Interoperability Verification Module (IVM)
IVMs are a plug-and-play solution for interop protocols, increasing security, providing horizontal scaling, and enhanced decentralization.
Last updated
IVMs are a plug-and-play solution for interop protocols, increasing security, providing horizontal scaling, and enhanced decentralization.
Last updated
The SEDA IVM is a powerful framework built on top of the SEDA Network and designed to lead the emerging verification market by addressing default verification challenges through programmability, horizontal scalability, and a distributed network architecture consisting of layer one chain security inherited from the SEDA Main Chain. The SEDA IVM was designed around three core pillars that form the foundation of the IVMs powerful framework:
Security
Unlike customizable verification stacks, SEDA provides a single security zone encompassing all chains with a permissionless SEDA Prover contract. Applications, protocols, and networks can join this unified security zone through a simple IVM deployment.
The SEDA IVM framework seamlessly integrates into interoperability protocols as part of their security stack.
Scalability SEDA's architecture combines a Proof-of-Stake main chain secured by over 100 validators with a distributed Overlay Network of thousands of nodes. This design prevents downtime through workload distribution. If nodes on the main chain or Overlay Network go offline, the distributed nature of SEDAโs model ensures other nodes can step in.
Programmability
Unlike traditional multi-sigs, where protocols can only use limited signers (1/1 or 2/3), SEDA IVMs allow protocols to customize their verification committee size from the Overlay Network. Decentralization in SEDA is a sliding range that can be adjusted to include more nodes in a committee leading to increased decentralization for verification.
The SEDA IVM is designed to a light-weight integration with horizontal scaling as a default. Integrating the SEDA to your network requires one simple SEDA Prover deployment. Integrating the SEDA IVM into your existing interoperability stack is straight-forward and fast. Learn more about the benefits of SEDA at a glance below:
Learn more about how SEDA can be leveraged to create permissionless verification below.
Disclaimer
This document and its content is for informational purposes only and does not constitute a legal document, offer, contract, agreement, or guarantee of any kind. Nothing contained herein should be considered as legal, tax, investment, financial, or other advice. Any references to integration times, performance metrics, or other technical capabilities are illustrative estimates and do not represent guarantees of performance, results, or financial returns. Actual outcomes may vary depending on specific use cases, technical features, and implementation factors. SEDA and its affiliates make no representations, warranties (express or implied), or promises regarding future performance, revenue, success, or any form of commitment or result. In particular, this document does not constitute a binding offer, pre-contractual agreement, or any other form of promise. The information provided in this document is subject to change and should not be relied upon as final or binding.