Integrity-Aware Multi-Agent Negotiation
by Nick Clark | Published March 27, 2026
When two or more agents must reach a joint decision, integrity envelopes are not merged by averaging or by majority vote. They are negotiated through a structured exchange in which each participant declares an envelope, each declaration carries a tier and an evidence record, conflicts are resolved by tier first and evidence second, and the resulting composition is required to be cycle-free. The negotiation produces a single operative envelope that every participating agent is bound to, together with a lineage record sufficient for any external auditor to reconstruct the path from individual envelopes to collective commitment.
Mechanism
Negotiation begins with envelope declaration. Each participating agent emits a structured artifact containing the envelope it is willing to occupy for the joint task, the tier under which the envelope is declared (from a finite ordered set such as constitutional, contractual, operational, advisory), and the evidence record that grounds the declaration — typically references to upstream policy, prior commitments, sensor observations, or attestations from third parties. The artifact is signed by the agent and entered into a shared negotiation log.
The negotiation engine then performs structural composition. It computes the geometric intersection of the declared envelopes along each shared dimension. If the intersection is non-empty, the joint envelope is the intersection, annotated with a cycle-free composition path that records which agent's declaration contributed which constraint. Negotiation terminates with a bound joint envelope and a lineage record.
If the intersection is empty along some dimension, conflict resolution is invoked. Resolution proceeds by tier: the highest-tier declaration prevails on that dimension, and lower-tier declarations are recorded in the lineage as superseded. If two conflicting declarations share a tier, evidence weight is consulted — the declaration with the more authoritative, more recent, and more directly relevant evidence record prevails. If tier and evidence are both equal, the negotiation halts with an explicit unresolved-conflict outcome rather than falling back to averaging or coin-flip; halting is treated as a first-class result that escalates the conflict to a higher governance layer.
The cycle-free requirement is enforced structurally. The composition path is represented as a directed acyclic graph in which nodes are envelope declarations and edges are derivation relationships. Any candidate composition that would introduce a cycle — for example, an envelope whose tier is justified by evidence that itself depends on a lower-tier envelope from the same negotiation — is rejected before it can become binding. This rules out the mutual-justification loops that have plagued earlier consensus protocols and that produce envelopes nobody actually authorized.
Operating Parameters
Tier ordering is policy-governed and explicit. A deployment defines its tier set in the policy reference; tiers are totally ordered, and the ordering is immutable for the duration of a negotiation. Typical orderings place constitutional or charter-level commitments above contractual obligations, contractual above operational defaults, and operational above advisory inputs. Tier promotions and demotions across negotiations are themselves auditable events.
Evidence weighting follows a configurable scheme that scores authority (who attested), recency (when), specificity (how directly the evidence bears on the dimension under negotiation), and corroboration (whether independent sources concur). The scheme is declared in policy, not chosen at runtime, which prevents agents from gerrymandering the evidence rule to favor their own declarations.
Negotiation is bounded in time and in rounds. A round budget caps how many envelope-revision exchanges may occur before halting; a wall-clock budget caps real-time duration. Exhausting either budget without convergence is treated identically to an unresolved tier-and-evidence tie: the negotiation halts, the partial composition is logged, and the matter escalates. There is no implicit fallback to a "best-effort" envelope.
Each agent's confidence state, by way of the integrity-confidence coupling, gates its declarable envelope during negotiation. An agent operating under low confidence cannot declare a wide envelope simply to gain bargaining position; the operative-envelope contraction described in the coupling primitive applies before declaration is admitted to the negotiation log.
Alternative Embodiments
In a synchronous embodiment, all participating agents are present and emit declarations within a single round window; the engine intersects, resolves, and binds in one cycle. This embodiment fits real-time coordination scenarios such as multi-vehicle intersection negotiation or coordinated trading desks where latency dominates.
In an asynchronous embodiment, declarations arrive over an extended window and the joint envelope is recomputed incrementally as each new declaration enters the log. The cycle-free requirement still holds across the full history. This embodiment fits long-running governance processes where agents may be offline, may consult human principals, or may need to assemble evidence over hours or days.
In a hierarchical embodiment, negotiation is nested: sub-coalitions negotiate joint envelopes among themselves, and those joint envelopes then enter a higher-level negotiation as single declarations carrying the coalition's tier and combined evidence record. This embodiment scales the protocol to large agent populations without requiring every agent to participate in every round.
In a delegated embodiment, an agent appoints a proxy whose declarations bind the principal subject to a delegation envelope — a meta-envelope that bounds what the proxy may declare on the principal's behalf. The delegation envelope is itself negotiated and lineage-tracked, which prevents proxy creep and gives principals a structural mechanism for revoking authority.
In a counterparty-mistrust embodiment, agents may participate without revealing the full content of their evidence records; instead they emit cryptographic commitments and reveal only the dimensions and weights necessary to resolve a conflict. The cycle-free check operates on commitment graphs rather than full content, preserving auditability without forcing disclosure.
