At the end of last year, we successfully completed the first phase of Trusted Configuration, also known as "powers of tau". Since the end of the year, our team has been preparing for the second phase of Trusted Configuration. To learn more about the second phase and how you can help contribute, keep reading!
If you have not registered before but would like to participate, please fill in This table !(https://forms.gle/XxLgsHmxdPjb7jJa9)
Phase 1 Review
As a quick reminder, trusted configuration is a two-phase process. The first phase, also known as the "powers of tau" phase, applies to all Groth16 zk-SNARKs In our session, we generated a 100 million logic circuit on the BLS 381 curve - the largest circuit on the BLS 381 curve so far! Participants from all over the world contributed their resources over a period of about two months to generate security parameters and public proofs for everyone to verify. Special thanks to the individuals who participated in the first phase and the team -Without your support we can't move to the next stage.
Phase II
As we get closer to mainnet launch, our team has been preparing for the next phase of trusted configuration. Unlike phase 1, phase 2 generates circuit-specific parameters. This means that in phase 2, the parameters of both Proof of Spacetime (PoST) and Proof of Replication (PoReP) will be specific to the hashing algorithm, structure, and sector size that will be finalized. This also means that when we make updates to the proof structure in the future, we will also need to perform a second phase of trusted configuration to generate a new set of security parameters to use with our upgraded proofs.
For our line, we will use a relatively new hashing algorithm Poseidon , this algorithm can greatly reduce the constraints we need to make on the line. In addition, we will use Poseidon for 32GB and 64GB The following algorithm generation parameters for sectors: * SDR PoRep * Windowed PoST * Winning PoST
I want to volunteer. What do I need to do?
If you have not participated, you can simply fill in the form By signing up, you can add your details to the list of volunteers that the Filecoin team may contact before the second phase of the trusted configuration phase. Given the various requirements of the phase and the window period of each phase, it is also possible that some volunteers are not contacted by us to join. We will open community participation in the second phase of the trusted configuration phase from June 29th.
Similar to our Phase 1 process, the Filecoin team will send out a link to schedule a session. Before your testing window, you will receive detailed instructions on the software you need to download and step-by-step instructions for doing a session. In the actual session, participating in a session involves downloading multiple files, running the program (instructions will be provided), and uploading the output for the next participant.
If you want to be kept up to date with the next phase of the process, you can join Slack on #fil-trustedsetup Channel - This is where we will coordinate with the participants.
How long does it take to participate? What kind of computer do I need?
Here is an overview of some of the content and time required for the second stage of the session: * First, you will download the output file from the previous participant in the session (approximately 60GB). * Next, you will need to run the data on the specified software. _Please note that the calculation time is dependent on the specifications of your computer. Our sample calculation times and specifications below are for reference only
Finally, you need to upload the processed data (about 40GB).
Our verification nodes will check whether your submission is valid and ensure that the next participant can start with your verified contribution. .
Have more questions?
Feel free to contact us chat or get in touch with us by sending an email to [email protected].