Term
1
51% Attack
2
Abnormal Return
3
Absolute Advantage
4
Account
5
Address
6
Adoption Curve
7
Aeternity Blockchain
8
Air Gap
9
Airdrop
10
Airnode
11
Algorithmic Stablecoin
12
All-Time-High
13
All-Time-Low
14
Allocation
15
Altcoin
16
Ampification Attack
17
Annual Percentage Rate
18
Annual Percentage Yield
19
Anonymous
20
Anti-Fragile
21
Anti-Money Laundering Directive
22
Apeing
23
API3
24
Application
25
Application Layer
26
Application Programming Interface
27
Arbiter
28
Arbitrage
29
Asset
30
Asset-Backed Tokens
31
Asynchronous
32
Atomic Swap
33
AtomicDEX
34
Attack
35
Attack Surface
36
Attacker
37
Authentication
38
Autonomous Economic Agent
39
Bag
40
Banking as a Service
41
Basket
42
Batch
43
Bear
44
Bear Market
45
BEP-2
46
BEP-95
47
BEP-721
48
Bitcoin
49
Block
50
Block Header
51
Blockchain
52
Blockchain as a service
53
Blockchain Explorer
54
Blockchain Subnetwork
55
Bridge
56
Byzantine fault tolerance
57
CAP-Theorem
58
Capital Asset Pricing Model
59
Central Bank Digital Currency
60
Cluster
61
Coin
62
Command Line Interface
63
Commit-Chain
64
Compliance
65
Confidential Transaction
66
Consensus
67
Consensus engine
68
Consensus Mechanism
69
Consensus Model
70
Crash fault tolerance
71
Credential Service Provider
72
Cryptocurrency
73
Cryptographic Games
74
Cryptographic Key
75
Decentralized API
76
Decentralized Application
77
Decentralized Autonomic Data
78
Decentralized Autonomous Jrganization
79
Decentralized Exchange
80
Decentralized Identity Management
81
Decentralized system
82
Delegated proof of stake
83
Device-To-Device
84
DGT Core
85
DGT Dashboard
86
DID Controller
87
DID Delegate
88
DID Document
89
DID Fragment
90
DID Method
91
DID Path
92
DID Query
93
DID Resolution
94
DID Scheme
95
DID Subject
96
DID URL
97
DID URL Dereferencing
98
Digital Asset
99
Digital Economy Coin
100
Digital Signature
101
Directed Acyclic Graph
102
Disassociability
103
Distributed database
104
Distributed ledger
105
Distributed Ledger Technology
106
Distribution System
107
DLT oracle
108
Dynamic Consensus
109
Edwards Curve Digital Signature Algorithm
110
Elliptic Curve Digital Signature Algorithm
111
Enterprise Ethereum Alliance
112
ERC-20
113
ERC-721
114
Ethereum Name Service
115
Ethereum Request for Comment
116
Fault Toleranse
117
Federated Byzantine Fault Tolerance
118
Fiat Currency
119
FLP Theorem
120
Fork
121
Fungible
122
GARANASKA
123
Genesis block
124
Glitching
125
Global State
126
GOSSIP Protocol
127
Governance
128
Hard fork
129
Hardware Security Module
130
Hash
131
Hash function
132
Hashed Timelock Contract
133
Hashing
134
Hierarchical Deterministic
135
Hybrid Network
136
Hybrid permission
137
Identifier
138
Immutable
139
Incentive mechanism
140
Indentity Provider
141
Information Technology Laboratory
142
Inter ledger interoperability
143
International Organization for Standardization
144
Intra ledger interoperability
145
JavaScript Object Notation
146
JSON Web Token
147
Lightning Memory-Mapped Database
148
Liveness
149
Long-Term Evolution
150
Marshalling
151
Matagami
152
Merkle Signature Scheme
153
Merkle Tree
154
Miners
155
Mint
156
Multi-Party Computation
157
Multi-Signature
158
National Institute of Standards and Technology
159
National Institute of Standards and Technology Internal Report
160
Near-Field Communication
161
Network Access Pont
162
Network Segment
163
Network topology
164
Node
165
Non-Custodial
166
Nonfungible
167
Nonfungible Token
168
Notary
169
Off-Chain
170
On-Chain
171
One-say, all-adopt
172
Open Shortest Path First
173
Oracle
174
Oracle Problem
175
Overloaded cryptography
176
Participant
177
Payload
178
Peer-to-peer
179
Permission
180
Permissioned
181
Permissioned distributed ledger system
182
Permissionless distributed ledger system
183
Permissions
184
Pivate Key
185
Post Quantum Cryptography
186
Practical Byzantine Fault Tolerance
187
Private Data Object
188
Private Dataset Attributes
189
Private distributed ledger system
190
Proof of Stake
191
Proof of Work
192
Proof-of-Stake
193
Proof-of-Work
194
Public distributed ledger system
195
Public Key
196
Public key Cryptography
197
Public Key Infrastructure
198
Public Transaction
199
Real World Assets
200
Relay
201
Resolver
202
Risk Level
203
Risk Model
204
Rollup
205
RSA
206
Safety
207
Secp256k1
208
Semi-structured data
209
Separation of Concerns
210
Sharding
211
Shielded Transaction
212
Shor's algorithm
213
Sidechain
214
Smart Contract
215
Smart contract
216
Soft fork
217
Stablecoin
218
Staking
219
State Channel
220
State Update
221
Stateful
222
Stateful contract
223
Stateful execution of contract
224
Stateless
225
Stateless contract
226
Stateless execution of contract
227
Subchain
228
Sybil Attack
229
Token
230
Token ecosystem
231
Token Factory Contract
232
Token Taxonomy Initiative
233
Tokenomics
234
Transaction
235
Transaction family
236
Transaction Fee
237
Transaction Processor
238
Trusted Execution Environment
239
Uniform Resource Identifier
240
Universally Unique Identifier
241
Unspent Transaction Output
242
Validator
243
Verifiable Credential
244
Verifiable Data Registry
245
Verification Method
246
Verification Relationship
247
Wallet
248
Web3
249
Web3 Foundation
250
Wireless Local Area Network
251
World Wide Web Consortium
252
Zero-Knowledge Proof
253
δ-Presence
Drag to adjust the number of frozen columns
ABBR
Definition
See Also
URLS
Source
If more than half the computer power or mining hash rate on a network is run by a single person or a single group of people, then a 51% attack is in operation.
Investopedia (51% Attack)
Abnormal return refers to the unusual profits from certain assets or securities over a specific time period. Cryptocurrency and other digital objects are used for speculative investments, therefore, they often encounter deviations in the yield curve, which allows making value assessments of the investment portfolio
Absolute advantage is a situation in which a company can produce the same product as other companies using fewer resources.
Investopedia (Absolute Advantage)
An entity in a blockchain that is identified with an address and can send transactions to the blockchain
NISTIR 8301
NISTIR8301
A short, alphanumeric string derived from a user’s public key using a hash function, with additional data to detect errors. Addresses are used to send and receive digital assets
NISTIR 8301
NISTIR8301
Adoption curve indicates the pace of adoption of a new technology by people. It may also involve segregation of the target audience to understand the market's willingness.
