Blockchain Technology — Web3 Glossary
381 terms • Part of the Cointegrity Web3 Glossary
- 51% Attack Protection — 51% Attack Protection refers to the security mechanisms and consensus design principles implemented...
- Accidental Fork — An Accidental Fork is a temporary, unintentional split in a blockchain that occurs when two or more...
- Account Model — The Account Model is a state management approach where blockchains maintain a ledger of account...
- Adaptive Information Dispersal Algorithm (Harmony) — The Adaptive Information Dispersal Algorithm (AIDA) is a network optimization protocol developed by...
- Adaptive State Sharding (Elrond Network) — Adaptive State Sharding is a comprehensive sharding solution implemented by the Elrond Network...
- Aeternity Blockchain — Aeternity is a blockchain platform designed to combine hybrid consensus mechanisms with state...
- AI Agents — AI Agents are autonomous software systems powered by artificial intelligence that can perceive...
- AI-Optimized Blockchain Scalability — AI-optimized blockchain scalability applies machine learning algorithms to predict transaction...
- Algorand — Algorand is a pure Proof of Stake blockchain platform engineered to solve the blockchain...
- Anatoly Yakovenko — Anatoly Yakovenko is an American software engineer and the founder of Solana, a high-performance...
- AppChains — AppChains are application-specific blockchains designed and optimized for a single decentralized...
- Application Blockchain Interface (ABCI) — The Application Blockchain Interface is a technical specification that defines how a blockchain...
- Aptos — Aptos is a Layer-1 blockchain built by former Meta engineers using the Move programming language,...
- ASIC-Resistant — ASIC-resistant refers to a cryptocurrency mining algorithm intentionally designed to resist...
- ASIC-resistant Algorithms — ASIC-resistant algorithms are mining functions deliberately engineered to prevent specialized...
- Asset Tokenization — Asset tokenization is the process of converting ownership rights or claims on physical assets,...
- Asynchronous Byzantine Fault Tolerance (ABFT) — Asynchronous Byzantine Fault Tolerance represents the highest security standard for distributed...
- Avail — Avail is a standalone data availability blockchain originally incubated within Polygon that...
- Availability and Validity — Availability and Validity is a consensus mechanism used in the Polkadot network to ensure that...
- Avalanche — Avalanche is a high-performance blockchain platform engineered to achieve sub-second finality while...
- Avalanche Virtual Machine (AVM) — The Avalanche Virtual Machine is the execution environment native to the Avalanche blockchain's...
- Babylon — Babylon is a Bitcoin staking protocol that enables Bitcoin holders to stake their BTC to secure...
- Base Fee — The base fee is a mandatory component of transaction costs on Ethereum, introduced by the EIP-1559...
- Based Rollups — Based Rollups are Layer 2 solutions where transaction sequencing is performed directly by Ethereum...
- Beam — Beam is a gaming-focused blockchain built on Avalanche's subnet technology, engineered specifically...
- Berachain — Berachain is an EVM-compatible Layer-1 blockchain that introduces Proof-of-Liquidity (PoL), a novel...
- Binance Smart Chain (BSC) — Binance Smart Chain is a blockchain network developed by Binance that operates in parallel to the...
- Bitcoin (BTC) — Bitcoin is the first and most prominent cryptocurrency, created in 2009 by an anonymous individual...
- Bitcoin Block Header — A Bitcoin block header is a 80-byte data structure that serves as the unique identifier and...
- Bitcoin DeFi — Decentralized finance applications built on Bitcoin or using Bitcoin as a foundational asset,...
- Bitcoin Genesis Block — The Bitcoin Genesis Block, designated as Block 0, represents the first block of the Bitcoin...
- Bitcoin Improvement Proposal (BIP) — A Bitcoin Improvement Proposal is a formal, standardized document used to propose new features,...
- Bitcoin L2 — Bitcoin Layer-2 solutions are scaling protocols built on top of Bitcoin that enable faster...
- Bitcoin Next Generation (Bitcoin-NG) — Bitcoin-NG is a blockchain protocol design that addresses Bitcoin's scalability limitations by...
- Bitcoin NFTs — Bitcoin NFTs are non-fungible digital assets created and secured on the Bitcoin blockchain through...
- Bitcoin Pizza Day — Bitcoin Pizza Day commemorates May 22, 2010, when programmer Laszlo Hanyecz made the first...
- Bitcoin Transaction Locktime — Locktime is a parameter in Bitcoin transactions that specifies the earliest time or block height at...
- Bitcoin Whitepaper — The Bitcoin Whitepaper, officially titled "Bitcoin: A Peer-to-Peer Electronic Cash System," is the...
- BitVM — BitVM is a computational paradigm proposed by researcher Robin Linus that enables verification of...
- Blind Signatures — Blind Signatures are digital signature schemes where a signer creates a cryptographic signature on...
- Block — A block is a fundamental data structure in blockchain technology that contains a collection of...
- Block Reward — The total compensation awarded to miners (in PoW) or validators (in PoS) for successfully producing...
- Blockchain — A distributed digital ledger technology that maintains a continuously growing list of transaction...
