\u003C/p>\u003Cp>This means that it's a way to generate a hierarchical, tree-like account structure of private and public keys, starting from a single \"seed\" key (or master \u003Ca href=\"https://vault12.com/glossary/private-key/\">private key\u003C/a>). The advantage of using an HD wallet is that it allows you to generate a large number of separate accounts within a single wallet, and it’s easier to backup and restore your wallet. There is an improved version of this proposal, BIP44, that supports keys for multiple cryptocurrencies.\u003C/p>"},"name":"BIP32"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>\u003Ca href=\"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki\" rel=\"noopener noreferrer\" target=\"_blank\">BIP39 \u003C/a>is a standard for a mnemonic phrase (more widely known as “Seed phrase”) that is used to control a wallet.\u003C/p>\u003Cp>This means that it's a way to represent a wallet’s private key as a set of 12 or 24 words. The advantage of using a mnemonic phrase representation of a cryptographical private key is that it's easy for people to read it and write it down, which makes it easier to backup and recover your wallet.\u003C/p>"},"name":"BIP39"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>\u003Ca href=\"https://github.com/bitcoin/bips/blob/master/bip-0044.mediawiki\" rel=\"noopener noreferrer\" target=\"_blank\">BIP44 \u003C/a>is a Bitcoin improvement Proposal that built on BIP32 by extending standards for multi-coin wallet management. Not only Bitcoin supported, but almost all other cryptocurrencies, like Ethereum, Dogecoin, etc.\u003C/p>"},"name":"BIP44"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>\u003Ca href=\"https://bitcoin.org/bitcoin.pdf\" rel=\"noopener noreferrer\" target=\"_blank\">Bitcoin \u003C/a>is a digital currency that allows people to send and receive payments securely over the internet, and as such, it is a public currency protocol. It was created in 2009 by a person or group of people using the pseudonym \"Satoshi Nakamoto.\" Unlike traditional currencies, which are issued by governments, Bitcoin is decentralized, which means that it is not controlled by any single entity. Instead, it is executed by a network of computers that work together to verify and record transactions on a form of public ledger called a blockchain. The supply of Bitcoin is limited, and the currency can be bought and sold on online exchanges. Many people and institutions are attracted to Bitcoin because of its potential for high returns on investment, as well as its independence from governments and central banks.\u003C/p>"},"name":"Bitcoin"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A Bitcoin address is a unique string of characters that represents the destination of a Bitcoin payment. It is similar to an email address, but instead of being used to send and receive messages, a Bitcoin address is used to send and receive payments on the Bitcoin network. A Bitcoin address can be shared publicly, and anyone who knows the address can send payments to it. Bitcoin addresses are typically generated by a wallet software and are comprised of a string of letters and numbers. Depending on the protocol used to generate them, they typically begin with the number \"1\" (Legacy), \"3\" (Script), “bc1q” (SegWit), or \"bc1p\" (Taproot).\u003C/p>"},"name":"Bitcoin Address"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Bitcoin Core is a free, open-source software program that acts as the reference implementation of Bitcoin. Its nodes are distributed among many participants, and can be run by anyone on nearly any variety of computer. Bitcoin Core can download and verify the entire Bitcoin blockchain, verify transactions, operate a wallet, and/or mine bitcoin. \u003C/p>"},"name":"Bitcoin Core"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A Bitcoin Improvement Proposal (BIP) is a proposal for a change or an improvement to the Bitcoin network. It is a way for anyone to submit a bitcoin change proposal to the community for discussion and review. BIPs are typically submitted by Bitcoin developers. The process of reviewing and implementing BIPs is designed to be open and transparent, and it is overseen by a group of volunteers known as the Bitcoin Improvement Proposals Working Group. BIPs can include changes to the Bitcoin protocol, new features, and improvements to the user experience.\u003C/p>\u003Cp>Advanced: Details of all BIPs can be viewed in the GitHub repository \u003Ca href=\"https://github.com/bitcoin/bips\" target=\"_blank\">https://github.com/bitcoin/bips\u003C/a>.\u003C/p>"},"name":"Bitcoin Improvement Proposal (BIP)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Bitcoin Script is a simple programming language that is used to validate and control spending conditions for transactions on the Bitcoin network. For example, a script might specify that a certain number of signatures from a group of people are required in order to spend some Bitcoin (see “multisignature”), or that a payment can only be made if a certain condition is met. Newer types of Bitcoin Script such as Taproot extend its originally-simple functionality to include more-complex smart contracts, which are self-executing contracts with the terms of the agreement between buyer and seller directly written into lines of code.