A blockchain network that works on a hybrid consensus approach; both Proof of Work and Proof of Stake.
If data cannot be accessed, then it cannot be infected or corrupted — this is the concept of an air gap.
A distribution of digital tokens to a list of blockchain addresses
ITU-T FG DLT D1.1 (Terms & Definitions)
NISTIR8301
Airnode is an oracle node and API blockchain gateway that is readily deployed by API providers who want to engage in the API3 blockchain protocol and put their data feeds on-chain.
Web3
API3
API3 (AIRNODE)
An algorithmic stablecoin actually uses an algorithm underneath, which can issue more coins when its price increases and buy them off the market when the price falls.
Stablecoin
Investopedia (Stablecoin)
ATH
The highest point (in price, in market capitalization) that a cryptocurrency has been in history
Cryptocurrency
ATL
The lowest point (in price, in market capitalization) that a cryptocurrency has been in history.
Allocation is the allotment of equity or tokens that may be earned, bought, or reserved for a specific team, group, investor, institution, or another similar entity.
As Bitcoin is the first cryptocurrency that captured the world’s imagination, all other coins were subsequently termed “altcoins,” as in “alternative coins.”
Token
Coin
A class of attack where the attacker attempts to exhaust a target system's CPU, storage, network, or other resources by providing small, valid inputs into the system that result in damaging effects that can be exponentially more costly to process than the inputs themselves
APR
The amount of interest a borrower must pay each year is known as the annual percentage rate (APR). The annual percentage rate (APR) is determined by multiplying the periodic interest rate by
APY
Annual percentage yield (APY) is the rate of return gained over the course of a year on a specific investment. Compounding interest, which is computed on a regular basis and applied to the am
Anonymity is when something is not known or named.
A quality attached to an asset that means it performs better when exposed to volatility and shocks. A term originally coined by Nassim Nicholas Taleb: “Antifragile goes beyond resilience or resilience. Some things benefit from shocks; they thrive and grow when exposed to volatility.” This fits in with the narrative that some crypto assets, including BTC, tend to rise in value whenever uncertainty hits the stock market – reinforcing the narrative that it is a safe-haven asset like gold.
AMDL5
The European Union’s 5th Anti-Money Laundering Directive (AMDL5) is an update to the union’s Anti-Money Laundering (AML) framework.
Guide To AMDL5
Apeing is when a cryptocurrency trader buys a token shortly after the token project launch without conducting thorough research.
API3 is a collaborative project to deliver traditional API services to smart contract platforms in a decentralized and trust-minimized way. It is governed by a decentralized autonomous organization (DAO), namely the API3 DAO. Therefore, API3's code is open source and its operations are transparent.
Web3
API3.ORG
A structured set of capabilities, which provide value-added functionality supported by one or more services.
FG DLT D1.1
The top-most layer of a seven-layered OSI model.
API
An Application Programming Interface (API) is a set of protocols, routines, functions and/or commands that programmers use to develop software or facilitate interaction between distinct systems. APIs are available for both desktop and mobile use and are typically useful for programming Graphical User Interface (GUI) components, as well as allowing a software program to request and accommodate services from another program. In DGT, the API server is part of the node, being one of its standard co
An arbiter is a specific type of DGT node that is responsible for inserting a new transaction into the ledger. While the initial verification of transactions is carried out in clusters, according to the F-BFT consensus, the addition of new transactions occurs outside the cluster
Federated Byzantine Fault Tolerance
Consensus Mechanism
Arbitrage is the practice of quickly buying and selling the same asset in different markets to take advantage of price differences between the markets.
Representation of value.
FG DLT D1.1
Asset-backed tokens are digital claims on a physical asset and are backed by that asset. Asset-backed tokens are digital claims on a physical asset and are backed by that asset. Gold, crude oil, real estate, equity, soybeans or just about any other real, physical asset can be tokenized and become an asset-backed token.
CoinMarketCap (Asset-Backed Tokens)
Events that do not occur simultaneously or at the same rate are referred to as asynchronous. Asynchronous or semi-synchronous blockchain networks are widely used in the crypto industry. Because the networks don't give nodes any feedback on the status of the data they are transmitting. Nodes may have different opinions on the network's overall influence. Transaction throughput is increased since nodes do not have to stand in line for their messages to be processed by other nodes.
CoinMarketCap (Asynchronous)
An exchange of tokens that does not involve the intervention of any trusted intermediary and automatically revertsif all of the provisions are not met.
NISTIR 8301
NISTIR8301
AtomicDEX offers a cryptocurrency wallet and DEX in one application that is available for multiple platforms. The decentralized exchange on AtomicDEX uses P2P order books powered by atomic swaps that enable the transfer of cryptocurrency from one party to another, without the use of a third-party intermediary. AtomicDEX is one of the ecosystem products built with Komodo AtomicDEX API - an open-source framework that is compatible with 99% of cryptocurrencies. DogeDEX and GleecDEX are two additio
Atomic Swap
CoinMarketCap (AtomicDex)
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
The set of points on the boundary of a system, a system element, or an environment where an attacker can try to enter, cause an effect on, or extract data from.
person seeking to exploit potential vulnerabilities of a system
Verifying the identity of a user, process, or device, often as a prerequisite for allowing access to resources in an information system
NISTIR 8301
NISTIR8301
AEA
A solution (software entity) by Fetch.ai and IOTA foundation that can take actions without external input using its own intelligence for the economic benefit of the owner. A typical example of an economic agent is a person engaged in some economic activity such as the purchase of consumer goods and services or the sale of a financial asset. More generally, an economic agent may be defined as any individual, group, or entity that makes decisions on the allocation of scarce resources.
Crypto slang for a large quantity of a specific cryptocurrency. Alternatively (but less frequently) used to refer to the contents of an individual's crypto portfolio.
BaaS
BaaS platforms provides a higher level of financial transparency options by letting banks open up their APIs for third parties in order to develop new services. Banking as a service or BaaS platforms provides a higher level of financial transparency options by letting banks open up their APIs for third parties in order to develop new services. BaaS platforms have surfaced as a key component in open banking, in which firms provide financial transparency options for account holders through openin
A basket, when used in the cryptocurrency space, refers to a collection of digital currencies managed as a single asset.
CoinMarketCap (Basket)
A group of related transactions. In the DGT, a package is a rudimentary unit of registry state change. A batch may contain one or more transactions. For a batch with multiple transactions, if one transaction fails, all transactions in that batch fail.
Someone who believes that prices in a given market will decline over an extended period. Such a person might be referred to as “bearish.”
A bear market is defined as a market that has lost 20% of its value in the last few months from its previous high point. It is frequently triggered by an economic downturn or a once-in-a-lifetime occurrence that has an economic impact, such as the new Coronavirus.