- Blockchain 1.0 — Blockchain 1.0 refers to the first generation of blockchain technology, primarily exemplified by...
- Blockchain as Service Provider — A Blockchain-as-a-Service (BaaS) provider is a company that delivers managed blockchain...
- Blockchain Interoperability — Blockchain interoperability refers to the technical capability of different blockchain networks to...
- Blockchain Oracles — Blockchain oracles are specialized services that bridge the gap between blockchains and external...
- Blockchain Pruning — Blockchain pruning is the process of selectively deleting old, unnecessary transaction data from...
- Blockchain Transmission Protocol (BTP) — Blockchain Transmission Protocol is a standardized framework designed to enable seamless...
- Blockchain-AI Integration — Blockchain-AI integration represents the convergence of decentralized ledger technology with...
- Blockchain-as-a-Service (BaaS) — Blockchain-as-a-Service is a cloud-based service model that enables organizations to build, host,...
- Blockchain-Based Big Data — Blockchain-based big data refers to the vast, structured, and immutable datasets generated through...
- Blockchain-Secured AI Training Data — Blockchain-secured AI training data refers to datasets used for machine learning model development...
- BNB Beacon Chain — The BNB Beacon Chain is the original blockchain layer within the BNB ecosystem, launched by Binance...
- Boneh-Lynn-Shacham (BLS) Signature — BLS signatures are a cryptographic signature scheme based on elliptic curve pairings that enable...
- BRC-20 — BRC-20 is an experimental token standard that enables the creation of fungible tokens on the...
- Breaking — Breaking refers to a critical failure event where a blockchain splits into two distinct,...
- Bridge Validators — Bridge validators are network participants responsible for verifying and facilitating cross-chain...
- Bulletproofs — Bulletproofs are a zero-knowledge proof protocol designed to efficiently prove that a committed...
- Byzantine Fault Tolerance — Byzantine Fault Tolerance (BFT) is a property of distributed systems that enables them to reach...
- Byzantine Fault Tolerance Delegate Proof of Stake (BFT-DPoS) — BFT-DPoS combines Delegated Proof of Stake governance with Byzantine Fault Tolerance consensus...
- Byzantine Generals Problem — The Byzantine Generals Problem is a foundational distributed systems challenge where geographically...
- Candidate Block — A candidate block is a block that a miner or validator has constructed and is actively attempting...
- Cardano — Cardano is a third-generation blockchain platform distinguished by its foundation in peer-reviewed...
- Casper — Casper is a research project that developed the Proof of Stake consensus mechanism adopted by...
- Celestia — Celestia is a modular blockchain network that decouples data availability and consensus from...
- Celo — Celo is a mobile-first blockchain platform that makes financial tools accessible to anyone with a...
- Central Ledger — A central ledger is a single, authoritative record-keeping system where one entity maintains the...
- Centralized — Centralized systems concentrate decision-making authority and control in a single entity or small...
- Chain Reorganization — Chain reorganization, or reorg, occurs when a blockchain client discovers a new chain of blocks...
- Chain Split — A chain split occurs when a blockchain network experiences a permanent divergence in its...
- Chaincode — Chaincode is the term for smart contracts within the Hyperledger Fabric blockchain framework. It...
- Change — In blockchains employing the Unspent Transaction Output (UTXO) model, change refers to the unspent...
- Charlie Lee — Charlie Lee is an American computer scientist and the creator of Litecoin, one of the earliest and...
- Chunk — In the NEAR Protocol, a chunk is a discrete unit of state and transaction data belonging to a...
- CoinJoin — CoinJoin is a privacy-enhancing technique that consolidates multiple transactions from different...
- Coinless Protocol — A Coinless Protocol is a blockchain or distributed ledger system designed to operate without a...
- Commitment Schemes — Commitment schemes are cryptographic protocols enabling one party to commit to a value while...
- Confidential Transactions — Confidential transactions are a cryptographic method that hides the amounts being transferred in a...
- Consensus Algorithms — Consensus algorithms are distributed protocols enabling decentralized networks of independent...
- Consensus Mechanisms — Consensus mechanisms are the protocols and algorithms that enable distributed networks to reach...
- Consortium Blockchains — Consortium blockchains are semi-private, permissioned networks where consensus mechanisms are...
- Constantinople Fork — The Constantinople Fork was a significant hard fork of the Ethereum network executed on February...
- Contract Interaction Patterns — Contract interaction patterns are standardized architectural approaches for enabling smart...
- Contract Upgradability — Contract upgradability encompasses mechanisms that allow smart contracts to be modified, improved,...
- Coordinator — A Coordinator is a specialized, centralized node or service that operates within otherwise...
- Cosmos — Cosmos is an ecosystem of independent, sovereign blockchains designed to interoperate seamlessly...
- Cosmos IBC — The Inter-Blockchain Communication (IBC) protocol is a standardized messaging framework that allows...
- Cosmos SDK — The Cosmos SDK is an open-source framework that dramatically simplifies the process of building...
