Carter Feldman的贡献

Carter Feldman贡献了可信设置的第80轮响应,提供了challenge文件、response文件和新的challenge文件的哈希值,以及生成response的日志和验证日志。他使用了AWS z1d.6xlarge机器,并提供了commit hash、challenge b2sum、response b2sum、熵源等详细信息。

Carter Feldman 的贡献:

用于验证的 challenge 文件的哈希值:

        d9ec6fad 4a7a7e33 58a0c4be d7171622
        c9c60a91 a12a3814 4af908f4 2c147aec
        7b459a95 f901a65b 00fe485c 66d28564
        07721e79 6908eb48 8f1d1ddd d0afa2e8

response 基于以下哈希:

        d9ec6fad 4a7a7e33 58a0c4be d7171622
        c9c60a91 a12a3814 4af908f4 2c147aec
        7b459a95 f901a65b 00fe485c 66d28564
        07721e79 6908eb48 8f1d1ddd d0afa2e8

用于验证的 response 文件的哈希值:

    28af03a3 e4000bff 5f7e6b73 1b4bf942 
    50421f07 8da87056 89f38072 02d06386 
    07279308 5a2a6d07 484c6af5 e64c1326 
    681d66ef 59fcfef0 183cfbd9 8d04edb1 

new_challenge 文件的 Blake2b 哈希值:

    4bf672f3 ba1de1bb 6105e1ab 88359612
    cdf09cb2 d154f371 937f85ec 0cf25e0a
    10ec88ef a3019065 850a2e96 048bf9ef
    5f68aa75 fcfe26fa a120c465 d3954174 

上面的 new_challenge 文件:link


response 0080 的日志

2023 年 8 月 15 日 机器 AWS z1d.6xlarge 日志:

$ mkdir pt
$ git clone https://github.com/kobigurk/phase2-bn254.git --branch master && cd phase2-bn254/powersoftau && cargo build --release
$ git log -n 1
commit dd6b96657d16c1a2b81fd23e540581c356284ec6 (HEAD -> master, origin/master, origin/HEAD)
Author: Kobi Gurkan <kobigurk@gmail.com>
Date:   Sat May 9 20:44:01 2020 +0300

    NCC-CSWZ001-003: return false on same_ratio failure instead of panicking
$ mkdir ~/qed-powersoftau
$ cp ./target/release/compute_constrained ~/qed-powersoftau
$ cd ~/qed-powersoftau
$ wget https://pse-trusted-setup-ppot.s3.eu-central-1.amazonaws.com/challenge_0080
$ mv challenge_0080 challenge
$ b2sum challenge
d9ec6fad4a7a7e3358a0c4bed7171622c9c60a91a12a38144af908f42c147aec7b459a95f901a65b00fe485c66d2856407721e796908eb488f1d1dddd0afa2e8  challenge
$ screen
$ tee -a chal.log | ./compute_constrained challenge response 28 2097152 | tee -a chal.log
$ cat chal.log
Will contribute to accumulator for 2^28 powers of tau
In total will generate up to 536870911 powers
Type some random text and press [ENTER] to provide additional entropy...
<Random Keyboard Mashing + Ethereum Block Hash + cat /dev/urandom | head -c 1337 | base64 (on another machine)>
Calculating previous contribution hash...
`challenge` file contains decompressed points and has a hash:
    d9ec6fad 4a7a7e33 58a0c4be d7171622 
    c9c60a91 a12a3814 4af908f4 2c147aec 
    7b459a95 f901a65b 00fe485c 66d28564 
    07721e79 6908eb48 8f1d1ddd d0afa2e8 
`challenge` file claims (!!! Must not be blindly trusted) that it was based on the original contribution with a hash:
    4faa7e9e c92c5fcd a9a347e6 4666a64b 
    51c4cae7 c3df9c5e 1fd8af15 7fc2093e 
    d96c9079 625d5c43 06f0da07 73318856 
    a4c1a70d 8daac9db 62fad1fa 32e3675e 
Computing and writing your contribution, this could take a while...
Finishing writing your contribution to response file...
Done!