BEP-2
BEP-2 stands for Binance Chain Evolution Proposal 2. BEP-2 is a technical standard for creating and using new tokens on Binance Chain. It defines a set of rules and technical specifications that tokens should follow to function in the Binance Chain ecosystem. A very similar token standard in the Ethereum blockchain is ERC-20.
GitHub (BEP-2)
Binance Evolution Protocol (BEP-95) is a Bruno hard fork upgrade that aims to speed up the BNB token burning process.
BNB CHAIN (BEP-95)
BTC
An example of a blockchain using Proof of Work
FG DLT D1.1
Individual data unit of a blockchain, composed of a collection of transactions and a block header
FG DLT D1.1
Data structure that includes a cryptographic link to the previous block
FG DLT D1.1
Blockchains are distributed digital ledgers of cryptographically signed transactions that are grouped into blocks. Each block is cryptographically linked to the previous one (making it tamper evident) after validation and undergoing a consensus decision. As new blocks are added, older blocks become more difficult to modify (creating tamper resistance). New blocks are replicated across copies of the ledger within the network, and any conflicts are resolved automatically using established rules.
ITU-T FG DLT D1.1 (Terms & Definitions)
NISTIR 8301
NISTIR8301
BaaS
A cloud service category in which the capabilities provided to the cloud service customer are to deploy and manage a blockchain network enabling the ability of consensus, smart contract, transaction, crypto engine, block record storage, peer-to-peer connectivity and management using blockchain
FG DLT D1.1
A software for visualizing blocks, transactions, and blockchain network metrics (e.g., average transaction fees, hashrates, block size, block difficulty)
NISTIR8301
A blockchain network that is tightly coupled with one or more other blockchain networks, as found in sharding
NISTIR8301
A communication channel that allows for data to be transferred between different environments, without a direct network connection. This allows the trainer, which requires access to production data usually running within a DMZ environment, to move Generator models into the more open network hosting the Hub.
BRIDGES (HAZY)
BFT
Property that enables a system to continue operating properly even if some of its components fail or existence of intentional bad actors.
FG DLT D1.1
In theoretical computer science, the CAP theorem, also named Brewer's theorem after computer scientist Eric Brewer, states that any distributed data store can only provide two of the following three guarantees: - Consistency: Every read receives the most recent write or an error. - Availability: Every request receives a (non-error) response, without the guarantee that it contains the most recent write. - Partition tolerance: The system continues to operate despite an arbitrary number of messages
Wiki (CAP)
The Capital Asset Pricing Model (CAPM) calculates the expected rate of return for a certain portfolio or investment. It describes the association between risk and expected return. After determining expected income, abnormal income may be determined by subtracting the expected yield from realized return rate. Abnormal returns are based on the performance of securities or portfolios.
Abnormal Return
Investopedia (CAPM)
CBDC
A Central Bank Digital Currency (CBDC) is a digital form of a country's fiat currency that is issued and regulated by the central bank. It represents a new, secure, and efficient means of conducting transactions and storing value, digitally. Unlike cryptocurrencies, which are decentralized and operate on blockchain technology, CBDCs are centralized and backed by the government, providing a legal tender status. They aim to improve the financial system's efficiency, reduce transaction costs, enhan
Investopedia (CBDC)
In a computer system, a cluster is a group of servers and other resources that act as a single system and provide high availability and, in some cases, load balancing and parallel processing. In DGT, a cluster refers to set of nodes grouped together to achieve local consensus (validation and transaction verification).
SUSE DEFINITIONS
NISTIR8301
The name of the native cryptocurrency. The same as a token, but with an emphasis on its primacy, that is, the accepted means of exchange of value on this platform. In DGT, the coin is the DEC token.
Token
Cryptocurrency
CLI
Command Line Interface (CLI) is is a text-based interface that is used to operate software and operating systems while allowing the user to respond to visual prompts by typing single commands into the interface and receiving a reply in the same way.
A scheme that enables the off-chain processing of transactions by one or more operators with on-chain state update commitments that do not contain per-transaction data.
NISTIR8301
Adherence to specified requirements
FG DLT D1.1
A transaction with its payload cryptographically hidden such that no one besides the stakeholders of a transaction can interrogate its content.
Agreement that a set of transactions is valid
Consensus Mechanism
Consensus Model
FG DLT D1.1
A DGT platform node component that provides consensus functionality. The consensus engine runs as a separate process on the node and interacts with the validator via the consensus API.
A consensus mechanism is a fault-tolerant mechanism that is used in computer and blockchain systems to achieve the necessary agreement on a single data value or a single state of the network among distributed processes or multi-agent systems, such as with cryptocurrencies. It is useful in record-keeping, among other things.
Consensus Model
Investopedia (Consensus)
NISTIR8301
A process to achieve agreement within a distributed system on the valid state.
Consensus Mechanism
NISTIR8301
CFT
Property that enables a system to continue operating properly even if some of its components fail.
FG DLT D1.1
CSP
A trusted entity that issues or registers subscriber tokens and issues electronic credentials to subscribers. The CSP may encompass registration authorities (RAs) and verifiers that it operates. A CSP may be an independent third party, or may issue credentials for its own use
A digital asset/credit/unit within the system, which is cryptographically sent from one blockchain network user to another. In the case of cryptocurrency creation (such as the reward for mining), the publishing node includes a transaction sending the newly created cryptocurrency to one or more blockchain network users.
NISTIR8301
In classical cryptography, a game is used to define a specific attack scenario and the resilience against this scenario in “almost” all cases. The game itself fixes how the attacker may interact with the honest party towards some security breach (i.e., disclosure of secrets, impersonation, etc.)
A parameter used in conjunction with a cryptographic algorithm that determines the specific operation of that algorithm.
dAPIs
API services that are intrinsically interoperable with blockchain technology are known as decentralized application programming interfaces (dAPIs). This is an invention of the API3 protocol The API gateway in a decentralized system redirects queries to other API endpoints, which may be the backend of an application or a public API of the app's trading partner. At runtime, the API gateway is in charge of handling the appropriate protocol, security, and data conversions. The data is gathered in a
Application Programming Interface
DAPP
application that runs in a distributed and decentralized computing environment.
FG DLT D1.1
DAD
Minimum amount of information presented independently in a decentralized environment
DAO
A digital entity that manages assets and operates autonomously in a decentralized system, but also relies on individuals tasked to perform certain functions that the automaton itself cannot
FG DLT D1.1
DEX
A decentralized exchange (or DEX) is a peer-to-peer marketplace where transactions occur directly between crypto traders. DEXs fulfill one of crypto’s core possibilities: fostering financial transactions that aren’t officiated by banks, brokers, or any other intermediary. Many popular DEXs, like Uniswap and Sushiwap, run on the Ethereum blockchain.
DIM
An type of identity management that is based on the use of decentralized identifiers. Decentralized identity management extends authority for identifier generation, registration, and assignment beyond traditional roots of trust such as X.500 directory services, the Domain Name System, and most national ID systems.