- Crash the Blockchain — Crash the blockchain is an informal, often tongue-in-cheek expression describing situations where...
- Cronos — Cronos is an EVM-compatible blockchain developed by Crypto.com that enables developers to port...
- Cross-chain Technology — Cross-chain technology comprises protocols, standards, and architectural approaches that enable...
- Cross-Consensus Message Format (XCM) — The Cross-Consensus Message Format is a standardized messaging protocol developed by Polkadot that...
- Cross-Contract Communication — Cross-contract communication refers to the mechanisms and patterns that enable one smart contract...
- Crosslink — A crosslink is a reference embedded in the Ethereum Beacon Chain that connects to and confirms the...
- Cryptographic Hash Function — A cryptographic hash function is a mathematical algorithm that transforms input data of any size...
- Cryptography — The mathematical science of securing information through encoding and decryption techniques,...
- DAO — Decentralized Autonomous Organization—an organization governed by rules encoded in smart contracts...
- Data — Data in blockchain contexts refers to the complete set of information stored, processed, and...
- Data Availability — Data Availability (DA) is the guarantee that all historical transaction data and blockchain state...
- Data Integrity — The property of data being accurate, consistent, and unaltered from its original state throughout...
- Data Verification — The process of confirming that data recorded on or submitted to a blockchain is accurate,...
- Decentralization — Decentralization is the core architectural principle of blockchain technology that distributes...
- Decentralized AI — Decentralized AI refers to artificial intelligence systems built on distributed ledger technology...
- Decentralized Applications (dApps) — Decentralized applications, or dApps, are software applications built on blockchain networks or...
- Decentralized Sequencing — An approach to Layer 2 transaction ordering that distributes the role of sequencing among multiple...
- Decoy Transactions — Decoy transactions are dummy or fake transactions intentionally broadcast alongside genuine...
- DePIN (Decentralized Physical Infrastructure Networks) — Decentralized Physical Infrastructure Networks (DePIN) are blockchain-based systems that leverage...
- Deployment Strategies — Deployment strategies encompass the various methods and approaches for releasing smart contracts to...
- Diamond Standard (EIP-2535) — The Diamond Standard, formalized as EIP-2535, is a smart contract architecture pattern that...
- Difficulty Bomb — A difficulty bomb is a mechanism programmed into the Ethereum protocol that exponentially increases...
- Directed Acrylic Graph — This term appears to be a typo for Directed Acyclic Graph (DAG). DAG is a data structure used as an...
- Directed Graph — A directed graph is a mathematical structure composed of vertices (nodes) connected by edges that...
- Distributed Ledger Technology — Distributed Ledger Technology refers to a decentralized digital system for recording transactions...
- Distributed Network — A distributed network spreads data processing and storage across multiple independent nodes rather...
- Distributed Systems — Computer systems in which components located on networked computers communicate and coordinate...
- Eco-Friendly NFTs — Eco-friendly NFTs are digital collectibles created and traded on energy-efficient blockchain...
- Economic Abstraction — Economic abstraction represents an architectural paradigm where blockchain users can pay...
- Economic Security — Economic security measures the cost required to attack, compromise, or takeover a blockchain...
- Ecosystem Tokens — Ecosystem tokens serve as the native currency and primary utility token within specific blockchain...
- EIP — An Ethereum Improvement Proposal (EIP) is a standardized design document that proposes new...
- EIP-1559 — EIP-1559 is a significant Ethereum upgrade that fundamentally restructured the network's...
- Encrypted Mempools — Encrypted mempools are transaction pools where pending transactions remain encrypted until they is...
- Enterprise Blockchain — Enterprise blockchain refers to the application of blockchain technology within organizational and...
- Enterprise Blokchain — This appears to be a typo for Enterprise Blockchain. Enterprise blockchain refers to the...
- Erasure Encoding — Erasure encoding is a data redundancy technique that divides original data into smaller fragments,...
- ERC — ERC stands for Ethereum Request for Comments, a formal process for proposing and documenting...
- Error Handling Patterns — Error handling patterns in smart contracts are design approaches for gracefully managing failures,...
- Ethash — Ethash is the memory-hard proof-of-work algorithm that secured Ethereum from its genesis in 2015...
- Ethereum — Ethereum is a decentralized blockchain platform that extends cryptocurrency functionality to enable...
- Ethereum (ETH) — Ethereum is a decentralized blockchain platform that extends cryptocurrency functionality through...
- Ethereum 1.x — Ethereum 1.x represents a series of incremental upgrades and maintenance improvements to the...
- Ethereum 2.0 — Ethereum 2.0 was the original umbrella term for a comprehensive set of upgrades transforming...
- Ethereum Launch — Ethereum officially launched on July 30, 2015, with the mining of its genesis block, establishing...
- Ethereum Layer 2 — A category of scaling networks built on top of Ethereum that inherit its security while processing...
- Ethereum Proof of Stake Transition — The Merge, executed on September 15, 2022, represented Ethereum's transition from proof-of-work...
- Ethereum Transaction — An Ethereum transaction is an action initiated by an externally-owned account (a user-controlled...
