Fundamental cryptographic primitives and privacy mechanisms.
Commitment
Cryptographic value computed from hidden data (for example, amount and secrets). It lets others later verify that revealed data is consistent, without learning the data from the commitment itself.Used extensively in private transaction systems to hide values while proving correctness.
Note
Private record that represents ownership of some value plus the secrets needed to prove it. The note is usually stored off-chain or encrypted; on-chain you only see commitments, nullifiers and proofs.Core primitive in UTXO-style privacy systems like Zcash and Aztec.
Nullifier
Unique value derived from a note’s secret and revealed when the note is spent. The system stores used nullifiers to prevent double-spending without exposing which note belonged to which party.Essential for preventing double-spending in private transaction systems.
Stealth Address
An address generated per transaction so that multiple payments to the same party cannot be easily linked on-chain. The recipient publishes some public information once; senders use it to derive fresh, unlinkable addresses.See EIP-5564 for the Ethereum standard.
View Key
A cryptographic key that allows read-only access to encrypted state, like private balances or notes. It enables controlled visibility for auditors, regulators, or internal control functions.Critical for regulatory compliance in privacy-preserving systems.
JoinSplit
Circuit pattern that consumes one or more input notes (revealed via nullifiers) and produces one or more output notes (as new commitments). Enables private transfers, splits, and merges of value.Originally introduced in Zcash’s Sprout protocol.
Memo
Encrypted payload attached to a private transaction containing information the recipient needs (e.g., note details, amount, blinding factor). Only the intended recipient can decrypt it using their encryption key.Used to communicate transaction details in private payment systems.
Layer 2, data availability, and blockchain infrastructure concepts.
Data Availability (DA)
The guarantee that all transaction and state data needed to recompute and verify the system is actually published and retrievable. If DA fails, independent verifiers cannot reliably check state, even if proofs appear valid.Critical security property for rollups and Layer 2 systems.
Data Availability Layer (DA Layer)
A dedicated network or service that publishes and stores the data required for DA (for example, rollup or application data), separate from the main execution chain.Examples include Celestia, EigenDA, and Ethereum’s blob space.
Sequencer
Layer 2 operator that accepts transactions on a L2 network, orders them, and produces blocks or batches that are later finalized on Layer 1 (like Ethereum).Often the first point of censorship risk in L2 systems.
Prover
Entity that runs a specified computation on given inputs (public and private, like L2 state transitions, private notes, etc.) and outputs both the result and a cryptographic proof that it was computed correctly. Provers may see plaintext data, so who runs them and how they are operated is an explicit part of the trust and privacy model.May require significant computational resources for complex circuits.
Verifier
Entity (often a smart contract) that checks proofs from provers and decides whether to accept the claimed result (for example, a new state root or settlement outcome).Verification is typically much cheaper than proof generation.
Relayer
Third party that submits transactions on behalf of users to hide identity.Used in privacy-preserving protocols like Tornado Cash and Railgun.
Paymaster
ERC-4337 entity that defines how gas fees for user operations are paid or sponsored. It allows implementation of controlled gasless flows or internal fee routing.Enables better UX for private transaction systems.
Traditional finance concepts relevant to blockchain adoption.
DvP (Delivery vs Payment)
Atomic settlement ensuring asset delivery only if payment occurs.Core settlement pattern for securities transactions. See DvP Atomic Settlement approach.
PvP (Payment vs Payment)
Atomic exchange of two payment obligations.Used in foreign exchange settlement (CLS system).
TCA (Transaction Cost Analysis)
Post-trade analysis of execution quality and slippage.Important for demonstrating best execution.
Cryptographic techniques and privacy-enhancing technologies.
FHE (Fully Homomorphic Encryption)
Cryptographic technique allowing computation on encrypted data.Still largely impractical for most blockchain applications due to performance costs.
Zero-knowledge Proof
A proof that reveals no more information than the validity of the statement it supports.Core primitive for privacy-preserving blockchain systems.
SNARK/STARK
Zero-knowledge proof systems: Succinct Non-interactive Arguments of Knowledge (SNARK) and Scalable Transparent Arguments of Knowledge (STARK).SNARKs require trusted setup but have smaller proofs; STARKs avoid trusted setup but have larger proofs.
Co-SNARK
Collaborative zero-knowledge proofs where multiple parties jointly prove properties.Useful for multi-party computation scenarios.
Shielded Pool
Privacy mechanism using cryptographic commitments to hide transaction details.Originally introduced by Zcash; used in various privacy protocols.
Confidential Contract
Smart contract that operates on encrypted state while maintaining verifiability.Requires specialized execution environments or cryptographic techniques.
Circom/Groth16
Popular zero-knowledge proof system (Groth16) and domain-specific language (Circom) for writing ZK circuits.Widely used in production privacy protocols.
PLONK
Zero-knowledge proof system with universal trusted setup.More flexible than Groth16 for circuit updates.
TEE (Trusted Execution Environment)
Hardware-based secure computation environment.Examples include Intel SGX and ARM TrustZone. Involves hardware trust assumptions.
MPC (Multi-Party Computation)
Cryptographic technique for joint computation without revealing inputs.Used for distributed key generation and threshold signatures.
OPRF (Oblivious Pseudorandom Function)
Cryptographic protocol where a server evaluates a pseudorandom function on a client’s input without learning the input, and the client learns the output without learning the server’s key.Used for private set intersection, password-hardening, and privacy-preserving authentication.
vOPRF (Verifiable OPRF)
Extension of OPRF where the server provides a proof that the output was computed correctly using a committed key, preventing malicious servers from returning arbitrary values.View RFC 9497 →
Data bundled with a cryptographic proof of its own correctness, enabling portable and composable verifiable credentials.Enables privacy-preserving identity and credential systems.
Sybil Resistance
Preventing a single actor from creating multiple fake identities to gain disproportionate influence in systems that distribute value, votes, or access.Critical for fair resource allocation and governance.
DKIM (DomainKeys Identified Mail)
Email authentication standard where mail servers sign outgoing messages.Used in ZK email proofs for privacy-preserving identity verification.
ONCHAINID
Decentralized identity system used by ERC-3643 for KYC/eligibility verification.Supports compliant tokenized securities.
KYC/AML
Know Your Customer / Anti-Money Laundering regulatory compliance requirements.Required for most institutional financial services.
Attestations
Cryptographically signed claims about identities, credentials, or data that can be verified on-chain with minimal disclosure.See Pattern: Attestation Verifiable On-Chain for implementation approaches including EAS, W3C Verifiable Credentials, and ONCHAINID.
EAS (Ethereum Attestation Service)
One implementation of on-chain attestation protocol.See attestations pattern for holistic overview.
Crypto-Registry
Regulatory registry for digital asset compliance (eWpG requirement).Required for tokenized securities in Germany.
Merkle Tree
Cryptographic data structure for efficient membership proofs.Used extensively in blockchain systems and ZK circuits.
Key regulatory regimes governing digital assets and privacy.
eWpG
German Electronic Securities Act regulating tokenized securities.Learn more →
MiCA
EU Markets in Crypto-Assets regulation.Learn more →
GENIUS Act
US legislative framework for digital asset regulation.Still in development as of 2026.
SEC Rule 2a-7
US Securities and Exchange Commission rule governing money market funds, specifying liquidity requirements, portfolio quality, maturity limits, and conditions for liquidity fees and redemption gates.Learn more →
ESMA MMFR
EU regulation establishing rules for money market funds including daily/weekly maturity limits, stress testing obligations, and reporting to national competent authorities.European equivalent to SEC Rule 2a-7.