Filecoin official: Trusted configuration completed successfully

Filecoin official: Trusted configuration completed successfully

01

The trusted configuration phase was successfully completed

At the end of last year, we successfully completed the first phase of the trusted configuration process, which was called "Powers of Tau". In July of this year, we completed the second phase of the trusted configuration - generating security parameters for the 6 logic circuits that will be used by the mainnet. Now, both phases of our trusted configuration can use the final parameters of the Filecoin mainnet! Thank you to everyone who participated!

02

Review of Phase 1

As a quick recap, the trusted configuration session is split into two phases. The first phase, also known as the “Powers of Tau” session, applies to all computations provable by Groth16 zk-SNARKs and the largest possible computations. The computations proven by a SNARK are represented by models called logic circuits. The basic unit of computation within a circuit is called a constraint. The number of constraints represents the size of the computation. In our session, we generate parameters for any Groth 16 circuit with no more than 130 million constraints.

Over two months, contributors from around the world participated in generating secure and verifiable parameters for Filecoin proofs. Once again, we would like to express our sincere gratitude to everyone who participated and helped make the first phase of trusted configuration a success!

03

Review of Phase 2

In mid-June, we began the second phase of the trusted configuration process, which mainly generated security parameters for the 6 logic circuits that will be used for mainnet. Similar to the first phase, the output of the second phase is credible as long as one of the parties on the chain is honest. Similarly, participants from all over the world participated in generating secure and verifiable parameters for Filecoin's proofs. For the participants in the second phase, thank you for your support for a critical part of Filecoin's approach to mainnet.

04

Is the output in the link reliable?

For both phases, the output is credible if the transcribed parts are verifiable, and we can trust that at least one participant did not leak the randomness of their contribution.

Therefore, for both phases, we tried to gather a variety of different types of participants - contributors from within the Filecoin ecosystem, competing miners, and teams and individuals outside the Web3 community. In the process, we aimed to reduce the risk of collusion and increase the probability that at least one contributor to each logic circuit is trustworthy, thereby ensuring the parameter integrity of the output.

To verify that the parameters of our mainnet logic circuit are the same as the participant’s output, you can follow the instructions here .

05

Next Steps

For mainnet, no additional action is required - the proof portion of Filecoin is ready to use!

However, the Filecoin team is already considering future upgrades to our proofs to improve the performance and usability of the protocol. When the upgrade occurs, we will begin the second iteration of the trusted configuration to generate security parameters for the new logic circuit.

If you would like to be added to the list of participants, please fill out this form and join the #fil-trustedsetup channel on our Slack channel to follow the latest developments.


<<:  ETC suffered three 51% attacks in August. Is computing power a flaw?

>>:  Mysterious Bitcoin mining pattern may have been cracked after seven years

Recommend

What kind of woman has a good face and a good fate?

There are many women with good fortunes that can ...

Will Bitcoin Price Explode After Bank of England Cuts Rates?

The latest interest rate decision of the Bank of ...

What does it mean when a woman’s left and right eyes are different sizes?

As one of the traditional physiognomy techniques, ...

SLP develops Bitcoin file protocol to provide secure BCH file storage

According to bitcoin.com on September 23, this we...

The five facial features reveal the inner emotions

In the theory of physiognomy, the five facial fea...

What does the palm of your hand look like to make you rich?

What does the palm of your hand look like to make...

What is the best face for a woman to have a good marriage?

Every woman hopes to have a happy and fulfilling ...

Moles on the belly

1. Mole on the navel: People with such moles have...

Men with pointed noses are more likely to be dark-hearted.

Sometimes, people will instinctively reject some ...