- Ethereum Virtual Machine (EVM) — The Ethereum Virtual Machine is a sandboxed runtime environment that executes smart contract...
- EVM Compatibility — EVM compatibility refers to a blockchain's ability to support and execute smart contracts written...
- EVM Equivalence — A property of a Layer 2 blockchain or alternative network describing full, byte-for-byte...
- Execution Client — An execution client is software that manages the computational layer of a blockchain network,...
- Execution Environment — An execution environment encompasses the complete computational infrastructure and protocols that...
- Factory Contracts — Factory contracts are smart contracts specifically designed to deploy and manage multiple instances...
- Failover Protection — Failover protection consists of automated systems that detect node failures or performance...
- Fantom — Fantom is a high-performance blockchain platform utilizing a Directed Acyclic Graph (DAG) consensus...
- Fast Byzantine Fault Tolerance (FBFT) — Fast Byzantine Fault Tolerance is an optimized consensus algorithm that improves upon Practical...
- Federated Blockchain — A federated blockchain is a permissioned distributed ledger where governance and validation...
- Federated Byzantine Agreement (FBA) — Federated Byzantine Agreement is a consensus mechanism where each network node independently...
- Fee Market Dynamics — Fee market dynamics describe the economic mechanisms that determine transaction costs on blockchain...
- Finality — Finality is the cryptographic and consensus-level guarantee that once a transaction has been...
- Firedancer — Firedancer is a high-performance validator client for the Solana blockchain developed by Jump...
- First Bitcoin Transaction — The first Bitcoin transaction between two distinct users occurred on January 12, 2009, when Satoshi...
- Flow — Flow is a blockchain designed by Dapper Labs, creators of CryptoKitties, specifically built to...
- Fork — A change to a blockchain protocol's rules that results in either a temporary divergence in the...
- Fork-Choice Algorithm — A fork-choice algorithm is the set of deterministic rules that blockchain clients use to select...
- Full Node — A full node is a computer that independently downloads, stores, and validates the complete...
- Fungible — Fungibility is a property of assets where individual units are completely interchangeable,...
- Fungible Tokenization — Fungible tokenization is the process of converting assets or rights into digital tokens where each...
- Gas — Gas refers to the computational fees required to execute transactions and smart contract operations...
- Gas Fees — The fee paid to validators or miners for processing and including a transaction in a block on...
- Gas Optimization Techniques — Gas optimization techniques encompass programming practices and architectural strategies that...
- Gas Price — Gas price represents the amount of ether (ETH) a user willingly pays per unit of computational...
- Gas Wars — Gas wars occur when multiple users or applications simultaneously compete for blockchain...
- Gavin Wood — Gavin Wood is a British computer scientist and one of Ethereum's co-founders who played a crucial...
- Genesis Block — The genesis block is the first block in any blockchain, containing the initial set of transactions...
- Greedy Heaviest Observed Subtree — The GHOST protocol is a consensus mechanism variation of the longest-chain rule that Ethereum...
- Gwei — Gwei is a denomination of Ethereum's native currency (ETH) equal to one billionth of an ETH...
- Hard Fork — A hard fork is a fundamental and permanent change to a blockchain's protocol rules that creates two...
- Hard Fork Combinator — The Hard Fork Combinator is a specialized technical framework developed for the Cardano blockchain...
- Harmony — Harmony is a blockchain platform designed to facilitate the creation and use of decentralized...
- Hash — The fixed-length output produced by applying a cryptographic hash function to data of any size—a...
- Hash Rate — The total computational power being contributed to a proof-of-work blockchain network by all...
- Hashgraph — Hashgraph is a patented distributed ledger technology that uses a Directed Acyclic Graph (DAG)...
- Hashing — Hashing is a cryptographic process that converts input data of any size into a fixed-length...
- Hedera Hashgraph — Hedera Hashgraph is a distributed ledger technology that replaces traditional blockchain...
- High Performance — A design philosophy and engineering priority in blockchain development focused on maximizing...
- High Performance Blockchain — A blockchain network architected from the ground up to maximize transaction throughput and minimize...
- Holochain — Holochain is a framework for building fully distributed, peer-to-peer applications where each...
- Hub (Cosmos) — The Hub is the central blockchain within the Cosmos network architecture that serves as a router,...
- Hybrid Blockchains — A Hybrid Blockchain is a distributed ledger system that selectively combines transparency and...
- Hyperledger — Hyperledger is an umbrella project of open-source blockchains and related tools hosted by the Linux...
- Hyperliquid — Hyperliquid is a high-performance Layer-1 blockchain purpose-built for derivatives trading,...
- Ice Age — The Ice Age, also called the difficulty bomb, is a mechanism built into Ethereum's protocol that...
- Immutability — Immutability is a fundamental property of blockchain technology where data recorded on the ledger...
- Immutable Contract Patterns — Immutable contract patterns refer to design architectures and coding approaches that create smart...
- Immutable Deployed Code Problem — The Immutable Deployed Code Problem is a critical vulnerability in smart contract development where...
- Index (Ethereum) — An index is a data structure that organizes and catalogs blockchain data to enable rapid querying...
