Skip to content

Latest commit

 

History

History
63 lines (62 loc) · 20 KB

reference_terms_glossary.md

File metadata and controls

63 lines (62 loc) · 20 KB

SCRF: Glossary

Tag Term Definition Source Link
Algorithmic Stablecoin Algorithmic stablecoins are cryptocurrencies designed to achieve price stability and balance the circulating supply of the asset with demand (usually pegged to a reserve price). Source
anonymity Anonymity “Anonymous” is if no one knows who you are. Source
arbitrage-bots Arbitrage Bots Trading bots are computer programs that algorithmically buy and sell various cryptocurrencies at the right time with the goal of generating a profit. Arbitrage bots are a specific subset of trading bots that structure trades to take advantage of different prices for a single asset either across different trading pairs or on different trading platforms. Source
Audits Generally speaking, an audit is an independent assessment of a project seen through the lens of a particular concern. Examples of these concerns include code correctness, security, compliance, economics, etc. Source
amm Automated Market Makers Decentralized exchanges that implement liquidity pools of trading pairs rather than a centralized orderbook. Source
Block Rewards The reward given to miners for successfully solving a cryptographic problem at each block in a Proof-of-Work blockchain system. Source
Bonding Curves A linear or non-linear function that relates the price of a token algorithmically to its supply. Source
bft Byzantine Fault Tolerance Byzantine Fault Tolerance is the characteristic which defines a system that tolerates the class of failures that belong to the Byzantine Generals’ Problem Source
chain-reorg-attacks Chain Reorganization Chain reorganisations happen when a node on the blockchain network realizes that what it thought was the canonical chain turned out not to be. When this happens, the transactions in the latter part of its chain (i.e. the most recent transactions) are reverted and rather the transactions in the newer replacement are executed. Source
consensus Consensus Consensus is a group decision-making process in which group members develop, and agree to support a particular decision (e.g. the one in the best interest of the whole or the most valid decision). Source
cfmm Constant Function Market Maker Automated market makers that use a fixed formula to relate price to reserve balances. Source
Constant Mean Markets A generalization of a constant product market maker which allows for more than 2 assets and where the reserves of each asset can be weighted in arbitrary other methods than simply 50/50. Source
constant-product Constant Product Markets Automated market makers that use a formula of the form x*y=k where k is constant to relate price to reserve balances, e.g. Uniswap. Source
Correct-By-Construction Casper CBC Casper is a family of ""correct-by-construction"" consensus protocols that share the same proof of asynchronous, Byzantine fault tolerant consensus safety. Source
dao DAO Decentralized Autonomous Organization. A public and permissionless organization that is governed programmatically and is not under the control of a single entity. Source
dex Decentralized Exchange A platform for exchanging asset pairs that is not under the control of a single entity and is generally implemented using a smart contract, allowing users to trade with each other or with the protocol directly without requiring a trusted third party. Source
defi DeFi A collective term for public financial products and services that are accessible built on top of smart contract based blockchain systems and are not under the control of a single entity. Source
derivatives Derivatives A derivative is a contract between two or more parties whose value is based on an agreed-upon underlying financial asset (like a security) or set of assets (like an index). Source
eip1559 EIP-1559 A particular improvement proposal to the Ethereum blockchain that implements a moving base fee in accordance with demand and gas usage. Source
ethereum Ethereum Ethereum is a decentralized blockchain which implements automated smart contracts in a payment and transaction oriented architecture. Source
flash-loans Flash Loans Flash loans are loans issued on a smart-contract based blockchain that require no capital from the borrower and are allowed to be paid back in the same block, allowing users to instantaneously perform arbitrage trades without significant capital investment. Source
formal-verification Formal Verification Formal verification is essentially concerned with identifying the correctness of hardware and software design operation.
Fraud Proofs A fraud proof is a way to prove that a blockchain tip is invalid. Source
front-running Front-Running Entering into an equity trade, options or futures contracts with advance knowledge of a block transaction that will influence the price of the underlying security to capitalize on the trade. Source
game-theory Game Theory Game theory is the study of the ways in which interacting choices of economic agents produce outcomes with respect to the preferences (or utilities) of those agents, where the outcomes in question might have been intended by none of the agents. Source
Gas Costs Gas refers to the unit that measures the amount of computational effort required to execute specific operations on the Ethereum network. Since each Ethereum transaction requires computational resources to execute, each transaction requires a fee. Gas refers to the fee required to successfully conduct a transaction on Ethereum. Source
governance Governance The problem area for answering who can make decisions, how they are made, and who is accountable for a given system. Source
interoperability Interoperability Interoperability refers to the basic ability of computerized systems to connect and communicate with one another readily, even if they were developed by widely different manufacturers in different industries. In cryptonetworks, this generally refers to between different blockchain systems. Source
iot Internet of Things Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. Source
layer-2 Layer 2 Layer 2 is a collective term for solutions designed to help scale applications by handling transactions off the main chain (layer 1). Source
mev Miner Extractable Value Value that is extractable by miners directly from smart contracts as cryptocurrency profits. Source
