexity for Rollups

Medium (Blobstream contracts)

High (EigenLayer operator set)

Low (Standardized KZG API)

Low (NEAR RPC client)

Throughput (MB per second)

100 MB/s

50 MB/s

30 MB/s

15 MB/s

Primary Use Case Focus

Sovereign & Modular Rollups

High-Frequency Ethereum L2s (e.g., hyperchains)

General-Purpose Validity & ZK Rollups

Cost-Sensitive L2s & Appchains

protocol-spotlight
FROM ABSTRACT THEORY TO PRODUCTION SYSTEMS

Protocol Spotlight: PoI in the Wild

Proof-of-Inclusion (PoI) is moving from whitepapers to core infrastructure, solving verifiable data problems that blockchains can't.

01

The Problem: Trustless Cross-Chain State

Bridges and oracles need to prove off-chain data was included in a source chain's history without replaying the entire chain. Light clients are impractical for high-frequency updates.

  • Key Benefit: Enables ~500ms latency for cross-chain messages via LayerZero and Axelar.
  • Key Benefit: Reduces oracle reporting costs by -70% for protocols like Chainlink and Pyth.
~500ms
Latency
-70%
Oracle Cost
02

The Solution: Celestia's Data Availability Sampling

Celestia uses PoI at its core to allow light nodes to cryptographically verify that transaction data is available without downloading it all.

  • Key Benefit: Enables $1B+ modular blockchains like dYmension and Manta to scale securely.
  • Key Benefit: Light nodes achieve 10,000x resource efficiency vs. full nodes, enabling decentralization.
$1B+
Secured TVL
10,000x
Efficiency Gain
03

The Problem: Verifiable Compute Off-Chain

L2s and co-processors like Risc Zero and Espresso must prove their execution is based on valid, on-chain data. Fraud proofs require a cryptographic anchor.

  • Key Benefit: Enables Ethereum L2s to scale while maintaining EVM-equivalent security.
  • Key Benefit: Allows zk-Rollups like zkSync to generate proofs from proven data, closing the trust gap.
EVM
Security Parity
zk
Proof Foundation
04

The Solution: Avail's Proof-of-Inclusion Validity

Avail's PoI proofs allow any user to verify a specific piece of data is committed to the chain, forming the bedrock for sovereign rollups and validiums.

  • Key Benefit: Sovereign chains like Polygon Miden achieve data availability without a central sequencer.
  • Key Benefit: Reduces validium withdrawal times from 7 days to near-instant via cryptographic proof.
Sovereign
Chain Security
~Instant
Withdrawals
05

The Problem: Intent-Based Systems & MEV

Solving intents requires proving fulfillment conditions were met on external chains. Without PoI, systems like UniswapX and CowSwap rely on centralized risk.

  • Key Benefit: Enables Across Protocol's optimistic bridge to securely settle on proven inclusion.
  • Key Benefit: Mitigates MEV extraction by providing a verifiable history for fair ordering.
Secure
Intent Fulfillment
MEV
Mitigation
06

The Future: Universal Proof Markets

PoI creates a commodity: verifiable proof of state. Networks like EigenLayer and AltLayer will monetize proof generation and verification.

  • Key Benefit: Creates a $100M+ market for decentralized proving services.
  • Key Benefit: Unlocks interoperability as a provable primitive, not a trusted bridge.
$100M+
Market Potential
Universal
Interop
counter-argument
THE BLOCKSPACE TRAP

Counter-Argument: Is Dedicated DA Even Necessary?

The push for dedicated data availability layers ignores the fundamental economic and security guarantees of the base settlement layer.

Settlement is the ultimate backstop. Dedicated DA layers create a fragmented security model where finality depends on a separate, weaker chain. The L1 settlement layer already provides the strongest, most expensive-to-attack data availability guarantee. Replicating this off-chain introduces unnecessary trust and complexity.