W3C DID ARCH
Distributed system wherein control is distributed among the persons or organizations participating in the operation of system
FG DLT D1.1
DPoS
Another approach to Proof of Stake where a set number of nodes are elected or selected to function as the block-producing full validating nodes for the network.
FG DLT D1.1
D2D
Device-to-Device (D2D) communication in cellular networks is defined as direct communication between two mobile users without traversing the Base Station (BS) or core network. D2D communication is generally non-transparent to the cellular network and it can occur on the cellular frequencies (i.e., inband) or unlicensed spectrum (i.e., outband).
WIKI (D2D)
A dual entity: a piece of validator node software responsible for message processing, block validation and publishing, consensus and global state management (the DGT architecture separates these core functions from the application-specific business logic, which is handled by transaction families), as well as a configuration option for the entire platforms with basic functions without support for tokens (as opposed to the version of Garanaska that supports tokenization and identification - notari
Dashboard is a special network monitoring and verification component in DGT, which is one of the Blockchain Explorer's. It is implemented as a full-fledged client with the ability to send and receive transactions, with its own keys for signing them
An entity that has the capability to make changes to a DID document. A DID may have more than one DID controller. The DID controller(s) can be denoted by the optional controller property at the top level of the DID document. Note that one DID controller may be the DID subject.
W3C DID ARCH
An entity to whom a DID controller has granted permission to use a verification method associated with a DID via a DID document. For example, a parent who controls a child's DID document might permit the child to use their personal device for authentication purposes. In this case, the child is the DID delegate. The child's personal device would contain the private cryptographic material enabling the child to authenticate using the DID. However, the child may not be permitted to add other persona
W3C DID ARCH
A set of data describing the DID subject, including mechanisms, such as public keys and pseudonymous biometrics, that the DID subject or a DID delegate can use to authenticate itself and prove its association with the DID. A DID document may also contain other attributes or claims describing the DID subject. A DID document may have one or more different representations as defined in § 6. Core Representations or in the W3C DID Specification Registries [DID-SPEC-REGISTRIES].
W3C DID ARCH
The portion of a DID URL that follows the first hash sign character (#). DID fragment syntax is identical to URI fragment syntax
W3C DID ARCH
A definition of how a specific DID scheme must be implemented to work with a specific verifiable data registry. A DID method is defined by a DID method specification, which must specify the precise operations by which DIDs are created, resolved and deactivated, where DID documents are written and updated. See § 7. Methods.
W3C DID ARCH
The portion of a DID URL that begins with and includes the first forward-slash (/) character and ends with either a question mark (?) character or a fragment hash sign (#) character (or the end of the DID URL). DID path syntax is identical to URI path syntax. See § 3.2.3 Path.
W3C DID ARCH
The portion of a DID URL that follows and includes the first question mark character (?). DID query syntax is identical to URI query syntax. See § 3.2.4 Query.
W3C DID ARCH
The function that takes, as an input, a DID and a set of input metadata and returns a DID document in a conforming representation plus additional metadata. This function relies on the "Read" operation of the applicable DID method. The inputs and outputs of this function are defined in § 8. Resolution.
W3C DID ARCH
The formal syntax of a decentralized identifier. The generic DID scheme begins with the prefix "did:" as defined in the section of the DID Core specification. Each DID method specification must define a specific DID scheme that works with that particular DID method. In a specific DID method scheme, the DID method name must follow the first colon and terminate with the second colon, such as "did:example:".
W3C DID ARCH
The entity identified by a DID and described by a DID document. A DID has exactly one DID subject. Anything can be a DID subject: a person, group, organization, physical thing, digital thing, logical thing, and so on.
Multi-Party Computation
W3C DID ARCH
A DID plus any additional syntactic component that conforms to the definition in § 3.2 DID URL Syntax. This includes an optional DID path, optional DID query (and its leading ? character), and optional DID fragment (and its leading # character).
W3C DID ARCH
The function that takes as its input a DID URL, a DID document, plus a set of dereferencing options, and returns a resource. This resource may be a DID document plus additional metadata, or it may be a secondary resource contained within the DID document, or it may be a resource entirely external to the DID document. If the function begins with a DID URL, it uses the DID resolution function to fetch a DID document indicated by the DID contained within the DID URL. The dereferencing function can
W3C DID ARCH
[NISTIR 8202] Any asset that is purely digital, or is a digital representation of a physical asset.
DEC
Native platform token, defined by the corresponding transaction family. Supports single issue, minting mechanism and banking operations
[NIST SP 800-12 Rev. 1] The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation. An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation, but not confidentiality protection.
DAG
In computer science and mathematics, a directed acyclic graph (DAG) is a graph that is directed and without cycles connecting the other edges. This means that it is impossible to traverse the entire graph starting at one edge. The edges of the directed graph only go one way. The graph is a topological sorting, where each node is in a certain order. In DGT, transaction packages have an additional layer of relationships implemented on top of the block structure. Thus, the registry is not only a c
[NIST IR 8062] Enabling the processing of data or events without association to individuals or devices beyond the operational requirements of the system
A collection of data distributed across two or more databases
A type of ledger that is shared, replicated, and synchronized in a distributed and decentralized manner.
FG DLT D1.1
DLT
Distributed Ledger Technology (DLT) refers to the technological infrastructure and protocols that allows simultaneous access, validation, and record updating in an immutable manner across a network that's spread across multiple entities or locations. DLT, more commonly known as the blockchain technology, was introduced by Bitcoin and is now a buzzword in the technology world, given its potential across industries and sectors. In simple words, the DLT is all about the idea of a "decentralized" n
Investopedia (DLT)
Distributed systems are a computing paradigm whereby two or more nodes work with each other in a coordinated fashion in order to achieve a common outcome and it's modeled in such a way that end users see it as a single logical platform.
Service that supplies information to a distributed ledger using data from outside of a distributed ledger system
FG DLT D1.1
A feature of the architecture of the DGT platform (inheriting Sawtooth) that allows the use of various consensus algorithms (so-called "pluggable consensus"). Dynamic consensus allows each implementation of the DGT network to choose the best consensus for its purposes, as specified in the network settings in the genesis block. supports the ability to change the consensus algorithm in a live network by sending a transaction (in a live network, F-BFT consensus is used).
EdDSA
In public-key cryptography, Edwards-curve Digital Signature Algorithm is a digital signature scheme using a variant of Schnorr signature based on twisted Edwards curves. It is designed to be faster than existing digital signature schemes without sacrificing security.
ECDSA
[NIST SP 1800-16B ] a digital signature algorithm that is an analog of DSA using elliptic curve mathematics and specified in ANSI draft standard X9.62. A digital signature algorithm that is an analog of DSA using elliptic curves.
EEA
The Enterprise Ethereum Alliance is a collection of Fortune 500 companies that have pledged to help each other develop the Ethereum platform and "smart contract" technology. There are more than 180 member companies from more than 45 countries
Tokens designed and used solely on the Ethereum platform. Just like mainstream cryptocurrencies such as Bitcoin, they can be used to make purchases — or traded for fiat currencies and crypto. These assets, which usually have a fixed supply, can be stored in a dedicated Ethereum wallet. A wide range of ERC-20 tokens were created in 2017 and 2018 during the boom of initial coin offerings. They usually form the backbone of decentralized apps, otherwise known as DApps for short. Generally speaking,
Blockchain
OpenZeppellin (ERC-20)
A token standard for non-fungible Ethereum tokens. The more common term used to refer to these assets is non-fungible tokens — an asset class that exploded in popularity in late 2020 and early 2021. Non-fungible tokens (or NFTs for short) refer to tokens that have unique characteristics, setting them apart from other tokens.
Token
OpenZepellin (ERC-721)
ENS
The Ethereum Name Service (ENS) is a distributed, open, and extensible naming system based on the Ethereum blockchain. ENS's job is to map human-readable names like 'alice. eth' to machine-readable identifiers such as Ethereum addresses, other cryptocurrency addresses, content hashes, and metadata.
ENS Documentation
ERC
ERC stands for "Ethereum request for comment," and "request for comment" is a similar concept to that devised by the Internet Engineering Task Force as a means of conveying essential technical notes and requirements to a group of developers and users.
Fault tolerance requires that a protocol must also effective in case of node failures
Byzantine fault tolerance
F-BFT
In the DGT network, a hybrid consensus mechanism known as F-BFT (Flexible Byzantine Fault Tolerance) is utilized. This approach divides the network into clusters, where consensus is initially reached at the cluster level using BFT-like mechanisms, such as PBFT (Practical Byzantine Fault Tolerance) or HotStuff. F-BFT facilitates decision-making on the authenticity of transactions before recording them in a block. Following cluster-level consensus, the transaction is further validated at the upper
Consensus Mechanism
Practical Byzantine Fault Tolerance
A scalable Multi-Layer PBFT Consensus
Testing and Comparative Analysis of the F-BFT-based DLT Solution
Error Detection in the Decentralized Voting Protocol
Fiat currency is “legal tender” backed by a central government, such as the Federal Reserve, and with its own banking system, such as fractional reserve banking. It can take the form of physi
FLP
One of the main theorems for distributed systems, significantly affecting the ability to build consensus. The FLP theorem states that in an asynchronous network where messages may be delayed but not lost, there is no consensus algorithm that is guaranteed to terminate in every execution for all starting conditions, if at least one node may experience failure.
CAP-Theorem
Consensus
Safety
Liveness
Fault Toleranse
Impossibility of Distributed Consensus with One Faulty Process
Creation of two or more different versions of a distributed ledger. NOTE – There are two types of forks.
Soft fork
Hard fork
FG DLT D1.1
Refers to something that is replaceable or interchangeable (i.e., not uniquely identifiable)
NISTIR8301
GARANASKA is a configuration variant of the DGT platform equipped with tokenization and identification mechanisms
The first block in a blockchain that serves to initialize the blockchain
FG DLT D1.1
Exploiting weaknesses in a computer system to circumvent certain limitations. Being, in fact, a hack or exploitation of vulnerabilities, glitch implies a lesser degree of danger from the actions of the attacker, and often does not imply damage at all. The term is widely used in computer games, where it means the use of known bugs for advantage or entertainment. A typical example of glitch is going through a wall or going out of the map. Glitches may be found by accident or actively searched for
GS
The underlying data structure of a distributed ledger, such as Merkle Tree
A gossip protocol or epidemic protocol is a procedure or process of computer peer-to-peer communication that is based on the way epidemics spread. Some distributed systems use peer-to-peer gossip to ensure that data is disseminated to all members of a group. Some ad-hoc networks have no central registry and the only way to spread common data is to rely on each member to pass it along to their neighbors.
Wiki (Gossip)
System of directing and controlling
FG DLT D1.1
Change to the protocol or rules that result in a fork that is not backward compatible
FG DLT D1.1
HSM
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server. A hardware security module contains one or more secure cryptoprocessor chips
Wiki (HSM)
The output of a hash function (e.g., hash(data) = digest). Also known as a message digest, digest, hash digest, or hash value.
NISTIR8301
a function that maps a bit string of arbitrary length to a fixed-length bit string. Approved hash functions satisfy the following properties: 1. One-way: It is computationally infeasible to find any input that maps to any pre-specified output, and 2. Collision resistant: It is computationally infeasible to find any two distinct inputs that map to the same output
Hash
FG DLT D1.1
HTLC
A hashed timelock contract (HTLC) is a type of smart contract used in blockchain applications. It reduces counterparty risk by creating a time-based escrow that requires a cryptographic passphrase for unlocking. In practical terms, this means that the person receiving the funds in a transaction has to perform two actions to access the funds: enter the correct passphrase and claim payment within a specific timeframe. If they enter an incorrect passphrase or do not claim the funds within the time
Investopedia (HTLC)
A method of calculating a relatively unique output (called a hash digest) for an input of nearly any size (a file, text, image, etc.). The smallest change of input, even a single bit, will result in a completely different output digest.
Hash
FG DLT D1.1
HD
A hierarchical deterministic (HD) wallet is a digital wallet commonly used to store the digital keys for holders of cryptocurrencies such as Bitcoin and Ethereum. Anyone with a copy of both the public and password-like private key can control the cryptocurrency in the account.
Investopedia (HD Wallet)
H-Net
The DGT network employs a hybrid architecture known as H-NET, which structures nodes into clusters and organizes these clusters into segments. This architecture is distinguished by the implementation of a specialized permission mechanism that allows for the configuration of access levels within each segment: from public access, where any node can freely join or form a cluster (with the provision that only one segment can be open to all), to private, where access is controlled by the segment admi
A combination of permissionless and permissioned accessibility
FG DLT D1.1
ID
Unique data used to represent a person’s identity and associated attributes. A name or a card number are examples of identifiers The set of physical and behavioral characteristics by which an individual is uniquely recognizable.
Property of blockchain and distributed ledger systems that ledger records can only be added, but not removed or modified, and are designed not to allow changes to historical data over time.
FG DLT D1.1
Method of offering reward for some activities concerned with the operation of a distributed ledger system
FG DLT D1.1
CSP
[NIST SP 1800-17c; NIST SP 800-63-3] The same as Credential Service Provider: A trusted entity that issues or registers subscriber tokens and issues electronic credentials to subscribers. The CSP may encompass registration authorities (RAs) and verifiers that it operates. A CSP may be an independent third party, or may issue credentials for its own use. The party that manages the subscriber’s primary authentication credentials and issues assertions derived from those credentials. This is commonl
Credential Service Provider
ITL
The Information Technology Laboratory (ITL), one of six research laboratories within the National Institute of Standards and Technology
Ability of two or more distributed ledger protocols to exchange information and to use information that has been exchanged with one another
FG DLT D1.1
ISO
The International Organization for Standardization is an international standard development organization composed of representatives from the national standards organizations of member countries. Membership requirements are given in Article 3 of the ISO Statutes
Wiki (ISO)
Ability of two or more tokens within distributed ledger platform to operate with one another
FG DLT D1.1
JSON
JSON is an open standard file format and data interchange format that uses human-readable text to store and transmit data objects consisting of attribute–value pairs and arrays. It is a common data format with diverse uses in electronic data interchange, including that of web applications with servers.
