LogoLogo
Developer Docs
Developer Docs
  • Platform Architecture
    • 💠Introduction
  • 💻Application Layer
    • 🙋‍♀️Alith - AI Agent Framework
    • 🏦DeFAI: AI-Driven DeFi
    • 🛒DAT Marketplace
    • 🚀Agent Launchpad
  • 🛡️Trust & Execution Layer
    • Consensus Protocol
    • Settlement Layer
    • Execution Layer
    • Data Availability Layer
  • 🖇️Exetention Layer
  • Data Anchoring Token (DAT)
    • 🧠Introduction
    • 🔍DAT Specification
    • 💎Value Semantics
    • 📁DAT Lifecycle Example
  • Quorum-based BFT Consensus
    • 💎Introduction
    • 🛠️iDAO-Quorum Interaction
    • 📝Quorum-Based BFT Protocol
    • 🫵Slashing & Challenger System
    • 🌀Quorum Rotation & Benefit
  • Verified Computing Framework
    • 🔷Overview
  • 🏗️Verified Computing Architecture
  • Contract & Execution Flow
  • LAZAI Workflow & Runtime
    • 🧩E2E Process
    • ⚙️POV Data Structure
    • 🔵AI Execution Mechanism
  • What's More?
    • 🔐Data Protection
  • 🛣️Roadmap
  • 🆎Glossary
  • ⁉️FAQs
Powered by GitBook
On this page
  • Security Delegation via Stake-Based Quorum Integration
  • POV/Model/Agent Updates are Transmitted via VSC to Quorum for Consensus
  • Proof Submission $ Asynchronous Validation via VSC
  • Challenger Arbitration and Slashing Procedure
Export as PDF
  1. Quorum-based BFT Consensus

iDAO-Quorum Interaction

VSC (Verifiable Service Coordinator)-Based iDAO-Quorum Interaction Protocol

PreviousIntroductionNextQuorum-Based BFT Protocol

Last updated 7 days ago

Security Delegation via Stake-Based Quorum Integration

Each Quorum node participating in LazChain’s consensus mechanism is required to stake native tokens as a guarantee of honest behavior. Through this staking model and potential external collaborations (e.g., restaking, cross-chain validation, or inter-protocol delegation), iDAOs indirectly inherit the economic security of LazChain.

By leveraging Quorum nodes that are economically aligned through stake commitments on LazChain, iDAOs benefit from shared security guarantees without replicating full consensus overhead.

POV/Model/Agent Updates are Transmitted via VSC to Quorum for Consensus

Whenever an iDAO performs updates, whether submitting new POV Inlet data, publishing a model, or deploying an AI Agent, these changes are packaged as service transactions and routed to the relevant Quorum via the VSC protocol. Each Quorum, operating under a Byzantine Fault Tolerant (BFT) consensus, independently validates and reaches agreement on the transaction outcome before anchoring them to LazChain.

The VSC layer ensures that any AI-related state change proposed by iDAOs (e.g., new models, retraining outputs, or agent updates) is routed to the appropriate Quorum and finalized through localized BFT consensus before being registered on-chain.

Proof Submission $ Asynchronous Validation via VSC

After consensus on the high-level update, VSC asynchronously dispatches verification artifacts—such as ZK proofs, Optimistic Proofs, or TEE attestations—to the relevant Quorum nodes. These proofs serve as cryptographic evidence that the update was generated under valid computational assumptions and that the iDAO’s declared actions were faithfully executed.

VSC acts as the communication bridge between iDAO and Quorum validators, coordinating the off-chain-to-on-chain delivery of verifiable computation proofs to be asynchronously validated and logged.

Challenger Arbitration and Slashing Procedure

Within each Quorum, a rotating set of Challenger nodes is elected to perform near real-time audits. These nodes continuously pull iDAO-submitted data and associated proofs from LazChain. If a Challenger detects inconsistency - such as an inference proof not matching the declared model weights - it can trigger a slashing dispute.

This initiates the following:

  • Immediate freeze of the suspicious iDAO update.

  • Verification of the challenger’s claim through multi-round consensus.

  • If valid, slashing of:

    • Staked tokens by the responsible Quorum node (if it facilitated an invalid consensus).

    • DAT assets or usage credits associated with the offending iDAO.

Challengers serve as protocol-native auditors, empowered to initiate a punitive slashing process whenever verifiable misconduct or falsified AI computations are detected. This creates a high-integrity, economically-incentivized deterrent mechanism.

🛠️