Proof-of-Inclusion is the universal primitive. The critical innovation is not a new DA layer, but a cryptographic proof that data is available somewhere verifiable. This proof can be posted to any secure chain, like Ethereum or Bitcoin, making the location of the raw data a secondary concern. Projects like Celestia and EigenDA are solutions to a problem that Proof-of-Inclusion redefines.

The cost argument is a red herring. Proponents cite cheaper blob storage, but this ignores the systemic risk premium. A rollup using a dedicated DA layer trades Ethereum's security for marginal cost savings, creating a hidden liability. The failure of an external DA layer compromises all dependent rollups, a risk not priced into transaction fees.

Evidence: The Ethereum Dencun upgrade with EIP-4844 (blobs) reduced L2 costs by over 90% while keeping data secured by Ethereum validators. This demonstrates that scaling data availability on the settlement layer is the correct architectural path, not outsourcing it.

risk-analysis
ARCHITECTURAL VULNERABILITIES

Risk Analysis: Where PoI-Based Systems Can Fail

Proof-of-Inclusion (PoI) is foundational for verifiable data, but its security model has critical failure modes that can compromise entire ecosystems.

01

The Data Availability Oracle Problem

PoI proves data is somewhere, but not that it's available. A malicious sequencer can withhold data after generating a valid proof, creating a censorship vector. This breaks the liveness guarantee for fraud/validity proofs.

  • Key Risk: Reliance on a single honest node to re-publish data.
  • Key Failure: Layer 2s like Arbitrum or Optimism become unprovable if their DA layer (e.g., Celestia, EigenDA) experiences targeted withholding.
7 Days
Challenge Window
1-of-N
Honest Assumption
02

Proof Recursion & State Bloat

Recursive PoI (e.g., in zkRollups) compresses proofs but creates a verification dependency chain. A single invalid proof at any layer corrupts all subsequent state.

  • Key Risk: Cumulative proving time and cost create centralization pressure.
  • Key Failure: Systems like zkSync and StarkNet risk chain halts if their proof aggregation layer fails, as seen in early Polygon zkEVM mainnet beta incidents.
O(log n)
Proof Growth
$1M+
Prover Cost
03

The Trusted Setup Ceremony

Most efficient PoI systems (zk-SNARKs) require a trusted setup. A compromised ceremony leaks toxic waste, allowing infinite fake proofs. While 'perpetual' systems exist, they trade off performance.

  • Key Risk: Single point of failure in the system's genesis.
  • Key Failure: Entire networks like Zcash or early Aztec rely on the integrity of a multi-party computation (MPC) that cannot be fully audited post-hoc.
1,000+
Participants
Irreversible
If Compromised
04

Economic Finality vs. Cryptographic Finality

PoI often settles for economic finality (e.g., 30-minute challenge windows) over instant cryptographic finality. This creates a race condition for exploiters during the dispute period.

  • Key Risk: High-value DeFi protocols on Optimistic Rollups must impose long withdrawal delays (~7 days) to mitigate this.
  • Key Failure: The Nomad Bridge hack exploited a slow fraud proof mechanism, allowing $190M to be drained before mitigation.
$190M
Exploit Case
7 Days
Standard Delay
05

Centralized Prover Infrastructure

Generating PoI (especially zkProofs) is computationally intensive, leading to prover centralization. A handful of entities (e.g., Espresso Systems, GeoLite) often control the proving hardware, creating a new trust vector.

  • Key Risk: Cartels can censor transactions or extract maximal value (MEV) by manipulating proof ordering and timing.
  • Key Failure: Similar to MEV-Boost relay centralization on Ethereum, which poses a significant network risk.
<10
Major Provers
>90%
Market Share
06

Interoperability & Bridge Fragility

Cross-chain PoI (used by LayerZero, Axelar) relies on off-chain oracle/relayer networks. A super-majority collusion (e.g., 2/3 of signers) can mint fake assets on any connected chain.