- Injective — Injective is a Cosmos-based Layer-1 blockchain engineered specifically for finance and derivatives...
- Inscriptions — Inscriptions are digital content—including images, text, audio, HTML, software, or any other...
- InterChain — InterChain refers to the vision and infrastructure enabling multiple independent blockchains to...
- Interchain Security — Interchain security is a security model where multiple blockchain networks share cryptographic...
- Interchain Standards — Interchain standards are technical specifications and protocol frameworks that establish common...
- Internet Computer (ICP) — Internet Computer is a blockchain network developed by the DFINITY Foundation that aims to extend...
- Interoperability Protocols — Interoperability protocols are specialized blockchain systems or middleware layers engineered to...
- IoTeX — IoTeX is a blockchain platform specifically architected for Internet of Things (IoT) applications,...
- Joseph Lubin — Joseph Lubin is a Canadian blockchain entrepreneur and one of Ethereum's co-founders who has been...
- Keccak-256 — Keccak-256 is the cryptographic hash function used throughout the Ethereum protocol for generating...
- Kusama — Kusama operates as a "canary network" for Polkadot, functioning as a real-world testing environment...
- L1 (Layer 1) — Layer 1 refers to the primary, foundational blockchain protocol that independently processes,...
- Lachesis — Lachesis is an asynchronous Byzantine Fault Tolerant consensus protocol developed by Fantom...
- Last Irreversible Block — The Last Irreversible Block (LIB) is the most recent block in a blockchain that has achieved...
- Layer 0 — Layer 0 represents the foundational infrastructure upon which blockchain networks are built. It...
- Layer 2 Scaling Solutions — Layer 2 solutions are protocols built on top of existing Layer 1 blockchains that process...
- Layer 3 — Layer 3 refers to application-specific blockchains or validity rollups built on top of Layer 2...
- Layer-1 Blockchain — A Layer-1 blockchain is the foundational settlement layer of a blockchain ecosystem responsible for...
- Leaf Node — A leaf node is a terminal node in a Merkle Tree that sits at the lowest level and directly contains...
- LevelDB — LevelDB is a lightweight, open-source key-value database library developed by Google, designed for...
- Light Node — A Light Node is a lightweight blockchain client that validates transactions and maintains network...
- Load Balancers — Load balancers are infrastructure components that distribute incoming network traffic and...
- Mainnet — A mainnet is the primary, live, and fully operational blockchain network where transactions settle...
- Mainnet Swap — A mainnet swap is the process of migrating a project's token from a temporary or placeholder...
- Master Node — A master node is a specialized node on a blockchain network that performs enhanced functions beyond...
- Maximal Extractable Value (MEV) — Maximal Extractable Value refers to the maximum profit that validators, miners, or other block...
- Mempool — The mempool, or memory pool, is a temporary storage area in blockchain networks where unconfirmed...
- Mempool Monitoring — Mempool monitoring is the practice of observing the mempool—the network layer where unconfirmed...
- Merged Mining — Merged mining is a technique allowing miners to simultaneously mine two or more blockchains that...
- Merkle proof — A Merkle proof is a cryptographic technique that allows someone to efficiently prove that a...
- Merkle Tree Verification — Merkle tree verification is a cryptographic technique embedded in smart contracts that efficiently...
- Message call — A message call is an internal transaction-like operation within the Ethereum Virtual Machine where...
- MetaBlockchain — A MetaBlockchain is a recursive blockchain infrastructure that allows developers to create entirely...
- Metadata Privacy — Metadata privacy refers to the protection of transaction-associated information including...
- Mimblewimble — Mimblewimble is a blockchain protocol designed to enhance privacy and scalability by implementing...
- MimbleWimble — MimbleWimble is an alternative blockchain protocol design that fundamentally reimagines transaction...
- Mina Protocol — Mina Protocol is a lightweight blockchain designed to maintain a constant size of approximately 22...
- Minimal Proxy Pattern — The minimal proxy pattern is a gas-efficient contract deployment technique that creates lightweight...
- Mining Algorithm — A mining algorithm is the specific cryptographic hash function or computational puzzle that miners...
- Mining Difficulty — Mining difficulty is a dynamically adjusting parameter in proof-of-work blockchains that controls...
- Minting — The process of creating new tokens or digital assets on a blockchain network through various...
- Model Context Protocol (MCP) — The Model Context Protocol is an open standard that enables applications to provide consistent...
- Modular Blockchain Architecture — Modular blockchain architecture is a design philosophy that decouples core blockchain...
- Modular Blockchains — Modular blockchains are blockchain architectures that decompose traditional monolithic blockchain...
- Modular Contract Design — Modular contract design is an architectural approach that breaks complex smart contract...
- Monad — Monad is a high-performance Ethereum Virtual Machine-compatible Layer 1 blockchain engineered to...
- Monitoring Services — Monitoring services are specialized tools and platforms that continuously observe blockchain...
- Moonbeam — Moonbeam is an Ethereum-compatible smart contract platform built as a parachain on Polkadot that...