mining Mining Mining is the process of verifying cryptocurrency transactions and recording them in the public blockchain ledger. Those who have the required hardware and computing power are called miners. Source
Multi-Signature Multisignature wallets (or multisig, for short), are cryptocurrency wallets that require two or more private keys to sign and send a transaction. The storage method requires multiple cryptographic signatures (a private key’s unique fingerprint) to access the wallet. Source
network-security Network Security Blockchain network security is a comprehensive risk management system for a blockchain network, using cybersecurity frameworks, assurance services and best practices to reduce risks against attacks and fraud. Source
non-fungible Non-Fungible Non-fungible assets are unique, indivisible, and not interchangeable. Source
On-Chain Governance On-chain governance refers to the system for managing control and development of a blockchain-based network. This encompasses methods for collecting information, structuring incentives, collecting signal from ecosystem participants, and ultimately acheiving consensus (usually voting) on decisions. Source
Optimistic Optimism refers to transaction schemes that use Optimisitic Rollups. I.e. they rely on using fraud proofs to prevent invalid state transitions from happening. In simple terms, if there was a dispute about the result of a transaction that modifies a user's ETH balance, the user would try to replay that exact transaction on Ethereum to demonstrate the correct result there. Source
oracles Oracles Oracles are smart contract structures that deliver off-chain information to on-chain systems. Source
payment-channel Payment Channel A Payment Channel is class of techniques designed to allow users to make multiple payment transaction, namely on Bitcoin, without commiting all of the transactions to the Bitcoin block chain. In a typical payment channel, only two transactions are added to the blockchain but a nearly unlimted number of payments can be made between the participants off-chain. Source
Plasma An architecture which frames all blockchain calculation into a community of MapReduce structures, plus an additional way to execute Proof-of-Stake token linkage ahead of pre-existing blockchains, with the conception that Nakamoto Consensus Drivers disincline block restraint, guaranteed by implementing a smart contract on the root blockchain using the Proof-of-Fraud method. Source
post-mortem Post-Mortem A retrospective analysis of events that have taken place in the cryptocurrency and cryptonetwork space.
privacy Privacy “Private” is if what you purchased, and for what amount, are unknown. Source
proof-of-reserve Proof-of-Reserve A definitive proof regarding the amount of monetary value held in a given account or wallet. Source
proof-of-stake Proof of Stake Proof of stake is a type of consensus mechanism used by blockchain networks to achieve distributed consensus where users stake their assets to become a validator in the network. Validators are responsible for the same thing as miners in proof-of-work: ordering transactions and creating new blocks so that all nodes can agree on the state of the network. Source
proof-of-work Proof of Work Proof-of-work is the underlying algorithm that sets the difficulty and rules for the work miners do. Mining is the ""work"" itself. It's the act of adding valid blocks to the chain. This is important because the chain's length helps the network spot the valid chain and understand the chain's current state. The more ""work"" done, the longer the chain, and the higher the block number, the more certain the network can be of the current state of things Source
quantum-computing Quantum Computing Quantum computer are quantum bits or qubits (CUE-bits) which can store information in quantum form (superposition of multiple states). Source
Randomness Beacons A cryptographic beacon (also known as a randomness beacon) is a service that provides a public source of randomness. Source
regulatory Regulatory Refers to regulatory topics, policies, and bodies.
rollups Rollups Rollups are solutions that perform transaction execution outside layer 1, but post transaction data on layer 1 and inherit the security properties of the layer 1 chain. Source
scalability Scalability Scalability is the measure of a system’s ability to increase or decrease in performance and cost in response to changes in application and system processing demands. In cryptonetworks, this refers to how transaction costs grow relative to increased size and usage of the network. Source
schelling-point Schelling Point The ability of actors to coordinate their behavior even when not able to communicate. Coordinative solutions in games which are arrived at more often than theory would predict. Source
securitization Securities Securities are fungible and tradable financial instruments used to raise capital in public and private markets. Source
simulation Simulation Computer simulation is a program that is run on a computer and that uses step-by-step methods to explore the approximate behavior of a mathematical model Source
Sidechain Sidechains are emerging mechanisms that allow tokens and other digital assets from one blockchain to be securely used in a separate blockchain and then be moved back to the original blockchain if needed. Source
staking-derivatives Staking Derivatives Derivative products linked to either the amount of stake deposited by a user into a protocol and/or the staking rewards distributed by the protocol to network participants. Source
sybil-protection Sybil Protection Protection against an attack where where a node in a network illegitimately claims multiple identities. Source
testing Testing Software testing is an investigation conducted to provide stakeholders with information about the quality of the product or service under test. Source
Verifiable Delay Functions A verifiable delay function (VDF) is a function f : X → Y that takes a prescribed time to compute, even on a parallel computer. However once computed, the output can be quickly verified by anyone. Moreover, every input x ∈ X must have a unique valid output y ∈ Y. Source
zero-knowledge Zero Knowledge Proofs An indirect proof of a public statement where the indirect proof leaks no sensitive details and has the property that trurth of the indirect proof means the direct proof is also true. Source