Filecoin trusted configuration phase completed successfully

Filecoin trusted configuration phase completed successfully

Professionalism and focus, win-win cooperation


Disclaimer: Perfectly translating technical concepts from one language to another is difficult, so please be aware that we cannot guarantee the accuracy of this translation.



Original link:

https://filecoin.io/zh-cn/blog/trusted-setup-complete/


At the end of last year, we successfully completed the first phase of the trusted configuration process, namely "Powers of Tau".


In July this year, we completed the second phase of trusted configuration - generating security parameters for the six logic circuits that will be used by the main network.


Now, both stages of our trusted configuration can use the final parameters for Filecoin mainnet!


Thanks to everyone who participated!



Review of Phase 1


To briefly review, the trusted configuration process is divided into two stages.


The first phase, also known as the “Powers of Tau” phase, applies to all computations provable by Groth16 zk-SNARKs and the largest amount of computation.


The computations proved by SNARKs are represented by models called logic circuits. The basic unit of computation within a circuit is called a constraint. The number of constraints represents the size of the computation. In our session, we generate parameters for any Groth 16 circuit with no more than 130 million constraints.


Over two months, contributors from around the world participated in generating secure and verifiable parameters for Filecoin proofs. Once again, we would like to express our sincere gratitude to everyone who participated and helped make the first phase of trusted configuration a success!




Review of Phase 2


In mid-June, we started the second phase of the trusted configuration process.


This phase mainly generates security parameters for the 6 logic circuits that will be used in the main network.


Similar to the first phase, the output of the second phase is credible as long as one of the parties on the chain is honest.


Likewise, participants from around the world participated in generating secure and verifiable parameters for Filecoin’s proofs. For Phase 2 participants, thank you for supporting this critical part of Filecoin’s journey to mainnet.




Are these outputs reliable?


For both phases, the output is credible if the transcribed parts are verifiable, and we can trust that at least one participant did not leak the randomness of their contribution.


Therefore, for both phases, we tried to bring together a variety of different types of participants - contributors from within the Filecoin ecosystem, competing miners, and teams and individuals outside the Web3 community.


In doing so, we aim to reduce the risk of collusion and increase the probability that at least one contributor to each logic circuit is trustworthy, thus guaranteeing the parametric integrity of the output.


To verify that the parameters of our mainnet logic circuit are the same as the participant’s output, you can follow the instructions here.



Next Steps


For mainnet, no additional action is required - the proof portion of Filecoin is ready to use!


However, the Filecoin team is already considering future upgrades to our proofs to improve the performance and usability of the protocol. When the upgrade occurs, we will begin the second iteration of the trusted configuration to generate security parameters for the new logic circuit.


If you would like to be added to the list of participants, please fill out the corresponding form and join the #fil-trustedsetup channel on our Slack channel to follow the latest developments.






<<:  [100 Questions and Answers about Filecoin in Pictures] Question 31: What does a winning ticket in Filecoin mean?

>>:  Comment on the impact of the central bank's digital currency ecosystem issuance on traditional financial institutions

Recommend

Zcash is so popular, but the hashrate is doing this

Last week, Bitcoin became popular again due to it...

Is the fate of a woman with a bulbous nose good? She has a good character.

The bulbous nose is particularly common among Ori...

Cryptocurrency "eats" renewable energy, triggering a mining boom in Japan

Bianews reported on April 21 that according to Ni...

What does a mole on a man’s ear bone mean?

It is very familiar to people, but different mole...

Your physical features show your fortune

Your physical features show your fortune Love of ...

Which couples are prone to emotional alienation?

The emotions of a couple after marriage are not w...

What can eyebrows tell about personality and destiny?

The fate of some women can actually be seen direc...

Bitcoin rises to highest level in year

On December 1, Bitcoin rose 2.87% to $38,834, its...

Fingerprints reveal a person's personality

Fingerprints reveal a person's personality 1 ...

The face of a woman who loves money and face

If some women love money and face, then what char...

The most rare palm lines and fortune telling diagram

In addition to the three main lines of palmistry ...