LogoLogo
  • Overview
    • SEDA Overview
      • SEDA Primer for Key Features
        • SEDA’s Intent-Centric Framework
        • Modular Design Benefits
        • Programmable Tooling and Permissionless Development
        • Fast Settlement & Horizontally Scalable
        • Fork-less Upgrades
      • RWAs, Price Feeds, AI and More
        • Custom Data Feeds
      • SEDA Token Primer
        • Network Utilization
        • Network Participation & Chain Security
        • Network Governance
      • Introducing SEDA's Flagship Product - The IVM
        • 🌉Intro to Interop 3.0 & Emerging Verification Markets
        • Programmable Modules
        • Triggering A Verification Data Request With An IVM
        • SEDA IVM Security
        • An IVM Summary
    • SEDA Network Architecture
      • Walking Through SEDA’s Architectural Features
      • The PoS SEDA Chain
      • Oracle Programs
      • The Overlay Network
      • Decentralized Solver Network
      • SEDA’s Prover Contract
  • For Developers
    • 📈Data Requests
      • ❓What is a Data Request?
      • 🔃Data Request Life Cycle
    • 💾Building an Oracle Program
      • Price Feed Example
        • 👋Getting Started: Price Feed
        • 🧪Testing Your Oracle Program
        • 🚀Deploying Your Oracle Program
      • 🌐Fetching Open Data
      • 🔐Advanced: API-key Gated Data
    • ⚡Access Data from Any Network
      • 🔎Access from EVM Networks
        • 🔧Using SEDA in a Contract
        • 🚀Contract Deployment
      • 🔜Access from other Networks
      • 🔜Advanced: Run your own Solver
    • 🏗️Deployments
    • 👽Interoperability Verification Module (IVM)
      • 🛸Interop Verification Module for Message-Based Bridge Protocols
      • Powering Intents and Chain Abstraction with SEDA
  • For Users
    • ⭐Getting Started
      • 🏦Wallet Overview
      • ⏬Installing Cosmos Hub on Ledger
      • ⛓️Adding SEDA Chain to Keplr
      • 🌌Delegating your SEDA
        • 📨Selecting a Validator
        • 📡Delegating to a Validator
    • 👐Tools and Dashboards
      • 🌐SEDA Explorers and Dashboards
      • 🔭Third-party Explorers
      • 📶Public RPCs + APIs
    • 🔵SEDA Token Info
      • 📈Token Charts and Tracking
      • 📊Exchanges
      • 〰️SEDA Distribution Schedule
  • For Data Providers
    • Data Proxy
      • ℹ️Introduction to Data Proxy
      • 💻System Requirements
      • 🔢Operating and Running a Data Proxy
      • 🔐Advanced: API-key Gated Data
  • For Node Operators
    • 📶SEDA Chain Guide and Requirements
      • 🎬Installation and System Requirements
      • 👟Operating and Running a Node
      • 🔗Linking to an External Node
      • 🏗️Validator Onboarding
      • 🔑SEDA Keys
      • 📸Joining Testnet Using Snapshot
      • 🤝Joining Testnet Using State Sync
  • Resources
    • 🛡️Audits
      • Trail of Bits Audit Report Repo Link - March 2024
      • Sherlock Audit of SEDA Network Full Feature Launch - April 2025
  • Legal
    • Privacy Policy
    • Terms
Powered by GitBook
On this page
  1. Overview
  2. SEDA Overview
  3. Introducing SEDA's Flagship Product - The IVM

Triggering A Verification Data Request With An IVM

PreviousProgrammable ModulesNextSEDA IVM Security

Last updated 2 months ago

The state verification powering interop protocol message passing is managed by a custom of off-chain software typically referred to in most interop designs as a Relayer. This software is responsible for passing a message between the origin and target network. The most common security setup for Relayers is either a single signer key from a centralized entity, or a multi-sig with private keys managed directly by protocol entity team members or by a collection of entities. The verification process in a multi-sig is coupled with the relaying of a message between chains. SEDA IVMs, however, are triggered parallel to the relayer reading and transporting the message between networks.

When an IVM is triggered, a data request with an ID matching the protocol requesting verification, is sent to the SEDA Network. The data request is sent to the SEDA Network via a single Solver from within a decentralized network of Solvers. Once on the SEDA Chain, the request is forwarded to an Overlay Node Network, where a secret committee of Overlay Nodes are randomly selected.

This committee then queries the RPC endpoints via pre-selected data providers (as per the protocol's IVM instructions). Overlay Nodes follow a commit-reveal scheme to return/deliver their results to a DR Tally. The DR Tally follows an IVM's instructions to filter, clean, and aggregate data. The final aggregated results are sent to the SEDA Main Chain, where the data is batched.

The Solver then relays the data, encrypted with cryptographic proofs and signed by main chain validators, to the Prover Contract on the destination chain. Lastly, the verification proof is made available from the Prover Contract to a bridge contract to trigger the desired event on the destination chain.