Conversation

Replying to
1/ Proto-danksharding (EIP-4844) introduces the blob data type, which will enable a large number of data availability resources for rollup After weighing efficiency and cost, EIP-4844 introduces KZG commitment as its cryptographic scheme to ...
1
11
...support data availability sampling better. The security assumptions of the KZG commitment rely on a trusted setup which is why we need this ceremony.
1
8
2/ A trusted setup ceremony generates "data" upon which every run of the cryptographic protocol will rely. "Trust" comes from the fact that each participant uses a secret to generate data, and as long as one participant does not disclose the secret, the output is secureπŸ”
1
6
3/ Like crypto signature scheme, we can never derive the private key from the public key. This is a 1/N trust model.According to , such setups can be considered "close enough to trustless" in practice
Image
2
7
4/ Different from previous ceremonies, KZG has its own unique advantages: πŸ‘‰ Only need to run the usual Phase 1 - Powers of Taw. πŸ‘‰ Since KZG promises no zero-knowledge components, the calculation amount and size are tiny.
1
7
πŸ‘‰ Since the requirements of 4844 and Danksharding are relatively simple, it only needs to realize the size of 2^12 - 2^15, and the download and upload data are only a few megabytes These leads to shorter computation times, lower cost of participation, and more participants.
1
7
6/ In the stage of general contribution, the design of randomness is very interesting it comes from the mixture of these three: πŸ‘‰Your mouse movement (record the coordinates of your mouse movement on the page) πŸ‘‰ The characters you input πŸ‘‰ Browser natively generates randomness
Image
Image
1
10
7/ The process is as follows: 1. Receive the SRS output from the previous participant from the Sequencer 2. Input your random value and run the calculation 3. Return your output to Sequencer 4. Sequencer receives, verifies, and passes to the next participant
1
7
8/ The Sequencer has very few rights and will not own any private data. All calculations will be done locally by the user. Sequencer repeatedly executes receiving, verifying (update check, power, check), coordinating, and sending message to the next participant.
1
7
10/ After the general contribution, we will also have a special contribution stage. At this stage, we will see: πŸ‘‰ Different implementations πŸ‘‰ Creative Entropy Source. For example: Geiger readings of radioactive material Environmental data (the weather, seismic, sun)…
1
8
From the perspectives of the number of participants, participants' experience, and the entropy source contributions, I believe this ceremony will become the largest and most secure ceremony Thanks , , Geoff, Nico and everyone who contributed to it! πŸŽ‰
2
11