Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

A mandatory waiting timeframe in proof-of-stake blockchain networks during which tokens that have been requested for withdrawal from staking remain locked and unusable before becoming fully available…...

Read More

In the context of smart contracts, upgradability refers to the ability to modify or update the logic of a deployed smart contract while preserving its state (data and balances) and address. This is…...

Read More

A smart contract system designed to allow its underlying logic to be modified or updated after deployment, while preserving its state (data, balances) and public address. This is typically achieved…...

Read More

A specific implementation of the proxy pattern used to create upgradeable smart contracts. It refers to the proxy contract itself, which holds state and forwards calls to a separate logic contract,…...

Read More

The percentage of time a node, particularly a validator or mining node, is operational, connected to the network, and performing its required functions (e.g., validating transactions, producing…...

Read More

A wallet where the user exclusively controls private keys, without reliance on third parties for signing or key storage....

Read More

A core Internet transport layer protocol that provides minimal‑overhead, connectionless delivery of datagrams without guaranteed delivery or ordering....

Read More

NFTs designed to grant holders specific functional benefits—such as access rights, discounts, or governance privileges—beyond mere collectibility....

Read More

A quantifiable metric evaluating a blockchain project or token’s utility based on factors like user activity, transaction volume, and integration breadth....

Read More

A token that provides access to a product or service within a blockchain ecosystem, rather than representing an investment or equity stake....

Read More

Acronym for Unspent Transaction Output, representing a discrete amount of cryptocurrency that has been received but not yet spent, serving as an input for future transactions in Bitcoin and similar…...

Read More

The process of tracking, selecting, and optimizing the unspent transaction outputs (UTXOs) within a cryptocurrency wallet for effective transaction creation. UTXO management involves strategies for…...

Read More

A consensus approach that aggregates attestations from multiple independent validator subsets to improve throughput, fault tolerance, and security....

Read More

A network participant in PoS or similar consensus who proposes and attests to new blocks, ensuring the integrity and liveness of the blockchain....

Read More

An alternative term for Commission Rate, the fee charged by a validator for their services in securing the network....

Read More

A full node in a proof‑of‑stake network responsible for proposing and attesting to blocks, participating directly in consensus....

Read More

An oracle service operated by blockchain validators to provide high-trust data—such as randomness, time, or cross-chain headers—to smart contracts....

Read More

Pooled staking services where multiple participants delegate tokens to a shared validator node or operator to earn staking rewards collectively....

Read More

A waiting line or backlog of validators that have staked the required assets but are not yet active in the consensus process of a proof-of-stake blockchain, due to protocol-enforced limits on how…...

Read More

The group of active validators currently responsible for participating in the consensus process of a Proof-of-Stake (PoS) or other stake-based blockchain. This set is dynamic and can change over time…...

Read More

A cryptographic proof system that mathematically demonstrates the correctness of a computation without requiring verifiers to re-execute the entire computation. Validity proofs enable blockchain…...

Read More

A Layer 2 scaling solution that uses validity proofs (like ZK-SNARKs or ZK-STARKs) to ensure transaction integrity, similar to ZK-Rollups, but keeps transaction data off-chain rather than posting it…...

Read More

The specific benefits, utility functions, and unique advantages that a cryptocurrency token provides to its holders, distinguishing it from other digital assets and justifying its existence and…...

Read More

A blockchain address containing a custom pattern or prefix, generated by brute‑forcing keys until the desired pattern appears....

Read More

In blockchain-based derivatives protocols, variation margin refers to additional collateral that must be posted by traders to cover mark-to-market losses on open positions. This dynamic margin…...

Read More

An automated investment algorithm implemented through smart contracts that governs how a DeFi vault allocates, manages, and optimizes deposited assets to generate returns. Vault strategies encompass…...

Read More

A financial mechanism that creates yield-generating tokens representing Bitcoin deposits in DeFi protocols, enabling BTC holders to earn returns through lending, liquidity provision, or other…...

Read More

VDF

Abbreviation for Verifiable Delay Function. A function that requires a specific amount of sequential time to compute, with an efficiently verifiable output....

Read More

A blockchain consensus exploit where an attacker leverages timing differences between nodes to execute a double-spend by creating one block for network propagation and a conflicting block held in…...

Read More

A decentralized autonomous organization that implements vote-escrowed governance mechanics, where voting power and protocol benefits scale with both the quantity of tokens locked and the duration of…...

Read More

A modular framework for developing decentralized identity applications across blockchain platforms and devices, enabling verifiable credential issuance, verification, and management through a…...

Read More

The process and set of technical functionalities that enable a digital wallet, such as a Self-Sovereign Identity (SSI) wallet or an appropriately enhanced cryptocurrency wallet, to securely store,…...

Read More

A crucial property of blockchain systems, especially pertinent for Layer 2 (L2) scaling solutions like optimistic rollups and ZK-rollups. It ensures that all the data necessary to independently…...

Read More

A system, frequently implemented on a blockchain or other distributed ledger technology (DLT), designed for the registration, updating, and querying of data in such a way that the integrity,…...

Read More

A cryptographic function that takes a specific amount of sequential time to compute, even on parallel hardware, but produces a unique output that can be quickly and publicly verified as correct....

Read More

In the context of Verifiable Credentials (VCs) and Self-Sovereign Identity (SSI) systems, a Verifiable Presentation (VP) is a data object created by a 'holder' of one or more VCs. The VP is used to…...

Read More

A Verifiable Random Function (VRF) is a cryptographic primitive that allows a party (the prover, holding a secret key) to compute a pseudorandom output based on an input value, and simultaneously…...

Read More

A standardized specification within a Decentralized Identifier (DID) document that describes how to cryptographically verify assertions or controls made by the DID subject, including public keys,…...

Read More

A smart contract deployed on a blockchain that is specifically programmed to perform cryptographic verification of proofs submitted to it. These proofs can include Zero-Knowledge Proofs (e.g., zk-…...

Read More

A rollup architecture where transaction validity proofs are generated and verified entirely within the Layer 2 network, reducing on-chain verification workload on Layer 1....

Read More

A vector-commitment based merkle tree variant that enables much smaller and faster proofs for large state trees by committing entire node value vectors rather than individual child hashes....

Read More

A process in cryptocurrency projects where tokens allocated to certain stakeholders (like founders, team members, advisors, or early investors) are locked up for a specified period and gradually…...

Read More

The specific timeline and rules that govern how locked tokens are released to stakeholders over time as part of a vesting agreement. It details the duration of the lock-up, any initial cliff period,…...

Read More

A Solidity function modifier indicating the function does not modify state, allowing it to be executed locally without a transaction....

Read More

A cryptographic key used in privacy-preserving protocols to decrypt and view shielded transaction details such as amounts and participants without granting spending authority....

Read More

A software emulation of a computing environment that executes bytecode instructions in a deterministic, sandboxed context....

Read More

Specifications defining instruction sets, execution models, gas accounting, and integration interfaces for blockchain virtual machines (e.g., EVM, eWASM) to ensure cross-client consistency....

Read More

A social engineering attack conducted via voice calls, where attackers impersonate trusted entities to deceive victims into revealing sensitive information or transferring funds....

Read More

Integrated hardware and software solutions combining computer vision with blockchain logging to automatically detect, verify, and record physical items or events on-chain....

Read More

A strategy that exploits predictable price oscillations within defined upper and lower bounds, buying near support and selling near resistance levels....

Read More