Filecoin trusted configuration phase completed successfully

Filecoin trusted configuration phase completed successfully

Professionalism and focus, win-win cooperation


Disclaimer: Perfectly translating technical concepts from one language to another is difficult, so please be aware that we cannot guarantee the accuracy of this translation.



Original link:

https://filecoin.io/zh-cn/blog/trusted-setup-complete/


At the end of last year, we successfully completed the first phase of the trusted configuration process, namely "Powers of Tau".


In July this year, we completed the second phase of trusted configuration - generating security parameters for the six logic circuits that will be used by the main network.


Now, both stages of our trusted configuration can use the final parameters for Filecoin mainnet!


Thanks to everyone who participated!



Review of Phase 1


To briefly review, the trusted configuration process is divided into two stages.


The first phase, also known as the “Powers of Tau” phase, applies to all computations provable by Groth16 zk-SNARKs and the largest amount of computation.


The computations proved by SNARKs are represented by models called logic circuits. The basic unit of computation within a circuit is called a constraint. The number of constraints represents the size of the computation. In our session, we generate parameters for any Groth 16 circuit with no more than 130 million constraints.


Over two months, contributors from around the world participated in generating secure and verifiable parameters for Filecoin proofs. Once again, we would like to express our sincere gratitude to everyone who participated and helped make the first phase of trusted configuration a success!




Review of Phase 2


In mid-June, we started the second phase of the trusted configuration process.


This phase mainly generates security parameters for the 6 logic circuits that will be used in the main network.


Similar to the first phase, the output of the second phase is credible as long as one of the parties on the chain is honest.


Likewise, participants from around the world participated in generating secure and verifiable parameters for Filecoin’s proofs. For Phase 2 participants, thank you for supporting this critical part of Filecoin’s journey to mainnet.




Are these outputs reliable?


For both phases, the output is credible if the transcribed parts are verifiable, and we can trust that at least one participant did not leak the randomness of their contribution.


Therefore, for both phases, we tried to bring together a variety of different types of participants - contributors from within the Filecoin ecosystem, competing miners, and teams and individuals outside the Web3 community.


In doing so, we aim to reduce the risk of collusion and increase the probability that at least one contributor to each logic circuit is trustworthy, thus guaranteeing the parametric integrity of the output.


To verify that the parameters of our mainnet logic circuit are the same as the participant’s output, you can follow the instructions here.



Next Steps


For mainnet, no additional action is required - the proof portion of Filecoin is ready to use!


However, the Filecoin team is already considering future upgrades to our proofs to improve the performance and usability of the protocol. When the upgrade occurs, we will begin the second iteration of the trusted configuration to generate security parameters for the new logic circuit.


If you would like to be added to the list of participants, please fill out the corresponding form and join the #fil-trustedsetup channel on our Slack channel to follow the latest developments.






<<:  [100 Questions and Answers about Filecoin in Pictures] Question 31: What does a winning ticket in Filecoin mean?

>>:  Comment on the impact of the central bank's digital currency ecosystem issuance on traditional financial institutions

Recommend

AMFEED coin-launch mode, mining and nodes, x11 algorithm, mined by Dash miner!

AMFEED coin, launch mode, mining and nodes, mainl...

Changzhou Municipal Government: Notice on Preventing Bitcoin Ransomware

Bitcoin ransomware is a new type of malware that ...

How to read forehead lines

As we all know, in physiognomy, different lines r...

How does the Ethereum merger affect the graphics card and blockchain industries?

introduction This article is a meeting record of ...

KnCMiner to launch 16nm Bitcoin mining chip

KnCMiner, a Bitcoin mining company based in Stock...

Your face can tell whether you are healthy

Your face can tell whether you are healthy Observ...

How much trouble can a broken palm cause?

How much trouble can a broken palm cause? 1. What...

According to physiognomy, one ear higher than the other indicates bad health.

The ear is one of the most important organs of th...

Is it good to have a mole on your double chin? Good luck to you.

For a person, facial features often indicate that...

Iran has lifted the ban on Bitcoin mining that was implemented in May this year

According to Bitcoin Magazine, citing Iran Intern...

Can a Filecoin mining machine that costs 248,000 yuan make a profit?

Source of this article: A Blockchain Book, origin...

Fortune-telling jingle

Fortune-telling jingle 1. The secret to an offici...