  • Key Risk: The security collapses to the weakest linked chain's economic security.
  • Key Failure: The Wormhole hack ($325M) and PolyNetwork hack ($611M) were essentially failures in cross-chain verification and signature schemes.
2/3
Collusion Threshold
$600M+
Historic Loss
future-outlook
THE PROOF STACK

Future Outlook: Beyond Merkle and KZG

Proof-of-Inclusion is the fundamental primitive for building verifiable data layers that scale beyond simple state commitments.

Proof-of-Inclusion primitives unlock data-centric architectures. Merkle trees and KZG commitments only prove state; they cannot prove that specific data was included in a transaction or block. This gap forces protocols like The Graph to index everything, creating massive redundancy and cost.

Verifiable data availability layers require inclusion proofs. A true DA layer like Celestia or EigenDA must prove a specific blob was published, not just that some data exists. Proof-of-Inclusion is the missing cryptographic link between data publication and its consumption by rollups like Arbitrum or zkSync.

Intent-based systems depend on inclusion proofs for trust. Protocols like UniswapX and CowSwap route orders off-chain. Proving order inclusion in a solver's bundle, not just final settlement, is critical for user trust and preventing MEV extraction.

Evidence: The Ethereum Danksharding roadmap explicitly separates data availability sampling (proving data is there) from data retrieval (fetching it). Proof-of-Inclusion is the cryptographic guarantee that makes sampling feasible at scale.

takeaways
THE VERIFIABLE DATA STACK

Takeaways

Proof-of-Inclusion is the cryptographic primitive that moves trust from centralized APIs to verifiable on-chain state.

01

The Oracle Problem: Trusting Off-Chain Data Feeds

DApps rely on oracles like Chainlink and Pyth for price data, but verifying the inclusion of that data in the source chain's state is impossible without PoI. This creates a trust gap.

  • Vulnerability: Relayers can censor or delay data delivery.
  • Inefficiency: Redundant attestations from multiple oracles drive up costs.
  • Solution Path: PoI allows any node to cryptographically verify that the data was legitimately published on the source chain, collapsing the trust model.
$10B+
TVL at Risk
~2-5s
Latency Overhead
02

The Bridge Problem: Proving Cross-Chain State

Bridges like LayerZero and Axelar use off-chain relayers to pass messages. Users must trust these relayers to faithfully report the state of the source chain.

  • Attack Surface: Malicious relayers can forge state proofs, leading to exploits like the Wormhole hack.
  • Cost: Light client bridges are secure but computationally expensive for the destination chain.
  • Solution Path: PoI (e.g., via zk-proofs or optimistic verification) allows the destination chain to cheaply verify that a transaction was included on the source chain, making bridges intrinsically verifiable.
$2B+
Bridge Exploits
-90%
Verification Gas
03

The Data Availability Problem: Scaling with Rollups

Ethereum rollups (Optimism, Arbitrum, zkSync) post data to L1 for DA. Validiums and Celestia use separate DA layers. How do you prove the data is available?

  • Core Issue: Without PoI, you trust the DA committee or a multisig.
  • Scalability Trade-off: Full data on L1 is expensive; external DA is cheaper but requires new trust assumptions.
  • Solution Path: PoI schemes like Data Availability Sampling (DAS) and zk-proofs of storage allow nodes to probabilistically verify data is stored and retrievable, enabling secure modular blockchains.
100x
Cheaper DA
~10KB
Proof Size
04

The Intent Problem: Unbundling Execution

UniswapX, CowSwap, and Across use solvers to fulfill user intents. The user must trust the solver's proof of execution.

  • Opaque Process: Did the solver get the best price? Did they actually settle on the stated chain?
  • Fragmented Liquidity: Solvers compete off-chain, but settlement proofs are complex.
  • Solution Path: PoI creates a verifiable audit trail. A solver can provide a proof that their solution was included in the canonical on-chain auction, making the process transparent and enforceable.
30-40%
Better Prices
0 Trust
Required
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Proof-of-Inclusion: The Bedrock of Modular Blockchain Stacks | ChainScore Blog