Your contribution has been written to response file

The BLAKE2b hash of response file is:
    28af03a3 e4000bff 5f7e6b73 1b4bf942 
    50421f07 8da87056 89f38072 02d06386 
    07279308 5a2a6d07 484c6af5 e64c1326 
    681d66ef 59fcfef0 183cfbd9 8d04edb1 
Thank you for your participation, much appreciated! :)

b2sum response_0080
28af03a3e4000bff5f7e6b731b4bf94250421f078da8705689f3807202d06386072793085a2a6d07484c6af5e64c1326681d66ef59fcfef0183cfbd98d04edb1  response_0080

验证日志:

Will verify and decompress a contribution to accumulator for 2^28 powers of tau
Calculating previous challenge hash...
Hash of the `challenge` file for verification:
        d9ec6fad 4a7a7e33 58a0c4be d7171622
        c9c60a91 a12a3814 4af908f4 2c147aec
        7b459a95 f901a65b 00fe485c 66d28564
        07721e79 6908eb48 8f1d1ddd d0afa2e8
`response` was based on the hash:
        d9ec6fad 4a7a7e33 58a0c4be d7171622
        c9c60a91 a12a3814 4af908f4 2c147aec
        7b459a95 f901a65b 00fe485c 66d28564
        07721e79 6908eb48 8f1d1ddd d0afa2e8
Hash of the response file for verification:
        28af03a3 e4000bff 5f7e6b73 1b4bf942
        50421f07 8da87056 89f38072 02d06386
        07279308 5a2a6d07 484c6af5 e64c1326
        681d66ef 59fcfef0 183cfbd9 8d04edb1
Verifying a contribution to contain proper powers and correspond to the public key...
Verification succeeded!
Verification succeeded! Writing to new challenge file...
Here's the BLAKE2b hash of the decompressed participant's response as new_challenge file:
        4bf672f3 ba1de1bb 6105e1ab 88359612
        cdf09cb2 d154f371 937f85ec 0cf25e0a
        10ec88ef a3019065 850a2e96 048bf9ef
        5f68aa75 fcfe26fa a120c465 d3954174
Done! new challenge file contains the new challenge file. The other files
were left alone.

b2sum challenge_0081
4bf672f3ba1de1bb6105e1ab88359612cdf09cb2d154f371937f85ec0cf25e0a10ec88efa3019065850a2e96048bf9ef5f68aa75fcfe26faa120c465d3954174  challenge_0081

response 0080 的证明

日期:2023 年 8 月 15 日。

姓名:Cater Feldman。

别名:@cf, 在 Twitter 上的 @cmpeq

Keybase:carterfeldman

设备:AWS z1d.6xlarge (Ubuntu 22.04.3 LTS)

地点:香港

phase2-bn256 Commit Hash:dd6b96657d16c1a2b81fd23e540581c356284ec6

Challenge b2sum:d9ec6fad4a7a7e3358a0c4bed7171622c9c60a91a12a38144af908f42c147aec7b459a95f901a65b00fe485c66d2856407721e796908eb488f1d1dddd0afa2e8

Response b2sum:28af03a3e4000bff5f7e6b731b4bf94250421f078da8705689f3807202d06386072793085a2a6d07484c6af5e64c1326681d66ef59fcfef0183cfbd98d04edb1

熵源:随机键盘乱按 + Ethereum 区块哈希 + cat /dev/urandom | head -c 1337 | base64 (在另一台机器上)

耗时:大约 6 小时。

侧信道防御:无

后处理:擦除驱动器,然后用包含多个 Big Buck Bunny 变体的 tar 包填充驱动器,然后再擦除驱动器。

  • 原文链接: github.com/privacy-scali...
  • 登链社区 AI 助手,为大家转译优秀英文文章,如有翻译不通的地方,还请包涵~
点赞 0
收藏 0
分享
本文参与登链社区写作激励计划 ,好文好收益,欢迎正在阅读的你也加入。

0 条评论

请先 登录 后评论
privacy-scaling-explorations
privacy-scaling-explorations
江湖只有他的大名,没有他的介绍。