The primary role of the oracle is to ensure that the provider carries through on their commitments.
The oracle consists of two parts:
The oracle automates the verification of provider commitments and queries the L1 data source for transaction hashes and block extra data. It then cross-references these with commitments logged in the commitments contract, and then verifies adherence using the oracle contract. If a commitment is satisfied, the oracle contract triggers a reward to the provider using the bidder contract; if not, it slashes the provider by interacting with the provider contract.
Before the oracle can be engaged according to the protocol’s intended sequence of events, several preliminary actions must be taken:
1a. Simultaneously, the bidder issues an encrypted bid via the mev-commit peer-to-peer network.
After the bidder’s actions, the provider proceeds to:
2a. Retrieve the encrypted bid from the mev-commit network.
2b. Issue an encrypted commitment for the transaction mentioned in the bid.
When a bid for a transaction (txnj) is circulated through the mev-commit p2p network, and the provider has made an encrypted commitment and then opened it after the L1 block was created, the oracle is activated to verify whether the provider has honored this commitment.
The process is as follows:
In the event that a provider fails to include a committed transaction (txnj) in the L1 block, the oracle slashing path is initiated to penalize the provider for the breach of commitment. This process is outlined below:
The primary role of the oracle is to ensure that the provider carries through on their commitments.
The oracle consists of two parts:
The oracle automates the verification of provider commitments and queries the L1 data source for transaction hashes and block extra data. It then cross-references these with commitments logged in the commitments contract, and then verifies adherence using the oracle contract. If a commitment is satisfied, the oracle contract triggers a reward to the provider using the bidder contract; if not, it slashes the provider by interacting with the provider contract.
Before the oracle can be engaged according to the protocol’s intended sequence of events, several preliminary actions must be taken:
1a. Simultaneously, the bidder issues an encrypted bid via the mev-commit peer-to-peer network.
After the bidder’s actions, the provider proceeds to:
2a. Retrieve the encrypted bid from the mev-commit network.
2b. Issue an encrypted commitment for the transaction mentioned in the bid.
When a bid for a transaction (txnj) is circulated through the mev-commit p2p network, and the provider has made an encrypted commitment and then opened it after the L1 block was created, the oracle is activated to verify whether the provider has honored this commitment.
The process is as follows:
In the event that a provider fails to include a committed transaction (txnj) in the L1 block, the oracle slashing path is initiated to penalize the provider for the breach of commitment. This process is outlined below: