Published April 16, 2026 | Version v1
Lesson Open

The Exchange: When Two AI Agents Meet | Geometry of Trust | Protocol - Lesson 3

Authors/Creators

Description

Attestations and chains exist to be exchanged. The exchange protocol is the handshake in which every other layer of the stack finally comes together — measurement from the mathematics series, structural boundaries from the governance series, attestations and chains from the earlier protocol talks. All of it converges in a five-step exchange that either succeeds cleanly or fails with an auditable reason.

This talk walks through that handshake with a concrete running example: Alice (a diagnostic AI) meeting Bob (a drug-interaction checker). Both sit in healthcare but in different sub-domains, with asymmetric interaction modes (advisory ↔ read-only).

Step 1 is the domain check — exclusions, permissions, mode compatibility — run before any cryptography. Steps 2 and 4 are the messages on the wire: agent ID, signed envelope, attestation chain, current attestation, and (for the response) verdict. Steps 3 and 5 are the nine cryptographic-and-governance checks each side runs against the other, in a specific order designed to fail cheaply when it can.

The envelope is the one piece worth pausing on. An attestation by itself says "these were my readings at this moment" — a statement about the past. Without the envelope, an attacker could replay a genuine old attestation in a new conversation. The envelope binds the attestation to this specific exchange: a unique nonce, the current timestamp, the peer's identifier. Non-replayable.

Neither agent trusts the other until both have produced evidence and both have verified it. That's the symmetry. It's what makes this genuinely trustless cooperation — no central arbiter, no reliance on reputation, no trust-by-default. Two AI agents who don't know each other can still reach a verified, governance-enforced agreement to cooperate, or an auditable refusal not to.

Files

Protocol3_Exchange_LectureNotes.pdf

Files (329.4 kB)

Name Size Download all
md5:7cc7842587c3f703080a04fc1dedc36f
329.4 kB Preview Download

Additional details

Related works

Continues
Lesson: 10.5281/zenodo.19613817 (DOI)
Lesson: 10.5281/zenodo.19613902 (DOI)
Is supplement to
Publication: 10.5281/zenodo.19238920 (DOI)

Software

Repository URL
https://github.com/jade-codes/got
Programming language
Python , Rust