- Multi-chain — Multi-chain architecture refers to the strategic deployment of applications, liquidity, and...
- Multi-signature Wallets — Multi-signature wallets are security-enhanced cryptocurrency wallets that require multiple private...
- Nakamoto Consensus — Nakamoto Consensus is the foundational agreement mechanism that secures Bitcoin and combines Proof...
- Near Protocol — Near Protocol is a developer-friendly blockchain platform that uses sharding technology called...
- NEP-141 — NEP-141 is the fungible token standard for the NEAR Protocol blockchain, providing a simple and...
- Nested Blockchain — A nested blockchain is a blockchain architecture where a secondary blockchain (child chain)...
- Network Performance — The aggregate measure of a blockchain network's operational capabilities across key metrics...
- Network Security — The set of practices, protocols, and mechanisms that protect a blockchain network from attacks,...
- NFT Standards — NFT standards are technical specifications that establish how non-fungible tokens operate and...
- Node — A node is a computer that participates in a blockchain network by storing, validating, and relaying...
- Non-Compliant Transaction — A non-compliant transaction is one that violates the pre-defined rules or authorization protocols...
- Nonce — A nonce is a "number used once" that miners in Proof-of-Work systems repeatedly modify to find a...
- Nounce — This term is likely a typo for 'Nonce'. A Nonce (Number only used once) is a number added to a...
- Oblivious Transfer — Oblivious Transfer is a foundational cryptographic protocol where a sender possesses multiple...
- Off-Chain — Off-chain refers to transactions, computations, or data interactions that occur outside the main...
- Off-Chain Transaction — An off-chain transaction is a value transfer that occurs outside the main blockchain network, with...
- Ommer Block — An ommer block, also known as an "uncle block," is a valid block that was mined or validated but...
- On-Chain — On-chain refers to any transaction, smart contract execution, or data record that is directly...
- On-chain Analytics — The discipline of analyzing publicly available blockchain transaction data to derive insights about...
- On-chain Forensics — On-chain forensics is the detailed technical and analytical examination of blockchain transaction...
- Optimistic Verification — A security model in which the correctness of a computation, state transition, or claim is assumed...
- Ordinals — Ordinals is a protocol that enables the immutable inscription of arbitrary data—including images,...
- Orphan Block — An orphan block is a valid block that has been successfully mined and meets all protocol...
- Parachain — A sovereign blockchain running in parallel to the Polkadot or Kusama relay chain, connected to it...
- Parachain Consensus — Parachain consensus refers to the security model in the Polkadot ecosystem where individual...
- Parallel EVM — Parallel EVM implementations are blockchain execution environments that process multiple...
- Parallelization — Parallelization is a blockchain scalability technique that processes multiple transactions or smart...
- Parathreads — Parathreads are a flexible participation model in the Polkadot ecosystem that allows projects to...
- Participant — A participant in a blockchain network is any individual, organization, computer node, or smart...
- Participation Nodes — Participation nodes are computing devices that form the operational backbone of blockchain networks...
- PBS — Proposer-Builder Separation, an architectural design for Ethereum block production that separates...
- Pegged Sidechains — Pegged sidechains are parallel blockchains connected to a main blockchain (mainchain) through a...
- Permissioned Ledger — A permissioned ledger is a distributed ledger system that restricts access and participation to a...
- Permissionlessness — Permissionlessness is the fundamental property of public blockchains where any individual or entity...
- Physical Proof Systems — Physical proof systems are cryptographic mechanisms that verify the existence, deployment, and...
- Polkadot — Polkadot is a multi-chain blockchain platform that enables different blockchains, called...
- Polkadot Parachains — Polkadot parachains are independent blockchains that connect to and derive security from the...
- PoS — Proof of Stake (PoS) is a consensus mechanism that secures blockchain networks by having validators...
- PoS/PoW Hybrid — A PoS/PoW hybrid is a consensus mechanism that combines elements of both Proof of Work and Proof of...
- Pre-Bitcoin Digital Currencies — Pre-Bitcoin digital currencies encompass the conceptual frameworks and technological innovations...
- Preconfirmations — Preconfirmations are fast, economically-secured transaction confirmations provided before a...
- Predictive Analytics for Blockchain — Predictive analytics for blockchain applies artificial intelligence, machine learning, and...
- Privacy-enhancing Technologies — Privacy-enhancing technologies (PETs) are advanced cryptographic and computational techniques that...
- Probabilistic Finality — Probabilistic finality is a consensus property where transactions become progressively more final...
- Proof of Activity — Proof of Activity is a hybrid consensus mechanism that combines Proof of Work and Proof of Stake to...
- Proof of Liquidity — A novel consensus mechanism introduced by Berachain in which validators must provide liquidity to...
- Proof of Stake (PoS) — Proof of Stake is a consensus mechanism where validators replace miners and are selected to create...
- Proof of Validation (PoV) — Proof of Validation is a consensus mechanism where staked validator nodes achieve agreement on the...
- Proof of Work (PoW) — Proof of Work is a consensus mechanism that secures blockchain networks by requiring miners to...
