Glossary
Glossary
Anonymity Set
A quantitative metric representing the total number of transactions or entities within which a specific user is indistinguishable. A larger anonymity set increases the "probabilistic noise," making it mathematically infeasible for chain analysis tools to isolate a single participant's activity.
Append-Only Merkle Tree
A data structure used in shielded pools where new transaction commitments are added as leaves. The root of this tree represents the global state of the pool; by being "append-only," it ensures that spent notes are never deleted, preserving privacy by not revealing which leaf was accessed.
Arithmetization
The process of translating a high-level program into a mathematical representation (a constraint system) that a zero-knowledge proof system can process. This involves converting logic into polynomial equations.
Atomic Settlement
A transactional process where the transfer of assets and the update of the ledger happen simultaneously as a single, indivisible operation. This eliminates the "latency gap" and ensures that either both sides of a trade are executed or none at all.
Blinding Factor
A random secret value added to a commitment to ensure that identical transaction amounts do not result in identical hashes. This prevents observers from using pattern matching to guess the values within a shielded transaction.
CASP (Crypto-Asset Service Provider)
An entity authorized under MiCA to provide services such as the custody, administration, and exchange of crypto-assets on behalf of third parties.
Commitment Scheme
A cryptographic "envelope" that allows a user to commit to a specific value (e.g., a token amount) while keeping it hidden from others, with the ability to reveal or prove properties of that value later. Most shielded ledgers use a Merkle Tree of Commitments to manage the state of private assets.
Completeness
A fundamental property of ZKPs stating that if the statement is true and the prover is honest, the verifier will always be convinced of its validity.
Compliance-as-Code
An architectural approach where regulatory requirements (such as MiCA or MiFID II) and KYC/AML rules are embedded directly into the smart contract logic, ensuring that compliance is enforced automatically at the protocol level.
Constraint System
A set of mathematical equations (constraints) that define the rules of a specific computation. A prover must satisfy all constraints with their "witness" to generate a valid proof.
Correspondent Banking
A legacy model where banks provide services on behalf of another bank to facilitate cross-border transactions. This model is often slow and expensive due to multiple intermediaries and manual reconciliation.
Cryptographic Agility
An architectural design principle that allows a protocol to swap cryptographic primitives (e.g., signatures or hash functions) without re-engineering the entire system, ensuring long-term resilience against emerging threats.
Cryptographic Commitment
A fixed-size hash that "locks" a value (e.g., a token amount and owner) such that it cannot be changed, while keeping it hidden from the public. In a shielded ledger, unspent notes are stored as these opaque commitments.
Digital Passport (RWA)
A unique, blockchain-based record (typically an NFT or a specialized token) that contains the complete metadata of a physical asset, including refinery of origin, serial number, storage location, and audit history.
ERC-3643 (T-REX)
A technical standard for security tokens that integrates an identity layer (ONCHAINID). Unlike standard ERC-20 tokens, ERC-3643 allows issuers to enforce compliance rules, freeze assets, and manage whitelists on-chain.
EU DLT Pilot Regime
A regulatory "sandbox" established by the EU that allows financial institutions to test DLT-based market infrastructures for trading and settling transactions in financial instruments.
Financial Instrument (Tokenized)
A digital asset classified under MiFID II because it exhibits the characteristics of traditional securities (e.g., shares, bonds, or units in collective investment schemes), necessitating stricter regulatory compliance.
Fractional Ownership
The ability to own a small percentage of a high-value physical asset (e.g., 0.001 grams of a gold bar). Tokenization makes this possible by subdividing the digital representation of the asset into granular units.
FRI (Fast Reed-Solomon Interactive Oracle Proof)
The commitment scheme underlying STARKs. It relies only on hash functions, making it "transparent" (no trusted setup) and post-quantum secure, though it results in larger proof sizes.
Heuristic Analysis
An analytical method used by blockchain surveillance firms to link addresses and identities based on pattern recognition, such as transaction timing, UTXO "dust" behavior, or common-spending patterns.
Hybrid Token Structure
A token that combines multiple features, such as utility and investment characteristics. Under EU law, if a token possesses any financial instrument qualities, MiFID II classification generally takes precedence.
Invisible Ledger
A privacy-centric blockchain architecture where transactional data is cryptographically obscured (shielded) while the integrity and correctness of the state are maintained and verified through Zero-Knowledge Proofs.
ISO 20022
A modern international standard for financial messaging that provides a common language for payments data worldwide. It enables richer data exchange and improved interoperability between legacy banks and DLT networks.
KZG Commitment
A polynomial commitment scheme used in Groth16 and PLONK. It produces very small proofs and allows for constant-time verification but requires a trusted setup.
