Giter Club home page Giter Club logo

powersoftau's Introduction

Powers of Tau

This is a multi-party computation (MPC) ceremony which constructs partial zk-SNARK parameters for all circuits up to a depth of 221. It works by taking a step that is performed by all zk-SNARK MPCs and performing it in just one single ceremony. This makes individual zk-SNARK MPCs much cheaper and allows them to scale to practically unbounded numbers of participants.

This protocol is described in a forthcoming paper. It produces parameters for an adaptation of Jens Groth's 2016 pairing-based proving system using the BLS12-381 elliptic curve construction. The security proof relies on a randomness beacon being applied at the end of the ceremony.

This is MPC phase 1. In MPC phase 2 we will generate the left parameters.

Instructions

Contact [email protected] to schedule a time to participate. You'll need the latest (stable) Rust compiler to participate using this code. If you've been asked to participate and it's your turn, you were sent a challenge file.

1.Download and install IM tool keybase. if you don't have an account, create it first. you can use tool to send file back to tron foundation. The TronFoundation's keybase account is tron_brown. If you have questions about this ceremony, contact with us via keybase directly.

2.if you are running on macOS, Linux, or another Unix-like OS, download Rustup and install Rust, run the following in your terminal, then follow the on-screen instructions.

curl https://sh.rustup.rs -sSf | sh

If you are running on windows, refer to rust homepage for installation.

3.Get the source code of project sapling-mpc:

git clone https://github.com/tronprotocol/powersoftau

if git not installed, please refer to git first.

4.Put file challenge in the powersoftau directory and use your Rust toolchain to execute the computation:

cargo run --release --bin compute

You may be asked to input some random text in this process, and it could take an hour or so. Memory usage is about 2.5 ~ 3 GB. When it's finished, it will place a response file in the current directory. That's what you send back with keybase. It will also print a hash of the response file it produced. You need to write this hash down (or post it publicly) so that you and others can confirm that your contribution exists in the final transcript of the ceremony.

5.You are expected to send response file back to us via keybase. We will verify this file and generate the new_challenge file that can be used by next participant,and then will upload this file to aliyun cloud and publish response_hash on github wiki.

Recommendations

Participants of the ceremony sample some randomness, perform a computation, and then destroy the randomness. Only one participant needs to do this successfully to ensure the final parameters are secure. In order to see that this randomness is truly destroyed, participants may take various kinds of precautions:

  • putting the machine in a Faraday cage
  • destroying the machine afterwards
  • running the software on secure hardware
  • not connecting the hardware to any networks
  • using multiple machines and randomly picking the result of one of them to use
  • using different code than what we have provided
  • using a secure operating system
  • using an operating system that nobody would expect you to use (Rust can compile to Mac OS X and Windows)
  • using an unusual Rust toolchain or alternate rust compiler
  • lots of other ideas we can't think of

It is totally up to the participants. In general, participants should beware of side-channel attacks and assume that remnants of the randomness will be in RAM after the computation has finished.

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

powersoftau's People

Contributors

ebfull avatar 317787106 avatar garethtdavies avatar petertodd avatar

Watchers

James Cloos avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.