Conversation
Notices
-
> In each participant’s turn, they use a tool to sample some randomness and perform a computation. The result of each computation is then added to a public transcript, so that the entire protocol can be publicly verified. As long as one participant successfully destroys their randomness when they’re finished, the resulting parameters are secure. As more and more participants are added, it becomes unlikely that an adversary could have compromised everyone. This is especially true as participants have enormous flexibility in the counter-measures they employ.
https://z.cash.foundation/blog/powers-of-tau/
#powersoftau !cryptocurrency