
At the end of last year, Filecoin officially successfully completed the first phase of the trusted configuration link, which is "Powers of Tau". In July this year, Filecoin officially completed the second phase of trusted configuration - generating security parameters for the six logic circuits that will be used by the main network. Both phases of trusted configuration are now ready to use the final parameters of the Filecoin mainnet!
Review the first stage
To briefly recap, the trusted provisioning phase is divided into two phases. The first stage, also known as the "Powers of Tau" link, applies to all computations provable by Groth16 zk-SNARKs and the maximum amount of computation. Computations proved by SNARKs are represented by models called logic circuits. The basic unit of computation within a circuit is called a constraint. The number of constraints represents the size of the computation. In the setting part, the official generates parameters for any Groth 16 circuit with no more than 130 million constraints.
Over two months, contributors from around the world participated in generating secure verifiable parameters for Filecoin proofs. Once again, a heartfelt thank you to everyone who participated and helped make Phase 1 of Trusted Provisioning a success!
Review the second phase
In mid-June, the official started the second phase of the trusted configuration link - this phase mainly generates security parameters for the six logic circuits that will be used in the main network. Similar to the first stage, the output of the second stage is credible as long as one of the parties in the chain is honest. Likewise, participants from around the world are involved in generating secure verifiable parameters for Filecoin's proofs.
Are these outputs from the stage links credible?
future outlook
future outlook
For the Filecoin mainnet, nothing else is required - the intrinsic proof-of-consensus part is ready to use! However, the Filecoin team is already considering future upgrades to our proofs to improve the performance and usability of the protocol. When the upgrade is in progress, we will begin the second phase iteration of trusted configuration to generate security parameters for the new logic circuits.