- Proof-of-Immutability (PoIM) — Proof-of-Immutability is a blockchain system architecture designed to guarantee data permanence and...
- Protocol — A set of rules and standards that govern how a blockchain network operates, including consensus...
- Protocol Governance — The mechanisms and processes through which decisions about changes to a blockchain protocol or DeFi...
- Protocol Layer — The protocol layer is the foundational computational level of a blockchain network that defines the...
- Provenance — Provenance in blockchain refers to the complete, verifiable history and origin of a digital asset...
- Proxy Patterns — Proxy patterns are design patterns in smart contract development that separate a contract's logic...
- Public Key Cryptography — Public key cryptography is a fundamental cryptographic system that uses mathematically linked pairs...
- Public Ledger — A public ledger is a distributed database that records all transactions and account balances in a...
- Pure Proof of Stake (PPoS) — Pure Proof of Stake is a consensus mechanism that selects validators to propose and confirm blocks...
- Quantum-Proof — Quantum-proof cryptography refers to cryptographic algorithms designed to resist attacks from both...
- Quantum-resistant Encryption — Quantum-resistant encryption encompasses cryptographic algorithms designed to remain secure against...
- Randomness — Randomness is a critical component in proof-of-stake blockchains that ensures fair validator...
- Real-time Blockchain — A blockchain architecture designed to achieve sub-second or near-instantaneous transaction...
- Receipt (Ethereum) — A receipt in Ethereum is a data structure returned by the Ethereum client immediately after a...
- Recursive Length Prefix (RLP) — Recursive Length Prefix is the standardized encoding scheme used throughout Ethereum to serialize...
- Relay Chains — Relay chains are central coordinating blockchains within hierarchical multi-chain architectures...
- Replicated Ledger — A replicated ledger is a complete or partial copy of a distributed ledger maintained by multiple...
- Resharding — Resharding is the dynamic process of repartitioning a sharded blockchain network to rebalance load...
- Retargeting — Retargeting, also called difficulty adjustment, is the automated process that adjusts mining...
- Ring Signatures — Ring signatures are a cryptographic technique that allows any member of a group to create a digital...
- Runes — Runes is a fungible token protocol for Bitcoin designed by Ordinals creator Casey Rodarmor as a...
- Sandwich Complexity Model — The sandwich complexity model is a design philosophy in Ethereum protocol development that...
- Satoshi — A satoshi is the smallest unit of Bitcoin, representing exactly 0.00000001 BTC or one hundred...
- Satoshi Nakamoto — Satoshi Nakamoto is the pseudonymous creator or creator collective responsible for developing...
- Scalability — Scalability refers to a blockchain network's capacity to process increasing transaction volumes and...
- Scaling Problem — The scaling problem describes blockchains' inherent difficulty processing high transaction volumes...
- Schnorr Signatures — Schnorr signatures are a cryptographic digital signature scheme celebrated for their mathematical...
- Script — A script is a small program or list of instructions embedded directly within a cryptocurrency...
- Second-Layer Solutions — Protocols and networks built on top of base blockchains (Layer 1) designed to improve transaction...
- Secure Multi-Party Computation (SMPC) — Secure multi-party computation is a cryptographic protocol that allows multiple independent parties...
- SegWit — Segregated Witness is a Bitcoin protocol upgrade that was activated in August 2017 to address...
- Sei — Sei is a Layer-1 blockchain specifically optimized for trading applications, featuring...
- Serenity (Ethereum) — Serenity was the original development codename for Ethereum's major upgrade roadmap, which...
- Shard Chain — A shard chain is one of multiple parallel blockchain segments created through sharding, a scaling...
- Sharding — Sharding is a Layer-1 scaling technique that partitions a blockchain network into smaller, parallel...
- Shared Security — A model in which the economic security of one established blockchain network is extended to secure...
- Shyft Network — Shyft Network is a blockchain-native compliance infrastructure platform that embeds identity...
- Sky Mavis — Sky Mavis is a Vietnamese game development studio founded in 2018 that pioneered the play-to-earn...
- Slashing — Slashing is a penalty mechanism in proof-of-stake consensus networks designed to discourage...
- Slot (Ethereum) — A slot is a fixed 12-second time interval in Ethereum's Proof of Stake consensus mechanism. During...
- Smart Contract Platforms — Smart contract platforms are blockchain networks specifically architected to support the creation,...
- Smart Contracts — Smart contracts are self-executing digital agreements where terms and conditions are written...
- Snapshot — A snapshot is a cryptographic record of the complete state of a blockchain at a specific block...
- Soft Fork — A soft fork is a backward-compatible protocol upgrade that tightens consensus rules or adds new...
- Solana — Solana is a high-performance blockchain platform engineered to process transactions at exceptional...
- Solana Labs — Solana Labs is the core development team and company behind the Solana blockchain, a...
- Solidity — Solidity is a high-level programming language designed specifically for writing smart contracts on...
- SPL Token — SPL Token is the standard interface for creating fungible and non-fungible tokens on the Solana...
- Spoon (Blockchain) — A blockchain fork where a new cryptocurrency is created by inheriting the account balances and...
