Privacy Scales Better

A rollup for high-throughput, private applications

Using Polygon Miden, builders can create novel, high-throughput, private applications for payments, DeFi, digital assets and gaming. Applications and users are secured by Ethereum and AggLayer.

Explore beyond the EVM while retaining the security of Ethereum


Build novel applications

  • Computational- or data-heavy or private applications are cheap to run
  • Build complex incomplete information games, and advanced wallets with assets hidden from the public

High Throughput

  • Actor-based model allows for concurrent transaction execution
  • Build order-book exchanges on Miden

Asset Safety

  • Account abstraction and Move provide a secure environment for your assets
  • Build wallets that can change keys and be recovered; stay sovereign with your data

Own your data

  • Users can decide which data is stored by the network and visible and which data only they can see
  • Build wallets for founders and liquidity providers - easy to manage and partially hidden

Polygon Miden’s new paradigm:
client-side proving

The Miden VM is optimized for STARK-proofs and not for EVM-equivalence. Developers will need to learn new paradigms compared to Ethereum but can also expect features beyond EVM boundaries enabled by local execution.

Other scaling solutions

Polygon PoS

Support the most widely used Ethereum L2 ecosystem that offers EVM compatibility and an ultimate user experience with fast transactions at near-zero gas fees today.

Learn More

Polygon zkEVM

Unlock Ethereum scalability while maintaining security with the first ZK-rollup that offers EVM equivalence with fast transactions at near-zero gas cost today.

Learn More

Polygon CDK

Build app-chains powered by an industry-leading technology and ecosystem around Polygon

Learn More

Polygon Avail

Increase throughput without sacrificing decentralization with a base consensus and data availability layer for chains.

Learn More

Polygon ID

Build trusted and secure relationships between users and dApps, following the principles of self sovereign identity and privacy by default.

Learn More
Public Chains
App Specific Chain
Data Availability
Decentralized Identity