Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Ethereum’s native peer‑to‑peer networking protocol that handles peer discovery, message routing, and sub‑protocol multiplexing....

Read More

An Ethereum Improvement Proposal (EIP-2535) that standardizes a modular smart contract system allowing contracts to be upgraded incrementally and have virtually no size limit. It uses a central proxy…...

Read More

A decentralized authentication mechanism that enables users to prove control of a Decentralized Identifier (DID) through cryptographic challenge-response protocols without relying on centralized…...

Read More

The entity or system that has the authority to make changes to a Decentralized Identifier (DID) Document, including updating authentication keys, service endpoints, and verification methods. DID…...

Read More

A machine-readable document containing metadata associated with a Decentralized Identifier (DID), specifying verification methods, service endpoints, and controller information that enables…...

Read More

A specific implementation specification that defines how Decentralized Identifiers are created, resolved, updated, and deactivated within a particular distributed system or network. DID Methods…...

Read More

A software component that translates a Decentralized Identifier (DID) into its corresponding DID Document by implementing the resolution procedures specified by the relevant DID Method. Resolvers…...

Read More

A mathematical framework applied to blockchain data analysis that adds calibrated noise to query results, providing provable privacy guarantees while maintaining statistical utility for legitimate…...

Read More

A network‑wide parameter that adjusts how hard it is to find a valid proof‑of‑work hash, ensuring blocks are produced at a roughly constant rate....

Read More

A mechanism in blockchain protocols that automatically calibrates the mining difficulty based on observed network hash rate to maintain consistent block production intervals. Difficulty adjustment…...

Read More

Another term for Target Hash in Proof-of-Work (PoW) mining. It refers to the specific numerical threshold that a block hash must be below for the block to be valid. The network adjusts this target to…...

Read More

Any digitally stored value, right, or property tracked on a blockchain or distributed ledger that can be uniquely identified, owned, transferred, and verified without requiring a central authority....

Read More

A regulated entity that holds and safeguards digital assets on behalf of clients, offering security, compliance, and insurance services....

Read More

Laws and guidelines governing how service providers must store, secure, and manage clients’ digital assets (cryptocurrencies, tokens) to ensure consumer protection and system integrity. These…...

Read More

A tokenized debt instrument issued on a blockchain representing a loan obligation with fixed interest and maturity, offering increased transparency, fractional ownership, and automated settlement....

Read More

An electronic document used to prove the ownership of a public key and verify the identity of an individual, server, or other entity. Digital certificates are issued by trusted third parties called…...

Read More

An ownership stake in a company or project represented by tokens on a blockchain, conferring rights such as dividends, voting, or profit share. Digital equity instruments mirror traditional shares…...

Read More

The property of certain digital assets that makes them provably limited in supply and resistant to duplication or counterfeiting. Blockchain technology enables digital scarcity by solving the double-…...

Read More

A blockchain token or instrument that represents an investment contract, share, or debt—subject to securities laws—providing rights such as profit share, dividends, or governance....

Read More

A mathematical scheme for verifying the authenticity of digital messages or documents. In blockchain systems, digital signatures prove ownership of a private key without revealing the key itself,…...

Read More

A Federal Information Processing Standard for digital signatures that enables authentication, non-repudiation, and integrity verification of digital messages or documents. DSA uses public-key…...

Read More

A digital replica of a physical asset, process, or system—recorded on a blockchain—to enable real‑time monitoring, simulation, and lifecycle management....

Read More

A secure digital storage system specifically designed to protect sensitive cryptocurrency information such as private keys, seed phrases, and authentication credentials. Digital vaults employ…...

Read More

A data structure consisting of vertices and directed edges where information flows in one direction without cycles, used in some blockchain systems as an alternative to linear chains of blocks. DAGs…...

Read More

A storage system that combines multiple disk drives into a single logical unit for redundancy, performance, and capacity (e.g., RAID configurations)....

Read More

On‑chain and off‑chain processes—such as arbitration, mediation, or governance votes—designed to resolve conflicts over transactions, smart contract outcomes, or governance proposals....

Read More

A digital system for recording transactions and related data in multiple places simultaneously. Unlike traditional databases, distributed ledgers have no central data store or administration…...

Read More

A lightweight, portable unit of software packaging that bundles an application and its dependencies in an isolated user‑space environment, ensuring consistent execution across platforms....

Read More

A verifiable credential binding a blockchain identity (DID or address) to a domain name, enabling trustable on‑chain proofs of domain ownership....

Read More

The practice of registering domain names—often similar to established brands or projects—with the intent to profit from resale or to mislead users....

Read More

A decentralized network providing distributed denial‑of‑service (DDoS) mitigation by routing traffic through a mesh of nodes that filter and absorb attack traffic....

Read More

A fundamental challenge in digital currency systems where the same digital token could potentially be spent more than once if there's no mechanism to prevent copying or duplication. Solving the…...

Read More

Abbreviation for Delegated Proof-of-Stake. A Proof-of-Stake variant where token holders elect a limited number of delegates to validate transactions and produce blocks....

Read More

dPoW is the acronym for Delayed Proof-of-Work, a security mechanism that protects smaller blockchains by periodically anchoring their state to a more secure blockchain with higher hash power. This…...

Read More

Low‑level programs that enable operating systems to communicate with hardware devices (e.g., GPUs, network cards), facilitating blockchain node performance and connectivity....

Read More

An economic framework where a blockchain protocol or application utilizes two distinct but complementary tokens with different functionalities, typically separating governance or investment value…...

Read More

A privacy attack where an adversary sends tiny amounts of cryptocurrency (dust) to many addresses, then tracks spending patterns to de‑anonymize users by linking addresses....

Read More

A sale mechanism where the price of tokens starts high and decreases at set intervals until all tokens are sold or a reserve price is reached, encouraging price discovery and fair allocation....

Read More

A security testing approach that examines smart contract behavior at runtime by executing transactions, fuzzing inputs, and monitoring for vulnerabilities under realistic conditions....

Read More

Non‑fungible tokens whose metadata or visual representation can change over time or in response to external inputs, events, or on‑chain conditions....

Read More

A programmable royalty mechanism for NFTs or digital assets where royalty rates can adjust over time or based on criteria such as resale price, volume, or holder actions....

Read More

A dynamic trait in a Non-Fungible Token (NFT) is an attribute or characteristic of the NFT that can change over time based on external conditions, interactions, or predefined logic within its smart…...

Read More

ECC (Error-Correcting Code) memory is a type of computer data storage that can detect and correct common kinds of internal data corruption. It is primarily used in servers, workstations, and critical…...

Read More

The concept that blockchain users can potentially pay transaction fees or operational costs in any asset with sufficient market liquidity rather than being restricted to using only the network's…...

Read More

Economic exploit modeling is the process of designing and analyzing models to identify and assess potential vulnerabilities in a system (especially DeFi protocols) that arise from an attacker…...

Read More

The design of rewards and penalties in a token ecosystem to align participant behavior with protocol objectives....

Read More

An economic security model refers to the framework of incentives, disincentives, costs, and rewards designed into a system (particularly decentralized networks like blockchains or DeFi protocols) to…...

Read More

The economic security of oracles refers to the mechanisms and incentives designed to ensure that oracle networks provide accurate and reliable data to smart contracts, primarily by making it…...

Read More

Edwards-curve Digital Signature Algorithm, a digital signature scheme based on twisted Edwards curves that offers high security, excellent performance, and resistance to common implementation…...

Read More

An edge device is a piece of hardware that sits at the periphery ("edge") of a larger network, typically where the physical world interacts with the digital world. These devices often collect data,…...

Read More