Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

A hardware wallet that stores private keys in a secure enclave, signing transactions offline and displaying details on an integrated screen to protect against malware and remote attacks....

Read More

The process of creating and securely storing a copy of critical cryptographic keys, such as private keys or seed phrases, to prevent irreversible loss of access to cryptocurrency funds or digital…...

Read More

The cryptographic process of generating new keys from existing key material using deterministic algorithms. In cryptocurrency contexts, key derivation enables the creation of hierarchical wallet…...

Read More

A cryptographic algorithm that derives one or more secret keys from a master key or a password using a pseudorandom function. KDFs are often used to stretch keys, making them more resistant to brute-…...

Read More

A cryptographic method by which two or more parties can securely establish shared secret keys over an insecure communication channel, enabling them to encrypt subsequent messages....

Read More

The process of creating cryptographic keys used for encryption, digital signatures, and other security operations in blockchain systems. Key generation produces the public and private key pairs that…...

Read More

A cryptographic one‑time identifier used in privacy‑preserving cryptocurrencies (e.g., Monero) to mark the spending of a ring‑signature input without revealing which output was spent....

Read More

The set of practices, policies, and technologies used to generate, store, distribute, use, archive, and revoke cryptographic keys. In the context of blockchain, it primarily refers to the secure…...

Read More

A systematic review of processes, controls, and technologies used to generate, store, rotate, and retire cryptographic keys to ensure they meet security and compliance requirements....

Read More

A managed service for creating, storing, rotating, and controlling access to cryptographic keys used to encrypt data, sign transactions, and secure communications....

Read More

User interface and experience patterns for generating, storing, backing up, and recovering cryptographic keys in blockchain applications, aiming to reduce user errors and improve security....

Read More

A cryptographic private key and its corresponding public key used for signing and verification....

Read More

Mechanisms enabling users to regain access to their cryptographic keys or accounts after loss, including social recovery, Shamir’s Secret Sharing, custodial backups, and multi‑signature schemes....

Read More

The practice of periodically replacing old cryptographic keys with new ones. This proactive security measure limits the amount of data protected by a single key and reduces the potential damage if a…...

Read More

Splitting a private key into multiple shares using secret sharing (e.g., Shamir’s) so that only a threshold of shares can reconstruct the key....

Read More

A cryptographic method where a private key is divided into multiple parts, called shares or shards. These shares are distributed among different parties or stored in separate locations. A certain…...

Read More

An encrypted digital file that stores a cryptocurrency private key, protected by a user-created password. The keystore file combines the security of encryption with the convenience of password-based…...

Read More

A public blockchain platform focused on enterprise adoption and mass user onboarding, emphasizing high performance, low latency, and enterprise-grade reliability. Klaytn combines elements of public…...

Read More

A hardware device that allows a user to control multiple computers using a single keyboard, video monitor, and mouse, often used in server operations to manage blockchain nodes....

Read More

Kate‑Zaverucha‑Goldberg polynomial commitments: a cryptographic scheme that allows one to commit to a polynomial and later open it at any point with a short proof, used for data availability and…...

Read More

L1

Abbreviation for Layer 1, referring to the base or foundational blockchain network protocol....

Read More

L2

Abbreviation for Layer 2, referring to a secondary protocol or framework built on top of a Layer 1 blockchain to improve scalability and efficiency....

Read More

L3

Abbreviation for Layer 3, a tertiary layer or protocol typically built on Layer 2s or Layer 1s, often focused on application-specific functionality or interoperability....

Read More

A non‑fungible token representing ownership of a parcel of virtual land in a metaverse or blockchain‑based world, often granting rights to build, monetize, or govern that space....

Read More

The time delay between initiating an action—such as submitting a transaction—and observing its effect, including network propagation, block inclusion, and confirmation....

Read More

A service‑level agreement that guarantees a maximum end‑to‑end delay for API responses, transaction confirmations, or data feeds, with defined remedies if latency targets are missed....