Halting Semantics and Escalation
The negotiation engine treats halting as a first-class outcome rather than a failure to be papered over. When tier and evidence are exhausted without resolution, or when the round or wall-clock budget expires, the partial composition is sealed and an escalation artifact is emitted. The artifact contains the unresolved dimensions, the conflicting declarations, the evidence records on each side, and a pointer to the negotiation log. It is delivered to a configured escalation authority — a higher-tier agent, a human governance officer, or an external arbitration service — whose decision is then admitted as a new declaration at a tier above any participant's, and a final composition round is run.
This explicit halting semantics is what prevents the silent compromise mode in which a negotiation appears to succeed but actually represents the lowest-common-denominator envelope that nobody fully authorized. By forcing escalation rather than averaging, the protocol keeps human and higher-authority oversight in the loop on exactly the cases that need it, and it produces an audit record showing why the joint envelope is what it is.
Composition With Other Primitives
Negotiation composes upstream with the integrity-confidence coupling, which determines what envelope each agent is permitted to declare in the first place. It composes laterally with the forecasting engine: agents may emit forecast-conditioned declarations ("if condition X obtains, my envelope contracts to Y"), which the negotiation engine treats as a parametric declaration evaluated against a shared forecast oracle.
Downstream, the bound joint envelope is consumed by each participant's local execution authority. An agent that subsequently acts outside the joint envelope produces a structural violation event — not merely a policy alarm — because the joint envelope is referenced in the agent's lineage as a binding commitment with a known derivation. This makes post-hoc accountability unambiguous: the auditor can point to the exact declaration, tier, and evidence that the violating action contradicts.
Worked Example of a Negotiation Round
Consider three agents — a planning agent A, a sensing agent B, and a compliance agent C — converging on a joint envelope for an action with non-trivial third-party impact. Agent A declares an envelope wide along the action-magnitude dimension and narrow along the irreversibility dimension, at the operational tier, with evidence drawn from its current task assignment. Agent B declares a narrower magnitude envelope at the same tier, with evidence drawn from sensor readings indicating a degraded environment. Agent C declares a magnitude envelope tighter than either, at the contractual tier, with evidence drawn from a regulatory schedule.
The negotiation engine intersects the three envelopes along the magnitude dimension; the intersection is C's narrower envelope. Tier resolution applies because C's contractual tier dominates the operational tier of A and B; C's declaration prevails. Along the irreversibility dimension, A and B agree and C is silent, so the intersection is the agreed bound. The cycle-free check examines whether C's evidence references either A's or B's prior declarations, finds no such reference, and admits the composition. The bound joint envelope is written to the negotiation log together with the derivation graph, and each agent's local execution authority is updated. If, instead, C had been silent on irreversibility but A's evidence referenced a prior C declaration that had since been superseded, the cycle check would reject that path and force A to either resubmit with current evidence or accept the lower-tier composition without the contested constraint.
Prior-Art Distinction
Multi-agent consensus protocols are a deep field, ranging from Byzantine fault tolerance to argumentation frameworks to LLM-based debate. Three features distinguish the present mechanism. First, what is negotiated is an integrity envelope — a multi-dimensional bound on permissible action — rather than a single proposition or value, so the negotiation outcome shapes future behavior structurally rather than recording a one-shot vote. Second, conflict resolution is tier-then-evidence rather than majority-or-stake, which aligns the protocol with governance reality (charters dominate contracts, contracts dominate ops) instead of with token-weighted polling. Third, the cycle-free composition requirement is enforced at the structural level, not as a soft heuristic, which rules out the mutual-justification loops common to argumentation-based consensus.
Lineage and Replay
The negotiation log is append-only and signed per entry. Every declaration, every conflict resolution, every cycle-check rejection, and the final binding composition are recorded with timestamps, signing keys, and policy version pointers. An auditor possessing the log and the policy reference can replay the negotiation deterministically and verify that the bound joint envelope is the one the rules required given the declarations made. Replay is exact, not approximate, because the resolution rules are deterministic functions of declarations, tiers, and evidence weights. Discrepancies between replay output and recorded outcome are first-class compliance events. This replay property is what licenses regulators and internal compliance organizations to certify the negotiation engine once and rely on log inspection thereafter, rather than re-certifying every deployed instance.
Disclosure Scope
The disclosure covers the declaration artifact, the tier-and-evidence resolution rule, the cycle-free composition requirement, the synchronous, asynchronous, hierarchical, delegated, and counterparty-mistrust embodiments, the bounded-rounds halting semantics, and the lineage records that bind individual declarations to the joint envelope. It covers composition with confidence coupling, forecasting, and downstream execution authority. It does not claim multi-agent communication protocols as such, nor envelope declaration as such; it claims the structural negotiation procedure and the composition guarantees that follow from it.