01 The trusted configuration phase was successfully completed At the end of last year, we successfully completed the first phase of the trusted configuration process, which was called "Powers of Tau". In July of this year, we completed the second phase of the trusted configuration - generating security parameters for the 6 logic circuits that will be used by the mainnet. Now, both phases of our trusted configuration can use the final parameters of the Filecoin mainnet! Thank you to everyone who participated! 02 Review of Phase 1 As a quick recap, the trusted configuration session is split into two phases. The first phase, also known as the “Powers of Tau” session, applies to all computations provable by Groth16 zk-SNARKs and the largest possible computations. The computations proven by a SNARK are represented by models called logic circuits. The basic unit of computation within a circuit is called a constraint. The number of constraints represents the size of the computation. In our session, we generate parameters for any Groth 16 circuit with no more than 130 million constraints. Over two months, contributors from around the world participated in generating secure and verifiable parameters for Filecoin proofs. Once again, we would like to express our sincere gratitude to everyone who participated and helped make the first phase of trusted configuration a success! 03 Review of Phase 2 In mid-June, we began the second phase of the trusted configuration process, which mainly generated security parameters for the 6 logic circuits that will be used for mainnet. Similar to the first phase, the output of the second phase is credible as long as one of the parties on the chain is honest. Similarly, participants from all over the world participated in generating secure and verifiable parameters for Filecoin's proofs. For the participants in the second phase, thank you for your support for a critical part of Filecoin's approach to mainnet. 04 Is the output in the link reliable? For both phases, the output is credible if the transcribed parts are verifiable, and we can trust that at least one participant did not leak the randomness of their contribution. Therefore, for both phases, we tried to gather a variety of different types of participants - contributors from within the Filecoin ecosystem, competing miners, and teams and individuals outside the Web3 community. In the process, we aimed to reduce the risk of collusion and increase the probability that at least one contributor to each logic circuit is trustworthy, thereby ensuring the parameter integrity of the output. To verify that the parameters of our mainnet logic circuit are the same as the participant’s output, you can follow the instructions here . 05 Next Steps For mainnet, no additional action is required - the proof portion of Filecoin is ready to use! However, the Filecoin team is already considering future upgrades to our proofs to improve the performance and usability of the protocol. When the upgrade occurs, we will begin the second iteration of the trusted configuration to generate security parameters for the new logic circuit. If you would like to be added to the list of participants, please fill out this form and join the #fil-trustedsetup channel on our Slack channel to follow the latest developments. |
<<: ETC suffered three 51% attacks in August. Is computing power a flaw?
>>: Mysterious Bitcoin mining pattern may have been cracked after seven years
In modern society, people do not pay attention to...
A black forehead is a term in physiognomy, which ...
Appearance is the first thing people see when the...
As one of the traditional physiognomy techniques, ...
Arrogance refers to a character and also a temper...
Eyes are the windows to the soul. Eye shape is ve...
How to judge greed and lust from facial features....
Author: Zou Chun, Researcher at Pudong Innovation...
Double palm lines are a relatively rare phenomeno...
When we put on makeup, we all pay great attention...
Many analysts in the Bitcoin space expected a “de...
Eyelids see your love clearly Eyes are the window...
The wisdom line has a certain influence on everyo...
Rage Review : As more and more financial institut...
Wrinkles are something that everyone has, and the...