Read More

A type of public-key cryptography that uses mathematical structures called lattices. It is a leading candidate for post-quantum cryptography (PQC) because the underlying hard problems are believed to…...

Read More

A platform that hosts and facilitates token sales—including ICOs, IEOs, IDOs, and IFOs—providing fundraising, vetting, and distribution infrastructure....

Read More

A mechanism where users stake a platform’s native token to earn allocations in upcoming token sales or new token emissions....

Read More

A foundational network protocol that underpins multiple Layer 1 blockchains, enabling interoperability and shared infrastructure. Layer 0 protocols provide the fundamental building blocks, such as…...

Read More

The base blockchain network protocol that forms the foundational layer of a decentralized ecosystem. Layer 1 blockchains are responsible for their own security, transaction validation, consensus…...

Read More

The native cryptocurrency or token of a base blockchain protocol, known as a Layer 1 blockchain. These tokens are used for core network functions such as paying transaction fees (gas) and…...

Read More

A secondary framework or protocol built on top of an existing Layer 1 blockchain. Layer 2 solutions aim to improve scalability, transaction speed, and reduce costs by handling transactions off the…...

Read More

A token specific to a Layer 2 scaling solution or protocol built on top of a Layer 1 blockchain. These tokens typically have utility within the Layer 2 ecosystem, such as for paying fees on the L2,…...

Read More

A tertiary layer or protocol built on top of Layer 2 solutions or directly on Layer 1, often focused on application-specific functionalities, interoperability, or enhanced user experiences. Layer 3s…...

Read More

An interoperability protocol that enables direct cross-chain communication between different blockchains without requiring a central chain or shared security model. LayerZero uses a combination of on…...

Read More

A technique used in NFT marketplaces that allows users to create and sign a sell order without immediately committing it to the blockchain. The transaction only gets processed and recorded on-chain…...

Read More

A gas-efficient approach to NFT creation where the token metadata is prepared and cryptographically signed by the creator, but the actual on-chain minting process is deferred until the moment of…...

Read More

A technique used in NFT collections where the actual visual content and attributes of tokens are initially hidden and only revealed after the mint has completed. Lazy reveal uses encrypted or…...

Read More

A record-keeping system for tracking economic activity, financial transactions, or changes in asset ownership. In blockchain contexts, a ledger refers to the distributed and typically immutable…...

Read More

A family of hardware security devices that store private keys for cryptocurrency and digital assets offline in a secure element, requiring physical confirmation for transactions. Ledger devices…...

Read More

A original Bitcoin address format (P2PKH) starting with “1”, predating SegWit upgrades....

Read More

A standardized 20-character alphanumeric code that uniquely identifies legal entities participating in financial transactions globally. In the blockchain context, LEIs are increasingly used to…...

Read More

Decentralized applications built on blockchain networks that enable peer-to-pool lending and borrowing of cryptocurrencies and digital assets without traditional financial intermediaries. These…...

Read More

A modular network stack for peer‑to‑peer applications, providing transport, peer discovery, and secure communication primitives....

Read More

A blockchain interoperability solution that uses lightweight clients to verify and relay information between different blockchain networks without requiring full node validation of the entire chain.…...

Read More

A cryptographic technique that allows verification of blockchain transactions without downloading and processing the entire chain. Light client verification enables resource-constrained devices and…...

Read More

A Layer 2 scaling solution for Bitcoin that enables fast, low-cost transactions through a network of payment channels. Lightning Network allows participants to conduct unlimited transactions off-…...

Read More

A network participant that only downloads block headers rather than the entire blockchain, relying on full nodes to provide relevant transaction data when needed. Light nodes enable blockchain…...

Read More

Cryptographic algorithms specifically designed for resource-constrained environments, providing security with minimal processing power, memory, energy consumption, or bandwidth requirements.…...

Read More