Carter Feldman贡献了可信设置的第80轮响应,提供了challenge文件、response文件和新的challenge文件的哈希值,以及生成response的日志和验证日志。他使用了AWS z1d.6xlarge机器,并提供了commit hash、challenge b2sum、response b2sum、熵源等详细信息。
用于验证的 challenge
文件的哈希值:
d9ec6fad 4a7a7e33 58a0c4be d7171622
c9c60a91 a12a3814 4af908f4 2c147aec
7b459a95 f901a65b 00fe485c 66d28564
07721e79 6908eb48 8f1d1ddd d0afa2e8
response
基于以下哈希:
d9ec6fad 4a7a7e33 58a0c4be d7171622
c9c60a91 a12a3814 4af908f4 2c147aec
7b459a95 f901a65b 00fe485c 66d28564
07721e79 6908eb48 8f1d1ddd d0afa2e8
用于验证的 response
文件的哈希值:
28af03a3 e4000bff 5f7e6b73 1b4bf942
50421f07 8da87056 89f38072 02d06386
07279308 5a2a6d07 484c6af5 e64c1326
681d66ef 59fcfef0 183cfbd9 8d04edb1
new_challenge
文件的 Blake2b 哈希值:
4bf672f3 ba1de1bb 6105e1ab 88359612
cdf09cb2 d154f371 937f85ec 0cf25e0a
10ec88ef a3019065 850a2e96 048bf9ef
5f68aa75 fcfe26fa a120c465 d3954174
上面的 new_challenge
文件:link
2023 年 8 月 15 日 机器 AWS z1d.6xlarge 日志:
$ mkdir pt
$ git clone https://github.com/kobigurk/phase2-bn254.git --branch master && cd phase2-bn254/powersoftau && cargo build --release
$ git log -n 1
commit dd6b96657d16c1a2b81fd23e540581c356284ec6 (HEAD -> master, origin/master, origin/HEAD)
Author: Kobi Gurkan <kobigurk@gmail.com>
Date: Sat May 9 20:44:01 2020 +0300
NCC-CSWZ001-003: return false on same_ratio failure instead of panicking
$ mkdir ~/qed-powersoftau
$ cp ./target/release/compute_constrained ~/qed-powersoftau
$ cd ~/qed-powersoftau
$ wget https://pse-trusted-setup-ppot.s3.eu-central-1.amazonaws.com/challenge_0080
$ mv challenge_0080 challenge
$ b2sum challenge
d9ec6fad4a7a7e3358a0c4bed7171622c9c60a91a12a38144af908f42c147aec7b459a95f901a65b00fe485c66d2856407721e796908eb488f1d1dddd0afa2e8 challenge
$ screen
$ tee -a chal.log | ./compute_constrained challenge response 28 2097152 | tee -a chal.log
$ cat chal.log
Will contribute to accumulator for 2^28 powers of tau
In total will generate up to 536870911 powers
Type some random text and press [ENTER] to provide additional entropy...
<Random Keyboard Mashing + Ethereum Block Hash + cat /dev/urandom | head -c 1337 | base64 (on another machine)>
Calculating previous contribution hash...
`challenge` file contains decompressed points and has a hash:
d9ec6fad 4a7a7e33 58a0c4be d7171622
c9c60a91 a12a3814 4af908f4 2c147aec
7b459a95 f901a65b 00fe485c 66d28564
07721e79 6908eb48 8f1d1ddd d0afa2e8
`challenge` file claims (!!! Must not be blindly trusted) that it was based on the original contribution with a hash:
4faa7e9e c92c5fcd a9a347e6 4666a64b
51c4cae7 c3df9c5e 1fd8af15 7fc2093e
d96c9079 625d5c43 06f0da07 73318856
a4c1a70d 8daac9db 62fad1fa 32e3675e
Computing and writing your contribution, this could take a while...
Finishing writing your contribution to response file...
Done!
Your contribution has been written to response file
The BLAKE2b hash of response file is:
28af03a3 e4000bff 5f7e6b73 1b4bf942
50421f07 8da87056 89f38072 02d06386
07279308 5a2a6d07 484c6af5 e64c1326
681d66ef 59fcfef0 183cfbd9 8d04edb1
Thank you for your participation, much appreciated! :)
b2sum response_0080
28af03a3e4000bff5f7e6b731b4bf94250421f078da8705689f3807202d06386072793085a2a6d07484c6af5e64c1326681d66ef59fcfef0183cfbd98d04edb1 response_0080
Will verify and decompress a contribution to accumulator for 2^28 powers of tau
Calculating previous challenge hash...
Hash of the `challenge` file for verification:
d9ec6fad 4a7a7e33 58a0c4be d7171622
c9c60a91 a12a3814 4af908f4 2c147aec
7b459a95 f901a65b 00fe485c 66d28564
07721e79 6908eb48 8f1d1ddd d0afa2e8
`response` was based on the hash:
d9ec6fad 4a7a7e33 58a0c4be d7171622
c9c60a91 a12a3814 4af908f4 2c147aec
7b459a95 f901a65b 00fe485c 66d28564
07721e79 6908eb48 8f1d1ddd d0afa2e8
Hash of the response file for verification:
28af03a3 e4000bff 5f7e6b73 1b4bf942
50421f07 8da87056 89f38072 02d06386
07279308 5a2a6d07 484c6af5 e64c1326
681d66ef 59fcfef0 183cfbd9 8d04edb1
Verifying a contribution to contain proper powers and correspond to the public key...
Verification succeeded!
Verification succeeded! Writing to new challenge file...
Here's the BLAKE2b hash of the decompressed participant's response as new_challenge file:
4bf672f3 ba1de1bb 6105e1ab 88359612
cdf09cb2 d154f371 937f85ec 0cf25e0a
10ec88ef a3019065 850a2e96 048bf9ef
5f68aa75 fcfe26fa a120c465 d3954174
Done! new challenge file contains the new challenge file. The other files
were left alone.
b2sum challenge_0081
4bf672f3ba1de1bb6105e1ab88359612cdf09cb2d154f371937f85ec0cf25e0a10ec88efa3019065850a2e96048bf9ef5f68aa75fcfe26faa120c465d3954174 challenge_0081
日期:2023 年 8 月 15 日。
姓名:Cater Feldman。
别名:@cf, 在 Twitter 上的 @cmpeq
Keybase:carterfeldman
设备:AWS z1d.6xlarge (Ubuntu 22.04.3 LTS)
地点:香港
phase2-bn256 Commit Hash:dd6b96657d16c1a2b81fd23e540581c356284ec6
Challenge b2sum:d9ec6fad4a7a7e3358a0c4bed7171622c9c60a91a12a38144af908f42c147aec7b459a95f901a65b00fe485c66d2856407721e796908eb488f1d1dddd0afa2e8
Response b2sum:28af03a3e4000bff5f7e6b731b4bf94250421f078da8705689f3807202d06386072793085a2a6d07484c6af5e64c1326681d66ef59fcfef0183cfbd98d04edb1
熵源:随机键盘乱按 + Ethereum 区块哈希 + cat /dev/urandom | head -c 1337 | base64 (在另一台机器上)
耗时:大约 6 小时。
侧信道防御:无
后处理:擦除驱动器,然后用包含多个 Big Buck Bunny 变体的 tar 包填充驱动器,然后再擦除驱动器。
- 原文链接: github.com/privacy-scali...
- 登链社区 AI 助手,为大家转译优秀英文文章,如有翻译不通的地方,还请包涵~
如果觉得我的文章对您有用,请随意打赏。你的支持将鼓励我继续创作!