WIKI (JSON)
JWT
A data exchange format made of a header, payload, and signature where the header and the payload take the form of JSON objects. They are encoded and concatenated with the aggregate being signed to generate a signature.
NISTIR8301
LMDB
Lightning Memory-Mapped Database (LMDB) is a software library that provides an embedded transactional database in the form of a key-value store. LMDB is written in C with API bindings for several programming languages. LMDB stores arbitrary key/data pairs as byte arrays, has a range-based search capability, supports multiple data items for a single key and has a special mode for appending records (MDB_APPEND) without checking for consistency
WIKI (LMDB)
Liveness indicates that individual nodes in a system must reach an agreement (in bounded time), that is, the system must move forward and cannot always be in the inconsistency state. Liveness is actually a higher requirement. It means that you cannot do something bad but also cannot always do nothing. You must do something good, that is, to make the entire system run smoothly and normally.
LTE
LTE (Long-Term Evolution) is a fourth-generation (4G) wireless standard that provides increased network capacity and speed for cellphones and other cellular devices compared with third-generation (3G) technology.
Wiki (LTE)
Serialization of data
Version of the DGT with GARANASKA support (one of the versions of the DGT implementation)
In hash-based cryptography, the Merkle signature scheme is a digital signature scheme based on hash trees (also called Merkle trees) and one-time signatures such as the Lamport signature scheme. It was developed by Ralph Merkle in the late 1970s and is an alternative to traditional digital signatures such as the Digital Signature Algorithm or RSA. The advantage of the Merkle signature scheme is that it is believed to be resistant against quantum computer algorithms. The traditional public key a
A data structure where the data is hashed and combined until there is a singular root hash that represents the entire structure
NISTIR8301
Contributors to a blockchain taking part in the process of mining. They can be professional miners or organizations with large-scale operations, or hobbyists who set up mining rigs at home or in the office.
A protocol-level operation that creates and distributes new tokens to blockchain addresses, either individually or in batch
NISTIR8301
MPC
Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private. Unlike traditional cryptographic tasks, where cryptography assures security and integrity of communication or storage and the adversary is outside the system of participants (an eavesdropper on the sender and
Wiki (SMPC)
A cryptographic signature scheme where the process of signing information (e.g., a transaction) is distributed among multiple private keys.
NISTIR8301
NIST
The National Institute of Standards and Technology is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness.
Wiki (NIST)
NIST-IR
Type of document that NIST issued for internal proposes
NFC
Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of 4 cm (1⁄2 in) or less.[1] NFC offers a low-speed connection through a simple setup that can be used to bootstrap more-capable wireless connections.[2] Like other "proximity card" technologies, NFC is based on inductive coupling between two so-called antennas present on NFC-enabled devices—for example a smartphone and a printer—communicating in one or bot
Wiki (NFC)
An access point is a specific node within a cluster through which information is exchanged with other nodes. If the access point is not available, you can select another access point. The list of access points changes dynamically and is written to the registry, a periodically synchronized external catalog mirror is also available (a JSON file distributed through cloud services) In the general case, an access point in computer science is an access point - a network interface that allows you to c
Open Shortest Path First
GOSSIP Protocol
Wiki (OSPF)
MTI (Routing Data Networks)
Routing Protocols (RIP,OSPF, BGP)
Network segment is a portion of a computer network. The nature and extent of a segment depends on the nature of the network and the device or devices used to interconnect end stations In DGT, a network segment characterizes a set of clusters with a specific access mechanism (private or public). Represents part of the H-Net hybrid network concept, along with clusters and rings of arbitrators and notaries
Subchain
Wiki (Network Segment)
Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. In DGT, the network topology is defined by the various segments, as well as the width (number of members) and depth (the number of valid links to "child" clusters), as well as the correspondence between a particular node and its place in a particular cluster. The topology is supported by the Topology transaction family, which is recorded in a separate branch of the graph and defines the structure
Device or process that participates in a distributed ledger network
FG DLT D1.1
Refers to an application or process that does not require users to relinquish any control over their data or private keys.
NISTIR8301
Refers to something that is uniquely identifiable (i.e., not replaceable or interchangeable).
NISTIR8301
NFT
A non-fungible token (NFT) is a financial security consisting of digital data stored in a blockchain, a form of distributed ledger. The ownership of an NFT is recorded in the blockchain, and can be transferred by the owner, allowing NFTs to be sold and traded. NFTs can be created by anybody, and require few or no coding skills to create.[1] NFTs typically contain references to digital files such as photos, videos, and audio. Because NFTs are uniquely identifiable, they differ from cryptocurrenci
Wiki (NFT)
A trusted entity that submits transactions across blockchains on behalf of users, often with respect to tokens the users have previously locked up.
NISTIR8301
Refers to data that is stored or a process that is implemented and executed outside of any blockchain system
NISTIR8301
Refers to data that is stored or a process that is implemented and executed within a blockchain system.
NISTIR8301
Strategy where only a single multicast round of messages reaches agreement
OSPF
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS).
Wiki (OSPF)
A source of data from outside a blockchain that serves as input for a smart contract.
NISTIR8301
The ''oracle problem'' refers to smart contracts' inability to obtain data that is not already available on the blockchain. This implies that the smart contracts driving these apps are unable to directly access APIs from the blockchain in which the contract is stored owing to the unique consensus-based security assurances gained from employing a decentralized network of nodes as the application platform. A solution is required that allows smart contracts to access API data while maintaining the
Decentralized API
Oracle
Overloaded cryptography is an approach in which the cryptography library to be used is determined at node and network launch. The working version of Matagami supports two OpenSSL and Bitcoin (bitcoin-core/secp256k1) libraries
An actor who can access the ledger: read records or add records to
FG DLT D1.1
Payload - the contents of the transaction, its useful information, distinguishable from the header (envelope). The DGT is defined by a family of transactions, the most commonly used format is Protobuf encoded with MIME's base 64
Peer-to-peer (P2P) networks are decentralized networks where each participant, or "peer," has equivalent capabilities and responsibilities. Unlike traditional client-server models, where the client requests resources from a centralized server, in P2P networks, every peer acts both as a client and a server. This architecture allows for the direct exchange of information, files, or other data between peers without the need for a central coordinating server. P2P networks are widely used for file sh
FG DLT D1.1
Intended allowable user actions (e.g., participate, read, write, execute)
FG DLT D1.1
A system where every node, and every user must be granted permissions to utilize the system (generally assigned by an administrator or consortium).
