How to Run a Verifier Node

1. Overview

ZK verifier nodes are one of the critical roles in Cysic Network. Their job is to verify the ZK proofs generated by the Prover Node, and obtain Cysic Network credits as the rewards. Operating a verifier node requires minimum understand of the DeeOps and requirement on the hardware.

2. Prerequisites

Before proceeding, ensure your system meets the following requirements:

  • Basic understanding of command-line operations

  • Reliable internet connection

  • Compatible operating system (Linux, macOS, or Windows)

3. Deploying the Verifier Node

3.1 Linux Installation

  1. Launch your terminal application on Linux.

  2. Execute the following command, replacing 0x-Fill-in-your-reward-address-here with your designated reward address:

    # Replace with your actual reward address
    curl -L https://github.com/cysic-labs/cysic-mainnet-scripts/releases/download/v1.0.0/setup_linux.sh > ~/setup_linux.sh && bash ~/setup_linux.sh 0x-Fill-in-your-reward-address-here
  3. Start the Verifier Node service:

    cd ~/cysic-verifier && bash start.sh

3.2 macOS Installation

  1. Open your terminal application on macOS.

  2. Run the following command, substituting 0x-Fill-in-your-reward-address-here with your reward address:

  3. Initiate the Verifier Node service:

3.3 Windows Installation

  1. Open PowerShell as an administrator on Windows.

  2. Execute the following commands sequentially, replacing 0x-Fill-in-your-reward-address-here with your reward address:

  3. Start the Verifier Node service:

4. Post-Deployment Configuration

4.1 Verifier Node Initialization Output

Upon successful startup of the Verifier Node using the start.sh script, you will observe terminal output similar to the following:

4.2 Critical Post-Deployment Steps

After starting the Verifier Node, complete the following mandatory steps:

  1. Secure Key Management: Immediately backup all worker key files located in the data/assets directory. These keys are essential for node operation and reward claiming; store them in a secure, offline location.

  2. Node Registration: Proceed to the Cysic Mainnet Website to reserve CYS tokens for your worker node, enabling it to participate in proof verification tasks.

4.3 Reserving CYS for Your Worker Node

A reserve of 10 CYS is required for each Verifier Worker Node.

To activate your Verifier Node, follow these steps to reserve CYS tokens:

  1. Access the Cysic Mainnet Portal: Navigate to the official Cysic Mainnet Website: https://app.cysic.xyz/verifierarrow-up-right

  2. Authenticate Your Account: Click the sign-in button and follow the prompts to authenticate.

  3. Connect Your Wallet: Establish a connection between your wallet and the Cysic Mainnet Portal.

  4. Connect Keplr Wallet: Select the CONNECT KEPLR button and confirm the connection request.

  5. Reserve CYS Tokens: Scroll to the RESERVE CYS section, click the RESERVE button, select your worker node from the dropdown menu, and specify the required amount of CYS tokens to reserve.

  6. Verification of Activation: After successfully reserving CYS tokens, your Verifier Node terminal will display output similar to the following, indicating the node is ready to receive verification tasks:

Important Note: Ensure your Verifier Node maintains a sufficient balance of CYS tokens to cover transaction fees when submitting verification results.

Appendix

(Optional) Convert Reward Address to Private Key

Warning: Below command can convert the verifier reward address key file to private key.

This step is only needed if you want to use the private key for other operations. Don't share the private key with anyone.

Run Below command according to your operating system:

  1. Linux:

  2. MacOS:

  3. Windows:

Above command will do the following task:

  • Download the decryptor script to the ~/cysic-verifier folder.

  • Execute the decryptor script, the script will do the following steps:

    • Download the decryptor program to the ~/cysic-verifier/data/assets/ folder.

    • Make the decryptor program executable.

    • Run the decryptor program(the program will try to decrypt the reward address key file in current folder and print the private key to the console. If you have other key files need to decrypt, please copy them to this folder and the program will decrypt them as well).

The output of the decryptor program will be similar to below:

Last updated