[Latest] Trusted Configuration Phase 2

[Latest] Trusted Configuration Phase 2

At the end of last year, we successfully completed the first phase of Trusted Configuration, also known as "powers of tau". Since the end of the year, our team has been preparing for the second phase of Trusted Configuration. To learn more about the second phase and how you can help contribute, keep reading!

If you have not registered before but would like to participate, please fill in This table !(https://forms.gle/XxLgsHmxdPjb7jJa9)

Phase 1 Review

As a quick reminder, trusted configuration is a two-phase process. The first phase, also known as the "powers of tau" phase, applies to all Groth16 zk-SNARKs In our session, we generated a 100 million logic circuit on the BLS 381 curve - the largest circuit on the BLS 381 curve so far! Participants from all over the world contributed their resources over a period of about two months to generate security parameters and public proofs for everyone to verify. Special thanks to the individuals who participated in the first phase and the team -Without your support we can't move to the next stage.

Phase II

As we get closer to mainnet launch, our team has been preparing for the next phase of trusted configuration. Unlike phase 1, phase 2 generates circuit-specific parameters. This means that in phase 2, the parameters of both Proof of Spacetime (PoST) and Proof of Replication (PoReP) will be specific to the hashing algorithm, structure, and sector size that will be finalized. This also means that when we make updates to the proof structure in the future, we will also need to perform a second phase of trusted configuration to generate a new set of security parameters to use with our upgraded proofs.

For our line, we will use a relatively new hashing algorithm Poseidon , this algorithm can greatly reduce the constraints we need to make on the line. In addition, we will use Poseidon for 32GB and 64GB The following algorithm generation parameters for sectors: * SDR PoRep * Windowed PoST * Winning PoST

I want to volunteer. What do I need to do?

If you have not participated, you can simply fill in the form By signing up, you can add your details to the list of volunteers that the Filecoin team may contact before the second phase of the trusted configuration phase. Given the various requirements of the phase and the window period of each phase, it is also possible that some volunteers are not contacted by us to join. We will open community participation in the second phase of the trusted configuration phase from June 29th.



Similar to our Phase 1 process, the Filecoin team will send out a link to schedule a session. Before your testing window, you will receive detailed instructions on the software you need to download and step-by-step instructions for doing a session. In the actual session, participating in a session involves downloading multiple files, running the program (instructions will be provided), and uploading the output for the next participant.

If you want to be kept up to date with the next phase of the process, you can join Slack on #fil-trustedsetup Channel - This is where we will coordinate with the participants.

How long does it take to participate? What kind of computer do I need?

Here is an overview of some of the content and time required for the second stage of the session: * First, you will download the output file from the previous participant in the session (approximately 60GB). * Next, you will need to run the data on the specified software. _Please note that the calculation time is dependent on the specifications of your computer. Our sample calculation times and specifications below are for reference only

  • Finally, you need to upload the processed data (about 40GB).

  • Our verification nodes will check whether your submission is valid and ensure that the next participant can start with your verified contribution. .

Have more questions?

Feel free to contact us chat or get in touch with us by sending an email to [email protected].


<<:  Cryptocurrency card freezing trend (5): No need to worry about card freezing? The right and wrong of the report of China Times

>>:  Losing both the wife and the army? Filecoin miners should avoid the minefield

Recommend

What influences your appearance?

There are countless different appearances in the ...

What does the triangle pattern on the palm mean?

In palmistry , triangle lines are triangular line...

Illegal activities are no longer the main use of Bitcoin, study finds

Rage Comment : Universities in the UK, Germany an...

What is Fortune?

Everyone hopes to be rich all his life, but if no...

Upcoming Ethereum Upgrade – An Underestimated Factor in Influencing ETH Price?

The impact of Ethereum ’s governance decisions on...

Where are the 10 most blessed birthmarks on the human body?

A birthmark is something a child has when he is bo...

What are the ways to resolve the scar on the bridge of the nose?

The bridge of the nose is very important among ou...

Tic-tac-toe pattern appears on the palm

Palmistry with Tic Tac Toe Pattern Tic-tac-toe pa...