Locally Verified Protocols
Via Verification Through Counterparties
The last iteration are locally verified protocols in which counterparties verify each other. As such, only the parties that are involved in a given cross-domain interaction verify the transaction.Adopting such a system simplifies a complex problem (n-party verification) into a simpler solution (2-party interactions in which each party verifies only the counterparty).As long as both involved parties are economically adversarial, the system works.
However, if there’s an incentive for both parties to collude, funds can be stolen from the broader chain.