- Stacks (STX) — Stacks is a Bitcoin Layer-2 solution that brings programmable smart contracts and decentralized...
- Stale Block — A stale block is a valid block that has been successfully mined and meets all protocol...
- State Machines — State machines are programming patterns that model smart contract behavior as discrete states and...
- State Transition Function — A state transition function is the deterministic set of rules that governs how a blockchain's state...
- Stealth Addresses — Stealth addresses are a privacy mechanism that generates unique, unlinkable addresses for each...
- Storage Layout Optimization — Storage layout optimization involves strategically organizing smart contract state variables to...
- Substrate — Substrate is a modular, open-source framework developed by Parity Technologies for building custom...
- Sui — Sui is a Layer-1 blockchain designed for global adoption, featuring a novel object-centric data...
- Supermajority (Ethereum) — In Ethereum's Proof of Stake consensus protocol, a supermajority represents at least two-thirds of...
- Sustainable Blockchain — Sustainable blockchain refers to blockchain networks designed with environmental responsibility as...
- Sybil Resistance — A system property describing its ability to prevent or detect Sybil attacks, in which a single...
- Taiko — Taiko is a Layer-2 rollup network pioneering the "based rollup" model, where transaction sequencing...
- Tamper-Proof Ledger — A tamper-proof ledger is a record-keeping system where each transaction or entry is...
- Tangle — The Tangle is a distributed ledger technology developed by the IOTA Foundation that replaces the...
- Taproot — Taproot is a major Bitcoin protocol upgrade that was activated on November 16, 2021, substantially...
- Tendermint — Tendermint is a modular blockchain software stack consisting of two primary components: Tendermint...
- Tendermint Core Byzantine Fault Tolerance (BFT) — Tendermint Core Byzantine Fault Tolerance is a consensus engine that combines Proof of Stake with...
- Testnet — A testnet is a parallel blockchain network designed for development, experimentation, and...
- Tezos — Tezos is a self-amending blockchain platform with on-chain governance mechanisms that allow the...
- The Merge (Ethereum) — The Merge was Ethereum's historic protocol upgrade completed on September 15, 2022, which...
- Throughput — Throughput refers to the maximum number of transactions a blockchain network can process and...
- Time-based Attacks — Time-based attacks exploit blockchain systems that depend on timestamp accuracy or time-sensitive...
- Timestamping — Timestamping is the process of cryptographically recording the exact time at which a transaction or...
- Tokenization Standards — Tokenization standards are technical specifications and protocols that define how tokens function,...
- Tokenless Ledger — A type of distributed ledger technology that operates and maintains consensus without requiring a...
- TON (The Open Network) — TON is a Layer-1 blockchain that originated from Telegram's internal blockchain research and...
- TPS — TPS, or Transactions Per Second, measures a blockchain network's throughput—the maximum number of...
- Traceability — Traceability is the ability to track the complete history, origin, location, and application of an...
- Trading-focused Blockchain — A blockchain designed from the ground up with the specific requirements of high-performance...
- Transaction — A signed instruction broadcast to a blockchain network that records the transfer of value or...
- Transaction Block — A data structure within a blockchain that bundles multiple transactions together into a single...
- Transaction Ordering — The process by which validators, miners, or sequencers determine the sequence in which pending...
- Transaction Privacy — The degree to which the details of blockchain transactions—sender identity, recipient identity,...
- Transactions Unconfirmed — Unconfirmed transactions are digital transfers of value that have been broadcast to a blockchain...
- TRC-20 — TRC-20 is the token standard for the TRON blockchain that specifies how fungible tokens are...
- Trusting Stamping Authority — A decentralized, blockchain-based authority that provides cryptographic timestamping services to...
- Txn Hash — A Transaction Hash (Txn Hash) is a unique cryptographic identifier generated for every transaction...
- Unbonding Period — An unbonding period is a mandatory lockup duration in proof-of-stake networks between when a...
- Unpermissioned Ledger — An unpermissioned ledger is a distributed blockchain that anyone can join, validate transactions,...
- UTXO Model — Unspent Transaction Output—the accounting model used by Bitcoin, Litecoin, Cardano, and other...
- Validator Client — The software that a blockchain validator runs to participate in the network's consensus process,...
- Validator Nodes — Validator nodes are computers operated by network participants who actively participate in...
- Verifiable Random Function — A Verifiable Random Function (VRF) is a cryptographic primitive that generates random-looking...
- Vitalik Buterin — Vitalik Buterin is a Russian-Canadian programmer and blockchain researcher who co-founded Ethereum...
- Wallets and Security — Cryptocurrency wallets are software or hardware systems that store private keys, which are...
- Zero Address (Ethereum) — The zero address, represented as 0x0000000000000000000000000000000000000000, is a special address...
- Zero-Knowledge Proofs — Zero-knowledge proofs are cryptographic protocols that enable one party to mathematically prove the...
- zk-SNARKs — Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge are cryptographic proofs that allow...
Browse all 2,000+ Web3 terms or speak to a consultant for expert guidance.