Developers

/

August 21, 2024

Portkey zkLogin Groth16 Trusted Setup — Contributor Guide

Blog Image

Prerequisite

1. nodejs, if you don't have it, you can run the following command to install it

brew install node

2. npm package@portkey/ceremony, please install it using the following command

npm install -g @portkey/ceremony

3. A github account

Steps

1. Create a working directory

mkdir -p zklogin-testnet-trusted-setup

cd zklogin-testnet-trusted-setup

2. Login with Github Account

Execute the following command to start logging in with Github

npx @portkey/ceremony auth

After triggering the login process, go to Chrome browser. Select the Github account you want to use and enter the code you get from the terminal (which is already copied to your clipboard, so you just need ctrl + v).

Then click the Authorize button

After successfully logging in with Github, you will see a screen like below. And now you can start contributing to the trusted setup ceremony.

3. Run npx @portkey/ceremony contribute in your terminal

Select the ceremony you want to contribute to

Select the entropy generation mode

If you are the next in the queue, the contribution will start immediately. Grab a cup of coffee and come back in about 20 ~ 30 mins and your contribution will be done.

Video Guide

Please refer to the video guide here.

Notes:

  1. You may skip the period from 12 minutes to 36 minutes where I was waiting for the verification of the contribution to finish.
  2. There are two circuits for which we have to run the contribution.
  3. The verification for the first circuit may take up to 20 minutes (it’s actually doing verification but not being unresponsive, please don’t hit ctrl+c).
  4. Please do not turn off your machine while the contribution is ongoing.
  5. Make sure your network connection is good.

Join us in this pivotal step towards building a more secure and private future with Portkey zkLogin. We look forward to your participation!

If you encounter any issues or have questions, please reach out to us on our dedicated Discord channel or Telegram group:

Author Image
Portkey
WalletWhy It Stands OutSupported Assets
Coinbase- Publicly-listed on the Nasdaq stock exchange- Holds your assets in a 1:1 ratio and does not repurpose them200+ cryptocurrencies, including BTC, ETH, XRP, and SOL
OKX- Supports 300+ cryptocurrencies and NFTs across multiple networks- Available as a mobile or desktop app, and browser extensionBTC, ETH, XRP, SOL, and 300+ more cryptocurrencies, along with NFTs on Ethereum, Solana, BASE, and more
Crypto.com App- Rewarding if you hold and build a cryptocurrency portfolio over time- Nifty features like Crypto Earn and Recurring Buy help you grow your holding easilyMore than 350 cryptocurrencies, including BTC, ETH, XRP, and SOL
Trust Wallet- Very wide range of assets- Available as a mobile app and browser extensionOver 10 million cryptocurrencies and 600 million NFTs from Bitcoin, Ethereum, Solana, Cosmos, and more
MetaMask- Can be used to complement your main Web3 wallet- Perfect for ownership of Ethereum-based tokens and NFTsAny asset on the Ethereum blockchain
Exodus- Over 100,000 cryptocurrencies supported- Buy any of them within the Exodus walletMore than 100,000 cryptocurrencies and NFTs across 16 blockchains
Ledger Stax- 5,500+ cryptocurrencies and NFTs supported- Certified Secure Element chip to shield it from online attacks5,500+ cryptocurrencies and NFTs
Trezor Safe 5- A compact device at 23g with a 1.54-inch touchscreen- Supports over 1,000 cryptocurrencies, and has a CC EAL6+-certified chipOver 1,000 cryptocurrencies, including BTC, ETH, XRP, and SOL
SafePal S1 Pro- Slim and sleek, with a 1.3-inch colour screen to show your holdings- Can be paired with the SafePal Wallet app and browser extension to grow your portfolio30,000 cryptocurrencies and more across 100+ blockchains
ZKPsMultisig WalletsTEE
StrengthsZKPs provide wallet owners with security and privacy at one goMultisig wallets are hassle-free and secure; easy to implement for any group or organisationTEEs allow Web3 wallets to achieve a similar level of security as hardware wallets
WeaknessesTransacting parties need to interact multiple times. It’s not ideal for non-real-time applications.Transaction costs are higher due to the multiple signatures – and gas fees – needed. Transaction speeds are lower too.Cannot be easily implemented for software-based Web3 wallets as it is operating system-dependent
Wallet TypeHardware WalletBrowser ExtensionMobile App Wallet
Pros- Offers the best security for Web3 digital assets- Many brands and models to choose from- You can conveniently add it to your web browser- It doesn’t take up much storage space on your PC- You can access your assets from anywhere- You can easily transfer assets between apps
Cons- You risk losing your assets when you lose the device- The cost can be prohibitive for some- Susceptible to security breaches if your browser is compromised- Functionality may be limited for some- Vulnerable to similar security breaches as browser extension wallets- You also bear the same risk of losing your assets if you lose your mobile device
Web2 PhishingWeb3 Phishing
MethodPurely reliant on offline or Web2 platforms. For example, phone calls, SMSes, publishing fake websites, etc.Utilises a mix of Web2 and Web3 platforms. For example, hackers impersonating a key opinion leader or deploying malicious smart contracts.
PurposeTo steal cash, personal information, and sensitive data.To steal digital assets and sensitive data, and control Web3 projects.