NISTIR8301
Distributed ledger system in which permissions are required to maintain and operate a node
FG DLT D1.1
Distributed ledger system where permissions are not required to maintain and operate a node
FG DLT D1.1
Allowable user actions (e.g., read, write, execute).
NISTIR8301
[FIPS 201-3] The secret part of an asymmetric key pair that is typically used to digitally sign or decrypt data A cryptographic key used by a public-key (asymmetric) cryptographic algorithm that is uniquely associated with an entity and is not made public.
PQC
In cryptography, post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against a cryptanalytic attack by a quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm pro
Shor's algorithm
pBFT
Practical Byzantine Fault Tolerance (pBFT) is a specific case and the optimization of the Byzantine Fault Tolerance network ability. It was developed by Barbara Liskov and Miguel Castro and introduced in 1999. PBFT provides the network with Byzantine state machine approach, meaning implementing a Byzantine Fault Tolerance by copying servers and synchronizing client interactions with server copies. PBFT can ensure the networks fault-tolerance while allowing it to process thousands of operations
Consensus
Consensus Mechanism
Byzantine fault tolerance
Data stored using encryption. A system can contain multiple Private Data objects. Private Data objects are provided primarily to support storage of server account passwords. Information stored in Private Data objects is encrypted using a generated system-specific key
Attributes of the personnel providing access to the meta-information of the set of confidential information that defines the set of the set. In the usual case, attributes such as column names are used. Such characteristics can be classified: Identifying features are associated with a high risk of re-identification. They will be removed from the dataset. Common examples are names or social security numbers. Quasi-identifying attributes can be used in combination for re-identification attacks. The
Distributed ledger system which is accessible for use only to a limited group of DLT users.
FG DLT D1.1
PoS
Consensus process, where an existing stake in the distributed ledger system (e.g., the amount of that currency that you hold) is used to reach consensus
FG DLT D1.1
PoW
Consensus process to solve a difficult (costly, time-consuming) problem that produces a result that is easy for others to correctly verify
FG DLT D1.1
PoS
Proof-of-stake is a cryptocurrency consensus mechanism for processing transactions and creating new blocks in a blockchain. A consensus mechanism is a method for validating entries into a distributed database and keeping the database secure. In the case of cryptocurrency, the database is called a blockchain—so the consensus mechanism secures the blockchain. Learn more about proof-of-stake and how it is different from proof-of-work. Additionally, find out the issues proof-of-stake is attempting
Aeternity Blockchain
Sybil Attack
Investopedia (PoS)
PoW
A blockchain consensus mechanism involving solving of computationally intensive puzzles to validate transactions and create new blocks.
Distributed ledger system which is accessible to the public for use
FG DLT D1.1
PK
[FIPS 201-3] The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.
Cryptography in which a public key and a corresponding private key are used for encryption and decryption, where public key is disseminated, and private key is known only to the key owner.
FG DLT D1.1
PKI
[NIST SP 800-53 Rev. 5] The architecture, organization, techniques, practices, and procedures that collectively support the implementation and operation of a certificate-based public key cryptographic system. Framework established to issue, maintain, and revoke public key certificates.
A transaction with its payload in the open. Anyone with access to a chain network can interrogate the details of public transactions.
RWA
Real world assets are physical assets that have an intrinsic worth due to their substance and properties. Real assets include precious metals, commodities, real estate, land, equipment, and natural resources. They are appropriate for inclusion in most diversified portfolios because of their relatively low correlation with financial assets, such as stocks and bonds.
Investopedia (Real Asset)
A scheme deployed on a given blockchain to receive and verify transactions from another blockchain.
NISTIR8301
Resolver Software that retrieves data associated with some identifier. Rollup
NISTIR8301
[NIST SP 800-160 Vol. 1] Magnitude of a risk or combination of risks, expressed in terms of the combination of consequences and their likelihood.
[NIST SP 800-160 Vol. 2 Rev. 1] A key component of a risk assessment methodology (in addition to assessment approach and analysis approach) that defines key terms and assessable risk factors.
A scheme that enables the off-chain processing of transactions by one or more operators with on-chain state update commitments that contain “compressed” per-transaction data
NISTIR8301
[NIST SP 800-89] A public key algorithm attributed to Rivest, Shamir, and Adleman Algorithm developed by Rivest, Shamir and Adelman (allowed in FIPS 186-3 and specified in ANS X9.31 and PKCS #1) A public-key algorithm that is used for key establishment and the generation and verification of digital signatures.
Safety in distributed system domain means that the values reached across nodes in a system are consistent and valid. Safety is the most basic requirement to ensure system consistency. The core of safety is to ensure that it cannot do something bad.
secp256k1 refers to the parameters of the elliptic curve used in Bitcoin's public-key cryptography, and is defined in Standards for Efficient Cryptography (SEC) (Certicom Research, http://www.secg.org/sec2-v2.pdf). Currently Bitcoin uses secp256k1 with the ECDSA algorithm, though the same curve with the same public/private keys can be used in some other algorithms such as Schnorr. secp256k1 was almost never used before Bitcoin became popular, but it is now gaining in popularity due to its sever
Bitcoin_WIKI-SECP256K1
Semi-structured data is a form of structured data that does not obey the tabular structure of data models associated with relational databases or other forms of data tables, but nonetheless contains tags or other markers to separate semantic elements and enforce hierarchies of records and fields within the data. Therefore, it is also known as self-describing structure.
A design principle for breaking down an application into modules, layers, and encapsulations, the roles of which are independent of one another.
NISTIR8301
A blockchain configuration and architecture that enables the processing of transactions in parallel. The blockchain’s global state is split among multiple blockchain subnetworks coordinated by a separate hub blockchain.
NISTIR8301
Shielded addresses are ones that use zero-knowledge proofs to allow transaction data to be encrypted by remaining verifiable by network nodes. A shielded transaction is essentially a transaction that is between two shielded addresses. This will essentially keep the addresses, transaction amount and the memo field shielded from the public, with an exception of migrating funds between Sprout and Sapling shielded addresses. Senders to a shielded address can or can not include an encrypted memo,
Coimarketcap (Shielded Transaction)
Shor's algorithm is a quantum computer algorithm for finding the prime factors of an integer. It was developed in 1994 by the American mathematician Peter Shor.
Shor's algorithm (WIKI)
A blockchain with its own consensus mechanism and set of nodes that is connected to another blockchain through a two-way bridge.
NISTIR8301
A collection of code and data (sometimes referred to as functions and state) that is deployed using cryptographically signed transactions on the blockchain network. The smart contract is executed by nodes within the blockchain network; all nodes must derive the same results for the execution, and the results of execution are recorded on the blockchain.
NISTIR8301
Program written on the distributed ledger system which encodes the rules for specific types of distributed ledger system transactions in a way that can be validated, and triggered by specific conditions
FG DLT D1.1
Change to the protocol or rules that result in a fork that is backward compatible
Fork
Hard fork
FG DLT D1.1
Stablecoins are cryptocurrencies the value of which is pegged, or tied, to that of another currency, commodity or financial instrument. Stablecoins aim to provide an alternative to the high volatility of the most popular cryptocurrencies including Bitcoin (BTC), which has made such investments less suitable for wide use in transactions.
