Filecoin trusted configuration phase completed successfully

Filecoin trusted configuration phase completed successfully

Professionalism and focus, win-win cooperation


Disclaimer: Perfectly translating technical concepts from one language to another is difficult, so please be aware that we cannot guarantee the accuracy of this translation.



Original link:

https://filecoin.io/zh-cn/blog/trusted-setup-complete/


At the end of last year, we successfully completed the first phase of the trusted configuration process, namely "Powers of Tau".


In July this year, we completed the second phase of trusted configuration - generating security parameters for the six logic circuits that will be used by the main network.


Now, both stages of our trusted configuration can use the final parameters for Filecoin mainnet!


Thanks to everyone who participated!



Review of Phase 1


To briefly review, the trusted configuration process is divided into two stages.


The first phase, also known as the “Powers of Tau” phase, applies to all computations provable by Groth16 zk-SNARKs and the largest amount of computation.


The computations proved by SNARKs are represented by models called logic circuits. The basic unit of computation within a circuit is called a constraint. The number of constraints represents the size of the computation. In our session, we generate parameters for any Groth 16 circuit with no more than 130 million constraints.


Over two months, contributors from around the world participated in generating secure and verifiable parameters for Filecoin proofs. Once again, we would like to express our sincere gratitude to everyone who participated and helped make the first phase of trusted configuration a success!




Review of Phase 2


In mid-June, we started the second phase of the trusted configuration process.


This phase mainly generates security parameters for the 6 logic circuits that will be used in the main network.


Similar to the first phase, the output of the second phase is credible as long as one of the parties on the chain is honest.


Likewise, participants from around the world participated in generating secure and verifiable parameters for Filecoin’s proofs. For Phase 2 participants, thank you for supporting this critical part of Filecoin’s journey to mainnet.




Are these outputs reliable?


For both phases, the output is credible if the transcribed parts are verifiable, and we can trust that at least one participant did not leak the randomness of their contribution.


Therefore, for both phases, we tried to bring together a variety of different types of participants - contributors from within the Filecoin ecosystem, competing miners, and teams and individuals outside the Web3 community.


In doing so, we aim to reduce the risk of collusion and increase the probability that at least one contributor to each logic circuit is trustworthy, thus guaranteeing the parametric integrity of the output.


To verify that the parameters of our mainnet logic circuit are the same as the participant’s output, you can follow the instructions here.



Next Steps


For mainnet, no additional action is required - the proof portion of Filecoin is ready to use!


However, the Filecoin team is already considering future upgrades to our proofs to improve the performance and usability of the protocol. When the upgrade occurs, we will begin the second iteration of the trusted configuration to generate security parameters for the new logic circuit.


If you would like to be added to the list of participants, please fill out the corresponding form and join the #fil-trustedsetup channel on our Slack channel to follow the latest developments.






<<:  [100 Questions and Answers about Filecoin in Pictures] Question 31: What does a winning ticket in Filecoin mean?

>>:  Comment on the impact of the central bank's digital currency ecosystem issuance on traditional financial institutions

Recommend

How to read girls' palm lines? Straight and smooth relationship

There are some differences in the views on girls&...

Almond eyes face reading

Almond eyes playful Characteristics of Almond Eye...

Caiyun Review: Bitmain Bitcoin Miner Power Supply APW3-12-1600-B2

Bitmain's Ant Power Supply was released in Ma...

How will a man with a bulbous nose enjoy wealth and glory?

Is it good for a man to have a bulbous nose? A ga...

What disaster will happen to you?

What disaster will happen to you? If the tail of ...

The facial features of people who lack tolerance

In this vast world, there are countless people, a...

The facial features of a stupid person The facial features of a stupid person

In this world, some people are very smart. They h...

Women's palmistry fortune telling diagram palmistry characteristics influence

Palmistry is a relatively important part of fortu...

Face analysis: blue veins are visible on the forehead

The "blue veins" that we often talk abo...