OpenLayer
  • Introduction
    • About OpenLayer
    • Our Mission
    • Our Approach
      • Foundations
        • OpenNodes
        • Restaking
        • Validation services
          • What is OVC
          • How is it done
          • Why is it better
        • Infrastructure
      • Modular Design
        • Modular data source
        • Modular source of security
        • Modular validation
        • Modular data transformation
        • Modular interoperability
      • Lifecycle of a Request
  • Data Validation Light Paper
  • OpenLayer AVS
    • Why Data Layer
    • How OpenLayer Works
    • Crypto Security
      • Websession proofs
      • Parser execution
    • End User Participation
    • On Demand Security
    • Multi Token Staking
    • Zero Bridging Solutions
  • For Node Operators
  • For Developers
    • Public Data Streams
    • VRF (Verifiable Randomness)
    • User Personal Data Proving
  • Privacy Policy
Powered by GitBook
On this page
  1. Introduction
  2. Our Approach
  3. Foundations
  4. Validation services

How is it done

The network to support OVC can be broken into the following parts.

  • Staking or Restaking assets to serve as security foundations. The mechanism and ability to slash malicious behaviors prevents them from happening in the first place

  • Executors that can run on any type of device. There’s little to none hardware requirements, download the executable on the device (could be a browser extension on laptop, mobile app, or a containerized image) and the device automatically becomes compute power resource in the network

  • Execution with light cryptographic commitments. For each type of task, aside from executing the computation, the executor also generates a lightweight cryptographic commitment so this can be verified by anyone later. This ranges from hashes, encrypted or signed messages to results from lightweight MPC.

  • Result aggregation and quorum/outlier discovery. Each task will be executed by multiple executors so that quorum or outlier could be easily discovered. This automatically exposes suspicious executors to more scrutiny. In addition, even results in quorum are still up for question any time.

  • Cryptographic fraud proof. Finally for any suspicious executor’s result, or simply any result, anyone should be able to look at the reported result and the corresponding commitments, and generate a cryptographic proof that malicious behavior has happened, slash and earn their staked assets.

PreviousWhat is OVCNextWhy is it better

Last updated 9 months ago