\u003C/p>"},"name":"Bitcoin Script"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>\u003Ca href=\"https://vault12.com/glossary/cold-storage/\">Cold storage\u003C/a> refers to the practice of storing Bitcoin or other cryptocurrencies in a way that is not connected directly to the internet. This is typically done for security reasons, as it reduces the risk of the cryptocurrencies being stolen by hackers. Cold storage can take many forms, such as storing the private keys for a cryptocurrency on a piece of paper or a hardware device that is not connected to the internet. Some people also use offline computers or \"air-gapped\" devices, which are not connected to the internet at all and are therefore considered more secure. Cold storage is typically used for long-term storage of cryptocurrencies, as opposed to hot wallets, which are connected to the internet and are used for more frequent transactions.\u003C/p>"},"name":"Cold Storage"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A cryptographic signature is a mathematical scheme that is used to verify the authenticity and integrity of a message or a piece of data. It is a way of signing a message with a digital key, which can be used to verify that the message was indeed sent by the person who claims to have sent it. Cryptographic signatures are an essential part of many cryptographic protocols, and they are used in a wide range of applications, including secure email communications, inter-device communication protocols, and blockchain technology. To create a cryptographic signature, a sender uses a secret key to generate a unique \"signature\" for the message. The signature is then attached to the message, and it can be verified by anyone who has the corresponding key. This allows recipients to verify that the message was indeed sent by the owner of the secret key, and has not been tampered with. In the world of blockchain and cryptocurrencies, a form of asymmetric encryption is used wherein the crypto owner maintains the secret encryption key and the corresponding key is not secret and may be shared with the public. \u003C/p>"},"name":"Cryptographic Signature"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A dApp, or decentralized application, is a type of software application that runs on a decentralized network, such as a blockchain. Unlike traditional applications, which are typically hosted on a single server or a group of servers, dApps are distributed across a network of computers, which means that they are not controlled by any single entity, they are executed collectively. This makes them more resistant to censorship and tampering, and allows them to operate in a decentralized and trustless manner. dApps can be built on top of various blockchain platforms, such as Ethereum, Polygon, and others, and they can be used for a wide range of purposes, including financial transactions, gaming, and social networking. Some popular examples of dApps include decentralized cryptocurrency exchanges and decentralized autonomous organizations (DAOs).\u003C/p>"},"name":"dApp"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Decentralized finance, or \"DeFi\", refers to financial systems that are built on top of public blockchain technologies. DeFi provides financial services and products such as loans, insurance, and investment opportunities without the need for traditional intermediaries, such as banks and financial institutions. DeFi allows users to access these services directly using smart contracts and other decentralized code. This allows for faster and cheaper transactions, and it also enables new types of financial products and services that were not previously possible. DeFi has the potential to revolutionize the way that finance works, and it attracts a growing number of users and investors seeking high returns and independence from traditional financial institutions.\u003C/p>"},"name":"Decentralized Finance (\"DeFi\")"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>The Elliptic Curve Digital Signature Algorithm (ECDSA) is a type of digital signature algorithm that is used to sign and verify messages. It is based on the mathematics of elliptic curves, which are curves that can be used to define a group of points that have certain mathematical properties. ECDSA is used in many cryptographic protocols, including the Bitcoin and Ethereum networks, and it is considered to be more secure and efficient than other digital signature algorithms. To create a digital signature with ECDSA, a sender uses their private key to generate a unique \"signature\" for the message. The signature is then attached to the message, and can be verified by anyone who has the corresponding public key. This allows recipients to verify that the message was indeed sent by the owner of the private key, and that it has not been tampered with.