-
-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Change aggregatePublicKeys and aggregateSignatures benchmarks #72
Comments
The aggregation is divided into two steps, first per committee and then a final aggregation. Maybe we could benchmark 32, 128 and 256. More than that the benchmarks would start to take a long time. Also, the point of the benchmarks is to compare the implementations between themselves, it's not imperative to benchmark Eth2.0 behavior |
Doesn't final aggregation use 32k validators (right now)? If an implementation leaks memory, or is buggy on big amounts, then it would be shown in those. The lib is going to be used in lodestar, isn't it? Then, it's necessary to test those cases - and benchmarking them is a good test.
Not quite. Aggregating 2**17 signatures takes 4 seconds with noble. If you do it 2-4 times, seems acceptable to me. |
I'm not concerned about aggregating the signatures but creating them hahaha With noble signing 2**17 would take 3.64 hours so doing the benchmark 2-4 times you are exceeding the maximum job time of Github actions |
Currently, signature aggregation only happens at the committee level. There's also batch signature verification, an optional implementation speedup (implemented here as |
For creating the test vectors, those should be previously created, that's the most certain way. So, if committee size may be 2048, I think size=2048 should be tested. And 128 should be default. |
How is aggregating 30 keys useful?
eth2 would be around 32k validators very soon, and probably 320k after some time. And each slot is voted by around 1k voters
I think it would make sense to benchmark 32, 1024, 32768 and 131072 public keys / signatures.
The text was updated successfully, but these errors were encountered: