Professionalism and focus, win-win cooperation Disclaimer: Perfectly translating technical concepts from one language to another is difficult, so please be aware that we cannot guarantee the accuracy of this translation. Original link: https://filecoin.io/zh-cn/blog/trusted-setup-complete/ At the end of last year, we successfully completed the first phase of the trusted configuration process, namely "Powers of Tau". In July this year, we completed the second phase of trusted configuration - generating security parameters for the six logic circuits that will be used by the main network. Now, both stages of our trusted configuration can use the final parameters for Filecoin mainnet! Thanks to everyone who participated! Review of Phase 1 To briefly review, the trusted configuration process is divided into two stages. The first phase, also known as the “Powers of Tau” phase, applies to all computations provable by Groth16 zk-SNARKs and the largest amount of computation. The computations proved by SNARKs are represented by models called logic circuits. The basic unit of computation within a circuit is called a constraint. The number of constraints represents the size of the computation. In our session, we generate parameters for any Groth 16 circuit with no more than 130 million constraints. Over two months, contributors from around the world participated in generating secure and verifiable parameters for Filecoin proofs. Once again, we would like to express our sincere gratitude to everyone who participated and helped make the first phase of trusted configuration a success! Review of Phase 2 In mid-June, we started the second phase of the trusted configuration process. This phase mainly generates security parameters for the 6 logic circuits that will be used in the main network. Similar to the first phase, the output of the second phase is credible as long as one of the parties on the chain is honest. Likewise, participants from around the world participated in generating secure and verifiable parameters for Filecoin’s proofs. For Phase 2 participants, thank you for supporting this critical part of Filecoin’s journey to mainnet. Are these outputs reliable? For both phases, the output is credible if the transcribed parts are verifiable, and we can trust that at least one participant did not leak the randomness of their contribution. Therefore, for both phases, we tried to bring together a variety of different types of participants - contributors from within the Filecoin ecosystem, competing miners, and teams and individuals outside the Web3 community. In doing so, we aim to reduce the risk of collusion and increase the probability that at least one contributor to each logic circuit is trustworthy, thus guaranteeing the parametric integrity of the output. To verify that the parameters of our mainnet logic circuit are the same as the participant’s output, you can follow the instructions here. Next Steps For mainnet, no additional action is required - the proof portion of Filecoin is ready to use! However, the Filecoin team is already considering future upgrades to our proofs to improve the performance and usability of the protocol. When the upgrade occurs, we will begin the second iteration of the trusted configuration to generate security parameters for the new logic circuit. If you would like to be added to the list of participants, please fill out the corresponding form and join the #fil-trustedsetup channel on our Slack channel to follow the latest developments. |
AMFEED coin, launch mode, mining and nodes, mainl...
Bitcoin ransomware is a new type of malware that ...
As we all know, in physiognomy, different lines r...
introduction This article is a meeting record of ...
KnCMiner, a Bitcoin mining company based in Stock...
Your face can tell whether you are healthy Observ...
How much trouble can a broken palm cause? 1. What...
Men with wide and full foreheads are destined to ...
On January 6, according to the Bitstamp platform,...
The ear is one of the most important organs of th...
For a person, facial features often indicate that...
According to Bitcoin Magazine, citing Iran Intern...
Source of this article: A Blockchain Book, origin...
Fortune-telling jingle 1. The secret to an offici...
According to data from Scamwatch, an agency under...