\u003C/p>"},"name":"Elliptic Curve Digital Signature Algorithm (ECDSA)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Encryption is a way of converting information into a secret code that can only be read by someone who knows a secret key to decrypt it. It is a fundamental technique in cryptography, which is the science of keeping information secure. Encryption is used to protect sensitive information such as credit card numbers, passwords, and military communications from unauthorized access. It is also used to verify the authenticity of a message or a piece of data, by generating a unique \"signature\" that can be verified by anyone who has the corresponding key. Encryption is a core feature of digital security systems.\u003C/p>"},"name":"Encryption"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Encryption keys are a crucial part of encryption, which is the process of converting information into a secret code. An encryption key is a piece of information that is used to encrypt and decrypt a message or a piece of data. It is a secret code that is used to scramble the original information in a way that can only be read by someone who knows the key. Encryption keys are a fundamental concept in cryptography, and there are many different encryption algorithms. The two main types of encryption are symmetric and asymmetric. Symmetric encryption uses the same key for encryption and decryption, and the biggest practical challenge with symmetric encryption is the need to securely and privately distribute the symmetric key to both parties (when originally deployed, and in the future, if the keys ever need to be changed). The other main type of encryption, asymmetric encryption, uses a set of two keys wherein one is secret and one is public. The primary form of asymmetric (private-public key) encryption used in modern blockchains and cryptocurrencies is the Elliptic Curve Digital Signature Algorithm (ECDSA).\u003C/p>"},"name":"Encryption Keys"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Ethereum is an open-source, decentralized blockchain platform that runs smart contracts: applications that execute automatically when the underlying conditions are met. This enables developers to create markets, store registries of debts or promises, move funds in accordance with instructions given in the past (like a will or a futures contract), all while reducing traditional counterparty risks. The project was bootstrapped in 2014 and is maintained by the Ethereum Foundation, a Swiss non-profit, with contributions from volunteers and institutional supporters. \u003C/p>"},"name":"Ethereum"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>An Ethereum Request for Comment (ERC) is a proposal for a new feature, improvement, or standard for the Ethereum blockchain (analogous to Bitcoin BIPs). It is a way to propose ideas for how to improve Ethereum to the Ethereum community for discussion and review. ERCs are typically submitted by Ethereum developers. The process of reviewing and implementing ERCs is designed to be open and transparent, and it is overseen by a group of volunteers known as the Ethereum Improvement Proposals Working Group (EIP WG). ERCs can cover a wide range of topics, including changes to the Ethereum protocol, new features, and improvements to the user experience. You can find ERCs here: \u003Ca href=\"https://eips.ethereum.org/erc\" target=\"_blank\">https://eips.ethereum.org/erc\u003C/a>.\u003C/p>"},"name":"Ethereum Request for Comment (ERC)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>An ERC-20 token is a type of digital asset that is built on the Ethereum blockchain. It is a standardized way of creating and issuing tokens, which are digital assets on the Ethereum network. ERC-20 tokens follow a specific set of rules, which makes it easy for developers to create and manage them, and for exchanges to support them. This has led to the widespread adoption of ERC-20 tokens, and there are now thousands of different tokens that follow the ERC-20 standard. ERC-20 tokens are commonly used to raise funds through initial coin offerings (ICOs), and they are also used to represent assets, such as digital collectibles and game items. The ERC-20 standard may be found here: \u003Ca href=\"https://ethereum.org/en/developers/docs/standards/tokens/erc-20/\" target=\"_blank\">https://ethereum.org/en/developers/docs/standards/tokens/erc-20/\u003C/a>.\u003Cbr/>\u003C/p>"},"name":"ERC-20 token"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>An ERC-721 token is a type of digital asset that is built on the Ethereum blockchain. Unlike ERC-20 tokens, ERC-721 tokens are Non-Fungible Tokens (NFTs), meaning that they are unique and not exactly the same as any other token of its kind. ERC-721 tokens are commonly used to represent unique assets, such as digital collectibles, art, and game items. They are also used to create decentralized marketplaces, where users can buy and sell unique assets. ERC-721 tokens were first introduced in 2017, and they have gained popularity due to their ability to represent a wide range of unique digital assets. The ERC-721 standard may be found here: \u003Ca href=\"https://ethereum.org/en/developers/docs/standards/tokens/erc-721/\" target=\"_blank\">https://ethereum.org/en/developers/docs/standards/tokens/erc-721/\u003C/a>.