LBMA Gold (Good Delivery)
Gold bars that meet the stringent standards set by the London Bullion Market Association. This includes a guaranteed purity of at least 99.5%, sourcing from accredited refineries, and storage within a secure, continuous chain of custody.
Legal Wrapper
A legal structure (such as an SPV - Special Purpose Vehicle) designed to "wrap" a physical asset, ensuring the on-chain token has a direct and enforceable legal claim to the underlying off-chain value.
Liquidity Fragmentation
A scenario where capital is spread across multiple disparate systems, accounts, or jurisdictions, making it inefficient to manage. High-performance payment rails reduce fragmentation by enabling real-time global access to funds.
MiCA (Markets in Crypto-Assets)
The comprehensive EU regulatory framework governing crypto-assets that do not fall under existing financial services legislation. It sets rules for issuers of stablecoins, asset-referenced tokens, and service providers (CASPs).
MiFID II (Markets in Financial Instruments Directive)
The legislative framework used by the EU to regulate financial markets and instruments. If a token represents ownership, debt, or investment rights, it is often classified as a "financial instrument" under MiFID II rather than a crypto-asset under MiCA.
NetiRails
A specialized infrastructure layer and stablecoin-based suite designed for cross-border payments. It acts as a bridge between legacy ERP/banking systems and modern blockchain protocols to enable atomic settlement.
Nostro/Vostro Accounts
Legacy bank accounts held by one bank in another bank’s local currency to facilitate international trades. DLT-based on-demand liquidity reduces the need for these expensive pre-funded accounts.
Note (Shielded Note)
The basic unit of value in a shielded UTXO model, representing a specific amount of an asset. A note is defined by its value, owner's public key, and a unique blinding factor, all of which are hidden within a commitment.
Nullifiers
A unique, deterministic identifier revealed when a private "commitment" (asset) is spent. Nullifiers prevent the double-spending problem in zero-knowledge environments; they allow the protocol to track that a specific note has been consumed without revealing which note it was or the identity of the spender.
On-Chain Surveillance
The systematic monitoring and analysis of public blockchain data (account balances, transaction graphs, event logs) to de-anonymize users and map institutional strategies.
On-Demand Liquidity (ODL)
A financial service that utilizes digital assets (like stablecoins) to bridge two fiat currencies in real-time. This allows institutions to move funds instantly without the need for pre-funded correspondent banking relationships.
Payment Orchestration
An infrastructure layer that manages and directs the end-to-end flow of a payment across various protocols, banking systems, and DLT rails, ensuring optimized routing and automated compliance.
Physical Segregation
A security protocol ensuring that assets backing a token issuance are stored separately from the issuer's corporate assets, protecting investors in the event of the issuer’s bankruptcy.
Polynomial Commitment Scheme (PCS)
A fundamental cryptographic building block that allows a prover to "commit" to a polynomial without revealing it, and later prove specific evaluations of that polynomial to a verifier. Common schemes include KZG, IPA, and FRI.
Post-Quantum Cryptography (PQC)
Cryptographic algorithms designed to be secure against the computational power of quantum computers. PQC focuses on mathematical problems (e.g., lattice-based or hash-based) that remain intractable for Shor’s algorithm.
Privacy-Preserving Smart Contracts
Smart contracts that execute logic on encrypted state variables. By utilizing ZKPs or Trusted Execution Environments (TEEs) these contracts allow for private DeFi interactions (e.g. dark pools private lending) where the trade volume and user balance remain confidential from the public observer.
Proof of Reserve (PoR)
An automated verification mechanism (often powered by Chainlink) that provides real-time evidence that a digital asset's circulating supply is fully backed by off-chain reserves, eliminating the risk of over-issuance.
Prospectus Exemption
Legal provisions that allow issuers to offer securities (including tokenized ones) to the public without publishing a full prospectus, typically limited to "professional investors" or small-scale offerings.
Reconciliation Gap
The risk window in RWA systems where the on-chain digital record diverges from the actual physical inventory due to manual processes or delayed synchronization between vaults and the blockchain.
Recursive Proof Composition
An advanced technique where a zero-knowledge proof verifies another zero-knowledge proof. This allows for "compression" of massive amounts of data into a single proof, which is the cornerstone of zk-rollups and scalable blockchains.
Redemption Engine
A technical workflow that manages the transition from a digital "burn" (destroying the token) to the physical delivery of the underlying asset, ensuring liquidity and trust between the issuer and the investor.
Relayer Infrastructure
An abstraction layer that decouples the transaction sender from the on-chain gas payer. Relayers submit ZK-proofs to the network on behalf of the user preventing Metadata Leakage (such as IP addresses or gas-funding wallet links) that would otherwise compromise the user's anonymity.
