Encrypted Gaming Track by Arcium

Prizes

1st

$6,000 USDC + mentorship session with Arcium team + featured X post

2nd

$3,000 USDC

3rd

$1,000 USDC

Objectives

Drive adoption of Arcium’s encrypted execution layer among gaming and interactive dApp teams.

Empower builders to create privacy-preserving games leveraging MPC-backed confidential computing.

Position Arcium as the backbone for next-generation on-chain games requiring secrecy, fairness, and trust-minimized logic.

Generate high-quality open-source MVPs capable of evolving into long-term ecosystem products.

Participants will build games, applications, or interactive systems powered by Arcium’s encrypted compute.

The goal: demonstrate how private gameplay logic and mechanics can execute confidentially using Arcium—while still benefiting from Solana’s security and settlement layer.

Suggested Challenge Areas

Hidden-Information Games

Build games where secrecy is core to gameplay—hands, unit positions, inventories, fog-of-war, and strategic actions remain encrypted and are revealed only when rules require it (e.g., poker, Battleship-style, Dark Forest-like strategy).

Social Deduction & Bluffing Games

Create games with hidden roles, private intentions, or secret coordination. Roles, votes, and actions stay encrypted while outcomes resolve fairly—enabling on-chain Mafia/Werewolf/Among Us-style mechanics without leaking state.

Randomness-Driven Games

Develop systems for shuffles, dice rolls, loot drops, matchmaking, spawns, and world generation where randomness is generated and processed confidentially to prevent prediction and manipulation.

Guessing & Puzzle Games

Build puzzles where solutions cannot be public at deployment—answers remain encrypted while guesses are verified privately (Wordle-style, code-breaking, Sudoku variants, GeoGuessr-like mechanics).

Privacy-Preserving Multiplayer & PvP

Create multiplayer or PvP games where player data, strategies, match actions, or bids remain encrypted—enabling fair, trust-minimized gameplay without exposing sensitive information on-chain.

Dashboard — Matrix Hackathon — Matrix Hackathon