01 The trusted configuration phase was successfully completed At the end of last year, we successfully completed the first phase of the trusted configuration process, which was called "Powers of Tau". In July of this year, we completed the second phase of the trusted configuration - generating security parameters for the 6 logic circuits that will be used by the mainnet. Now, both phases of our trusted configuration can use the final parameters of the Filecoin mainnet! Thank you to everyone who participated! 02 Review of Phase 1 As a quick recap, the trusted configuration session is split into two phases. The first phase, also known as the “Powers of Tau” session, applies to all computations provable by Groth16 zk-SNARKs and the largest possible computations. The computations proven by a SNARK are represented by models called logic circuits. The basic unit of computation within a circuit is called a constraint. The number of constraints represents the size of the computation. In our session, we generate parameters for any Groth 16 circuit with no more than 130 million constraints. Over two months, contributors from around the world participated in generating secure and verifiable parameters for Filecoin proofs. Once again, we would like to express our sincere gratitude to everyone who participated and helped make the first phase of trusted configuration a success! 03 Review of Phase 2 In mid-June, we began the second phase of the trusted configuration process, which mainly generated security parameters for the 6 logic circuits that will be used for mainnet. Similar to the first phase, the output of the second phase is credible as long as one of the parties on the chain is honest. Similarly, participants from all over the world participated in generating secure and verifiable parameters for Filecoin's proofs. For the participants in the second phase, thank you for your support for a critical part of Filecoin's approach to mainnet. 04 Is the output in the link reliable? For both phases, the output is credible if the transcribed parts are verifiable, and we can trust that at least one participant did not leak the randomness of their contribution. Therefore, for both phases, we tried to gather a variety of different types of participants - contributors from within the Filecoin ecosystem, competing miners, and teams and individuals outside the Web3 community. In the process, we aimed to reduce the risk of collusion and increase the probability that at least one contributor to each logic circuit is trustworthy, thereby ensuring the parameter integrity of the output. To verify that the parameters of our mainnet logic circuit are the same as the participant’s output, you can follow the instructions here . 05 Next Steps For mainnet, no additional action is required - the proof portion of Filecoin is ready to use! However, the Filecoin team is already considering future upgrades to our proofs to improve the performance and usability of the protocol. When the upgrade occurs, we will begin the second iteration of the trusted configuration to generate security parameters for the new logic circuit. If you would like to be added to the list of participants, please fill out this form and join the #fil-trustedsetup channel on our Slack channel to follow the latest developments. |
<<: ETC suffered three 51% attacks in August. Is computing power a flaw?
>>: Mysterious Bitcoin mining pattern may have been cracked after seven years
Sometimes, when you encounter some problems that ...
As one of the traditional physiognomy techniques, ...
Personality characteristics of women with narrow ...
The fate of a man with false broken palms Wisdom ...
We always have great curiosity about our destiny ...
The mouth is something people use every day and i...
Eyebrows are the most important of the five facia...
As of 2015, the number of merchants accepting Bit...
A deep philtrum indicates a good family backgroun...
Moles are part of our body, because we all have m...
Palmistry to see your personality and abilities 1...
People with forked marriage lines often do not ha...
The Chinese Valentine's Day is undoubtedly th...
He had outperformed the market for 15 consecutive...
Which women's marriages will not last long? F...