Validation and Authentication

An essential necessity and one of the key components of the frameworkโ€™s functionality is the capability to authenticate and validate the accuracy of computational processes executed within a network, as well as to establish methods for verifying reputable users/components, rewarding positive contributors, and penalizing malicious ones.

The verification and validation of each general computational process within a decentralized network can solely be accomplished in a decentralized manner. This implies that SAGA, as a whole, will not endeavor to offer assurances regarding the correctness of every process and computational workflow conducted within the network. Instead, the framework will furnish APIs, tools, network-wide telemetry data, and reputation systems, empowering each network constituent (network operations agent) to assess the validity and accuracy of specific results produced by the computational processes in question. Leveraging network-wide telemetry information accessible to all network constituents, SAGA will facilitate self-learning and remediation capabilities, effectively mitigating the impact of malicious actors on overall network performance and the outcomes of individual computational processes.

The key elements ensuring the reliability of the SAGA network and the accuracy of its individual computational processes include:

  • The tokenomic mechanism, reinforced by implicit and explicit reputation systems, alongside technical validation and verification means, will deliver immediate and transparent economic incentives for positive (i.e., mutually beneficial) conduct of network participants.

  • The adaptation of the non-repudiation/proof of receipt mechanism, wherein new tokens will be generated and distributed to platform users upon the successful completion of a transaction, based on the actual computing power utilized in said transaction โ€“ a pivotal element of SAGA's tokenomics.

Additionally, SAGA will optimize the utilization of formal third-party validation tools, such as those provided by SingularityNET, TrueBit, zkSNARKs, or other open-source protocols or commercial entities. While formal validation methods are an evolving research domain and are not universally applicable for verifying computations, SAGA will predominantly rely on tokenomic and reputation-driven mechanisms, integrating formal validation approaches for specific scenarios where suitable. Looking ahead, SAGA aims to offer an API for seamless integration of third-party formal verification tools for broader usage.

Last updated