[Latest] Trusted Configuration Phase 2

[Latest] Trusted Configuration Phase 2

At the end of last year, we successfully completed the first phase of Trusted Configuration, also known as "powers of tau". Since the end of the year, our team has been preparing for the second phase of Trusted Configuration. To learn more about the second phase and how you can help contribute, keep reading!

If you have not registered before but would like to participate, please fill in This table !(https://forms.gle/XxLgsHmxdPjb7jJa9)

Phase 1 Review

As a quick reminder, trusted configuration is a two-phase process. The first phase, also known as the "powers of tau" phase, applies to all Groth16 zk-SNARKs In our session, we generated a 100 million logic circuit on the BLS 381 curve - the largest circuit on the BLS 381 curve so far! Participants from all over the world contributed their resources over a period of about two months to generate security parameters and public proofs for everyone to verify. Special thanks to the individuals who participated in the first phase and the team -Without your support we can't move to the next stage.

Phase II

As we get closer to mainnet launch, our team has been preparing for the next phase of trusted configuration. Unlike phase 1, phase 2 generates circuit-specific parameters. This means that in phase 2, the parameters of both Proof of Spacetime (PoST) and Proof of Replication (PoReP) will be specific to the hashing algorithm, structure, and sector size that will be finalized. This also means that when we make updates to the proof structure in the future, we will also need to perform a second phase of trusted configuration to generate a new set of security parameters to use with our upgraded proofs.

For our line, we will use a relatively new hashing algorithm Poseidon , this algorithm can greatly reduce the constraints we need to make on the line. In addition, we will use Poseidon for 32GB and 64GB The following algorithm generation parameters for sectors: * SDR PoRep * Windowed PoST * Winning PoST

I want to volunteer. What do I need to do?

If you have not participated, you can simply fill in the form By signing up, you can add your details to the list of volunteers that the Filecoin team may contact before the second phase of the trusted configuration phase. Given the various requirements of the phase and the window period of each phase, it is also possible that some volunteers are not contacted by us to join. We will open community participation in the second phase of the trusted configuration phase from June 29th.



Similar to our Phase 1 process, the Filecoin team will send out a link to schedule a session. Before your testing window, you will receive detailed instructions on the software you need to download and step-by-step instructions for doing a session. In the actual session, participating in a session involves downloading multiple files, running the program (instructions will be provided), and uploading the output for the next participant.

If you want to be kept up to date with the next phase of the process, you can join Slack on #fil-trustedsetup Channel - This is where we will coordinate with the participants.

How long does it take to participate? What kind of computer do I need?

Here is an overview of some of the content and time required for the second stage of the session: * First, you will download the output file from the previous participant in the session (approximately 60GB). * Next, you will need to run the data on the specified software. _Please note that the calculation time is dependent on the specifications of your computer. Our sample calculation times and specifications below are for reference only

  • Finally, you need to upload the processed data (about 40GB).

  • Our verification nodes will check whether your submission is valid and ensure that the next participant can start with your verified contribution. .

Have more questions?

Feel free to contact us chat or get in touch with us by sending an email to [email protected].


<<:  Cryptocurrency card freezing trend (5): No need to worry about card freezing? The right and wrong of the report of China Times

>>:  Losing both the wife and the army? Filecoin miners should avoid the minefield

Recommend

How to recognize these bad men by looking at the typical men's sinister faces

Everyone hopes that his destiny will be good and ...

Guide to participating in Ethereum 2.0 Pyrmont testnet staking

Source | someresat.medium.com Reminder: Do not fo...

BTC breaks through the $62,000 mark with a daily increase of 3.36%

On April 13, the BTC price rose in the short term...

How to identify the eight bad guys

How to identify the eight bad guys As the saying ...

Bibei.com launches stock trading, and subscription is open from now on

Recently, BitBays, a dual-currency Bitcoin exchan...

What does messy hand lines mean?

There are many lines on our hands, including the ...

One nostril is larger than the other, which indicates bad fortune.

Everyone has a nose on their face. Without it, we...

What does it mean if a baby has a mole on his ear? Is his fate good or bad?

Everyone has moles on their body, and different m...

Success Line Palmistry

Success line (Sun line): It starts from the wrist...

Eyebrow analysis shows who is most likely to have an extramarital affair

Eyebrow analysis shows who is most likely to have...