\u003C/p>"},"name":"ERC-721 token"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A \u003Ca href=\"https://vault12.com/glossary/hardware-wallet/\">hardware wallet\u003C/a> is a physical device that is used to store the private keys that control cryptocurrencies, such as Bitcoin and Ethereum. Hardware wallets are usually kept offline as cold storage, not connected to the internet, and therefore more secure than online wallets. Hardware wallets store the private keys for a cryptocurrency offline, in a secure environment that is protected by a PIN code and other security measures, making it very difficult for hackers to access or steal the keys. Hardware wallets are portable and relatively easy to use, and they are considered to be one of the most secure ways to store cryptocurrencies. Popular hardware wallets brands include Ledger, Trezor, and KeepKey. \u003C/p>"},"name":"Hardware Wallet"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Hash functions are used in many different applications, including blockchain technology and password security. A hash is a fixed-size string of characters that is created by applying a mathematical algorithm, known as a hash function, to a piece of data. The hash, then, is a unique \"fingerprint\" for the source data, and can be used to verify its integrity and authenticity. The same input will always produce the same output, and even a small change to the input will produce a completely different output. A hash data transformation is strictly one-way: while a given input will reliably product the same output hash, the output hash can not be used to identify anything about the input other than the simple fact that it produced the hash output. This makes it safe to distribute hashes of secret data without fear of exposing the secret data itself. \u003C/p>"},"name":"Hash & Hash Functions"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A hierarchical deterministic wallet, or HD wallet, is a type of cryptocurrency wallet that uses a system of keys to generate a large number of private and public keys from a single seed key. This is known as deterministic key generation, and it allows the wallet to be easily backed up and restored. An HD wallet also has a hierarchical structure, which means that the keys are organized into different levels or \"chains\" of keys. This allows the wallet to support multiple accounts and addresses, and it makes it easier to manage and organize the keys. HD wallets are commonly used for Bitcoin and other cryptocurrencies, and they are considered to be more secure and user-friendly than non-deterministic wallets. It is an industry standard described in BIP32 and BIP44.\u003C/p>"},"name":"Hierarchical Deterministic Wallet"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Hot and cold wallets are two different types of cryptocurrency wallets, which are used to store and manage digital assets, such as Bitcoin and Ethereum. A hot wallet is a wallet that is connected to the internet, and it is used for more frequent transactions. A cold wallet, on the other hand, is a wallet that is not connected to the internet, and it is used for long-term storage of cryptocurrencies. Due to their more-limited exposure to potentially bad actors, Cold wallets are more secure than hot wallets, being less vulnerable to hacking and other online threats. Hot wallets are more convenient to use, but they are also more susceptible to security risks. Many people use a combination of hot and cold wallets, depending on their needs and the amount of cryptocurrency that they are holding.\u003C/p>"},"name":"Hot and Cold Wallets"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>The Lightning Network is a layer 2 payment protocol that is built on top of the Bitcoin blockchain. It is a way of enabling faster and cheaper transactions on the Bitcoin network by using a network of payment channels that are off-chain (executing outside of the main blockchain). The Lightning Network allows users to open a payment channel with one or more other users, and to perform many transactions between them without having to broadcast each transaction to the blockchain. This allows for faster and cheaper transactions, as there are fewer blockchain fees and confirmations. The Lightning Network also has the potential to enable new types of applications and use cases for Bitcoin, such as instant micropayments and cross-chain atomic swaps.\u003C/p>"},"name":"Lightning Network"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A Merkle tree, also known as a hash tree, is a type of data structure that is used in cryptography and blockchain technology. It is a tree-like data structure that allows for the efficient and secure verification of large amounts of data. A Merkle tree is constructed by taking a group of data items and calculating the hash, or the \"fingerprint,\" of each item. These hashes are then grouped together to form new hashes, and this process is repeated until there is only one hash left, known as the root hash. This root hash serves as a unique \"fingerprint\" for the entire data set, and it can be used to verify the integrity of the entire data structure. \u003C/p>"},"name":"Merkle Tree (aka Hash Tree)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Miniscript is a high-level programming language that is used to write Bitcoin smart contracts. It is a simplified version of the Bitcoin Script language, which is the native programming language of the Bitcoin network. Miniscript allows developers to write smart contracts in a more readable and easier-to-understand format. Miniscript also includes a number of features, such as type checking and static analysis, that make it easier to write correct and secure smart contracts. The use of Miniscript has grown in popularity in recent years, and it is now supported by many different Bitcoin wallets and other tools.