👽Interoperability Verification Module (IVM)
IVMs are a plug-and-play solution for interop protocols, increasing security, providing horizontal scaling, and enhanced decentralization.
Last updated
IVMs are a plug-and-play solution for interop protocols, increasing security, providing horizontal scaling, and enhanced decentralization.
Last updated
The SEDA IVM is a powerful framework built on top of the SEDA Network and designed to lead the emerging verification market by addressing default verification challenges through programmability, horizontal scalability, and a distributed network architecture consisting of layer one chain security inherited from the SEDA Main Chain. The SEDA IVM was designed around three core pillars that form the foundation of the IVMs powerful framework:
Security
Unlike customizable verification stacks, SEDA provides a single security zone encompassing all chains with a permissionless SEDA Prover contract. Applications, protocols, and networks can join this unified security zone through a simple IVM deployment.
The SEDA IVM framework seamlessly integrates into interoperability protocols as part of their security stack.
Scalability SEDA's architecture combines a Proof-of-Stake main chain secured by over 100 validators with a distributed Overlay Network of thousands of nodes. This design prevents downtime through workload distribution. If nodes on the main chain or Overlay Network go offline, the distributed nature of SEDA’s model ensures other nodes can step in.
Programmability
Unlike traditional multi-sigs, where protocols can only use limited signers (1/1 or 2/3), SEDA IVMs allow protocols to customize their verification committee size from the Overlay Network. Decentralization in SEDA is a sliding range that can be adjusted to include more nodes in a committee leading to increased decentralization for verification.
The SEDA IVM is designed to a light-weight integration with horizontal scaling as a default. Integrating the SEDA to your network requires one simple SEDA Prover deployment. Integrating the SEDA IVM into your existing interoperability stack is straight-forward and fast. Learn more about the benefits of SEDA at a glance below:
Learn more about how SEDA can be leveraged to create permissionless verification below.
🛸Interop Verification Module for Message-Based Bridge ProtocolsPowering Intents and Chain Abstraction with SEDA