The KZG Ceremony is making amazing progress.
Due to rigorous auditing, concise UI/UX, rich entropy source contributions, and diverse implementations, this will become the most attended and secure ceremony.
Let's dive into this KZG ceremony π―οΈ
ceremony.ethereum.org
Conversation
Replying to
1/
Proto-danksharding (EIP-4844) introduces the blob data type, which will enable a large number of data availability resources for rollup
After weighing efficiency and cost, EIP-4844 introduces KZG commitment as its cryptographic scheme to ...
1
2
11
...support data availability sampling better.
The security assumptions of the KZG commitment rely on a trusted setup which is why we need this ceremony.
1
1
8
2/
A trusted setup ceremony generates "data" upon which every run of the cryptographic protocol will rely.
"Trust" comes from the fact that each participant uses a secret to generate data, and as long as one participant does not disclose the secret, the output is secureπ
1
1
6
3/
Like crypto signature scheme, we can never derive the private key from the public key.
This is a 1/N trust model.According to , such setups can be considered "close enough to trustless" in practice
2
1
7
4/
Different from previous ceremonies, KZG has its own unique advantages:
π Only need to run the usual Phase 1 - Powers of Taw.
π Since KZG promises no zero-knowledge components, the calculation amount and size are tiny.
1
1
7
π Since the requirements of 4844 and Danksharding are relatively simple, it only needs to realize the size of 2^12 - 2^15, and the download and upload data are only a few megabytes
These leads to shorter computation times, lower cost of participation, and more participants.
1
1
7
5/
After we have gone through development, audit, and testing, we come to the first stage of the ceremony: General contribution.
Timeline from
1
1
7
6/
In the stage of general contribution, the design of randomness is very interesting
it comes from the mixture of these three:
πYour mouse movement (record the coordinates of your mouse movement on the page)
π The characters you input
π Browser natively generates randomness
1
1
10
Usually, it only takes one lazy or honest person to secure the entire ceremony LMAO
1
7
7/
The process is as follows:
1. Receive the SRS output from the previous participant from the Sequencer
2. Input your random value and run the calculation
3. Return your output to Sequencer
4. Sequencer receives, verifies, and passes to the next participant
1
1
7
8/
The Sequencer has very few rights and will not own any private data. All calculations will be done locally by the user.
Sequencer repeatedly executes receiving, verifying (update check, power, check), coordinating, and sending message to the next participant.
1
1
7
Participants don't have to trust any output from Sequencer.
All participants can verify by themselves. Here are some tools:
π github.com/jsign/go-kzg-c
π github.com/zkparty/truste
1
1
8
10/
After the general contribution, we will also have a special contribution stage.
At this stage, we will see:
π Different implementations
π Creative Entropy Source.
For example:
Geiger readings of radioactive material
Environmental data (the weather, seismic, sun)β¦
1
8
ESP announced the KZG Ceremony Grants Round to support both types of projects.
Contributions are welcome!
1
9
From the perspectives of the number of participants, participants' experience, and the entropy source contributions, I believe this ceremony will become the largest and most secure ceremony
Thanks , , Geoff, Nico and everyone who contributed to it! π
2
1
11