Relayer Infrastructure
An abstraction layer that decouples the transaction sender from the on-chain gas payer. Relayers submit ZK-proofs to the network on behalf of the user, preventing Metadata Leakage (such as IP addresses or gas-funding wallet links) that would otherwise compromise the user's anonymity.
Secure Mint Architecture
A multi-layered technical framework that ensures digital tokens are only issued (minted) after a physical deposit is verified. This typically involves a "closed-loop" system connecting Vault Management Systems (VMS), Oracles, and Smart Contracts.
Settlement Risk
The danger that one party in a financial transaction will fulfill their obligation (e.g., send funds) while the counterparty fails to do so. Atomic settlement via DLT is designed specifically to neutralize this risk.
Shielded Transactions
A transaction primitive that utilizes asymmetric encryption and zero-knowledge proofs to obfuscate transactional metadata. Unlike transparent (pseudonymous) transactions, shielded transactions encrypt the transaction graph (sender/receiver) and the state (value), ensuring ledger integrity is maintained without exposing sensitive data to the public consensus layer.
Shielded UTXO Pool
A specialized smart contract architecture on a public blockchain that enables private value transfers. Within the pool, transaction amounts and participants are encrypted, but the contract can mathematically verify that no double-spending or unauthorized value creation occurs.
Shor’s Algorithm
A quantum algorithm capable of solving the discrete logarithm problem in polynomial time, effectively breaking standard public-key cryptography (RSA and Elliptic Curve). Its potential realization necessitates the migration to quantum-resistant blockchain architectures.
Soundness
A security property of ZKPs ensuring that if a statement is false, it is mathematically impossible (within a negligible probability) for a cheating prover to convince the verifier.
STARKs (Scalable Transparent Arguments of Knowledge)
A type of ZK proof system that does not require a Trusted Setup (making them "transparent") and relies on collision-resistant hash functions. This construction makes STARKs inherently post-quantum secure.
T+N Settlement (T+2, T+5)
A conventional settlement cycle where "T" is the transaction date and "N" is the number of days until the final transfer is completed. DLT aims to move the industry toward "T+0" or instant finality.
Toxic Waste
The sensitive private data generated during a "Trusted Setup" phase for certain SNARK systems (like Groth16). If not securely destroyed, this data can be exploited to forge proofs, compromising the entire protocol's integrity.
Verifiable Computation
A paradigm where a party offloads complex processing to an untrusted server and receives a ZK proof that the computation was executed correctly, eliminating the need for the requester to re-run the calculation.
Viewing Keys (Selective Disclosure Keys)
A hierarchical key structure (often divided into Incoming and Outgoing viewing keys) that allows for the decryption of transaction data without granting spending authority. These are the cornerstone of Compliance-Ready Privacy enabling users to provide read-only access to auditors or regulators for AML/KYC transparency.
Viewing Keys (Selective Disclosure Keys)
A hierarchical key structure (often divided into Incoming and Outgoing viewing keys) that allows for the decryption of transaction data without granting spending authority. These are the cornerstone of Compliance-Ready Privacy, enabling users to provide read-only access to auditors or regulators for AML/KYC transparency.
Whitelisting (On-Chain)
A technical compliance control where only verified addresses (those that have passed KYC/AML and eligibility checks) are permitted to hold or transfer specific regulated tokens.
Witness
The private piece of information (the secret) that the prover uses to satisfy the constraints of an arithmetic circuit. The goal of a ZKP is to prove knowledge of the witness without revealing it.
Zero-Knowledge Proofs (ZKP)
A cryptographic protocol that enables a Prover to demonstrate to a Verifier that a specific computational statement is valid (the witness) without revealing the underlying data. In "Invisible Ledger" architectures, ZKPs validate that a transaction adheres to protocol rules (e.g., non-negative values, valid signatures) without leaking plaintext information.
Zero-Trace Authentication (ZK-DID)
A decentralized identity protocol leveraging Zero-Knowledge Proofs (ZKPs) to allow selective disclosure of attributes without revealing underlying PII (Personally Identifiable Information). It is cryptographically unlinkable, preventing verifiers from correlating multiple proofs to the same identity.
zk-SNARK (Succinct Non-Interactive Argument of Knowledge)
A specific ZK construction optimized for blockchain environments. Its primary characteristics are: Succinctness: Proofs are only a few hundred bytes, regardless of the complexity of the underlying computation. Sub-linear Verification: Verification time is near-instant, allowing Resource-constrained environments (like the EVM) to validate private transactions at a low gas cost.