Investopedia (Stablecoin)
Protocol-defined token collateralization earning yields and/or providing privileges, either at the base layer (in proof-of-stake consensus models) or at the smart contract layer.
NISTIR8301
A scheme that enables the off-chain processing of transactions by a group of participants with instant second layer finality and deferred on-chain settlement via state updates.
NISTIR8301
An on-chain transaction used to anchor the current state of an external ledger onto the underlying blockchain
NISTIR8301
Refers to a data representation or a process that is dependent on an external data store.
NISTIR8301
Contract with specified states
FG DLT D1.1
execution of a program that occurs on all nodes that changes a set of bits representing value information stored on-chain within the contract itself. All nodes that contain the contract must execute the program in order to change a set of bits representing value information
FG DLT D1.1
Refers to a data representation or a process that is self-contained and does not depend on any external data store.
NISTIR8301
Contract lacking specified states
FG DLT D1.1
Execution of a program that occurs on an individual node (or subset of nodes) that changes a set of bits representing value information stored on-chain but apart from the contract.
FG DLT D1.1
Logically separate chain that can form part of a blockchain system
FG DLT D1.1
A cybersecurity attack wherein an attacker creates multiple accounts and pretends to be many persons at once.
NISTIR8301
A representation of a particular asset that typically relies on a blockchain or other types of distributed ledgers.
NISTIR8301
Digital system or digital space where participants and users interact and coordinate with each other using tokens
FG DLT D1.1
A smart contract that defines and issues a token.
NISTIR8301
TTI
Today the InterWork Alliance (IWA) announced it is merging with the Global Blockchain Business Council (GBBC). The IWA launched just over a year ago to focus on the Token Taxonomy Framework (TTF), which was initiated by the Enterprise Ethereum Alliance.
Economics of a DLT based token
FG DLT D1.1
A recording of an event, such as the transfer of tokens between parties, or the creation of new assets
NISTIR8301
Application-specific business logic that defines the set of operations or types of transactions allowed on the blockchain. DGT transaction families separate transaction rules and content from core platform functionality. They are a kind of smart contracts that support more statics in relation to arbitrary smart contracts of a regular blockchain network. The transaction family implements the data model and transaction language for the application. For example, the DEС (Digital Economy Token) tra
An amount of cryptocurrency charged to process a blockchain transaction. Given to publishing nodes to include the transaction within a block
NISTIR8301
A separate platform component responsible for checking (verifying and validating) transactions and updating the state based on the rules defined by the corresponding transaction family. The DGT includes several transaction processors for typical transaction families.
TEE
A trusted execution environment (TEE) is a secure area of a main processor. It guarantees code and data loaded inside to be protected with respect to confidentiality and integrity, Data integrity — prevents unauthorized entities from altering data when any entity outside the TEE processes data, Code integrity — the code in the TEE cannot be replaced or modified by unauthorized entities, which may also be the computer owner itself as in certain DRM schemes described in SGX. This is done by implem
Wiki (TEE)
URI
The standard identifier format for all resources on the World Wide Web as defined by [RFC3986]. A DID is a type of URI scheme.
W3C DID ARCH
UUID
A type of globally unique identifier defined by [RFC4122]. UUIDs are similar to DIDs in that they do not require a centralized registration authority. UUIDs differ from DIDs in that they are not resolvable or cryptographically-verifiable. In addition to the terminology above, this specification also uses terminology from the [INFRA] specification to formally define the abstract data model. When [INFRA] terminology is used, such as string, ordered set, and map, it is linked directly to that speci
W3C DID ARCH
UTXO
In cryptocurrencies, an unspent transaction output (UTXO) represents some amount of digital currency which has been authorized by one account to be spent by another. UTXOs use public key cryptography to identify and transfer ownership between holders of public/private key pairs. UTXOs are formatted with the recipient's public key, thus restricting the ability to spend that UTXO to the account that can prove ownership of the associated private key. The UTXO can only be spent if it includes the di
Wiki (UTXO)
The node component responsible for validating transaction batches, aggregating them into blocks, maintaining consensus with the DGT network, and coordinating communication between clients, transaction processors, and other validators on the network. Often used as a synonym for a regular node participating in consensus building within a cluster
VC
A standard data model and representation format for cryptographically-verifiable digital credentials as defined by the W3C [VC-DATA-MODEL].
W3C DID ARCH
VDR
A system that facilitates the creation, verification, updating, or deactivation of decentralized identifiers and DID documents. A verifiable data registry may also be used for other cryptographically-verifiable data structures such as verifiable credentials. For more information, see [VC-DATA-MODEL].
W3C DID ARCH
A set of parameters that can be used together with a process or protocol to independently verify a proof. For example, a public key can be used as a verification method with respect to a digital signature; in such usage, it verifies that the signer possessed the associated private key. "Verification" and "proof" in this definition are intended to apply broadly. For example, a public key might be used during Diffie-Hellman key exchange to negotiate a shared symmetric key for encryption. This gua
W3C DID ARCH
An expression of the relationship between the DID subject and a verification method. An example of a verification relationship is § 5.4.1 authentication.
W3C DID ARCH
An application used to generate, manage, store or use private and public keys. A wallet can be implemented as a software or hardware module.
NISTIR8301
Web 3 (also known as Web 3.0 and sometimes stylized as Web3) is the idea of a new version of the World Wide Web that includes concepts such as decentralization in the form of a distributed ledger. such as blockchain technologies and the token-based economy. Some technologists and journalists oppose it to Web 2.0, arguing that data and content is centralized in a small group of companies, sometimes called "big technology companies" (Big Tech).
The Web3 Foundation was created to foster new technologies and applications in the field of decentralized web software protocols.
Web3 Foundation
WLAN
A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building. This gives users the ability to move around within the area and remain connected to the network. Through a gateway, a WLAN can also provide a connection to the wider Internet.
W3C
The World Wide Web Consortium is the main international standards organization for the World Wide Web. Founded in 1994 and currently led by Tim Berners-Lee, the consortium is made up of member organizations that maintain full-time staff working together in the development of standards for the World Wide Web
ZKP
[NISTIR 8301] A cryptographic scheme where a prover is able to convince a verifier that a statement is true, without providing any more information than that single bit (that is, that the statement is true rather than false) A zero-knowledge proof of some statement must satisfy three properties: 1. Completeness: if the statement is true, an honest verifier (that is, one following the protocol properly) will be convinced of this fact by an honest prover. 2. Soundness: if the statement is fal
ZKP (wiki)
NISTIR8301
This model can be used to protect data from membership disclosure. A dataset is (δmin, δmax)-present if the probability that an individual from the population is contained in the dataset lies between δmin and δmax. In order to be able to calculate these probabilities, users need to specify a population table.
Hiding the presence of individuals from shared databases
253 records

Alert

Lorem ipsum
Okay