\u003Cbr/>\u003C/p>"},"name":"Miniscript"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Multi-party computation, or MPC, is a type of cryptographic protocol that allows a group of parties to compute a shared function without revealing their inputs to each other. This allows the parties to securely compute a function on distributed sensitive data. MPC protocols are used in many different applications, including threshold signature schemes, decentralized key generation, distribution of pieces of private keys, and partially-offchain transaction computations. MPC is used by some privacy-focused blockchain projects like Monero and Zcash. MPC protocols typically involve a mix of cryptographic techniques, such as secret sharing and zero-knowledge proofs. MPC has the potential to revolutionize the way that sensitive information is processed and used, by enabling secure computation on sensitive data without revealing it to the parties involved.\u003C/p>"},"name":"(MPC) Multi Party Computation"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Multi-signature, or multisig, is a type of digital signature scheme that requires more than one key to sign a document or a transaction. It is a way of creating a joint account or a shared wallet, where multiple people or keys must sign a transaction before it is executed. This can provide an added layer of security and accountability, and can be used to create joint accounts, where multiple people can spend from the same account.\u003C/p>"},"name":"Multi-Signature (aka Multisig)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>The National Institute of Standards and Technology (NIST) is an agency of the U.S. Department of Commerce. NIST conducts research and develops technology, standards, and guidelines in a wide range of areas, including information technology, manufacturing, and biotechnology. NIST is also a leading authority on cryptography and cybersecurity, and it develops and publishes standards and guidelines for the use of cryptography in government and industry. \u003C/p>"},"name":"National Institute of Standards and Technology (NIST)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A non-fungible token, or NFT, is a type of digital asset that is unique among all tokens, representing a specific item, such as a digital collectible, virtual property, or piece of art, on the blockchain. Unlike other cryptocurrencies, such as Bitcoin and Ethereum, which are interchangeable (fungible), NFTs are each unique. NFTs are created on blockchain platforms and are often used to create and manage decentralized marketplaces for unique digital assets. For more information, see \u003Ca href=\"https://vault12.com/learn/crypto-security-basics/nft-security/\" rel=\"noopener noreferrer\" target=\"_blank\">Vault12's article about NFTs\u003C/a>.\u003C/p>"},"name":"Non-Fungible Token (NFT)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A partially-signed Bitcoin transaction, or PSBT, is a type of Bitcoin transaction that is only partially signed. It is a way of representing a Bitcoin transaction that is in the process of being signed by multiple parties. A PSBT contains all of the information that is needed to complete the transaction, such as the inputs and outputs, the scripts and other conditions that must be satisfied, and the signatures of some, but not all, of the parties involved. A PSBT is typically created by wallet software, and it is then sent to one or more other parties for signing. Once all of the required signatures have been added, the PSBT can be finalized and confirmed on the Bitcoin network.\u003C/p>"},"name":"Partially Signed Bitcoin Transaction (PSBT)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>The passphrase is an optional extension to the \u003Ca href=\"https://vault12.com/learn/crypto-security-basics/what-is-bip39/\">BIP39\u003C/a> \u003Ca href=\"https://vault12.com/glossary/seed-phrase/\">Seed phrase\u003C/a> standard, sometimes referred to as an \"extra word\" (although it does not need to take the form of a single word) and it can be used as an additive authentication feature beyond the standard 12-to-24-word seed phrase. Some wallets call this passphrase a mnemonic seed extension or a 13th or 25th word. If used, the passphrase should be securely backed up and stored, because like your seed phrase, if you forget or lose it, you will lose access to your cryptocurrency.\u003C/p>\u003Cp>WARNING: Losing your passphrase would have the same effect as losing your seed phrase, resulting in losing access to your crypto!\u003C/p>"},"name":"Passphrase (for Seed phrase)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A seed phrase, or seed recovery phrase, is a sequence of words that is used as a backup for a cryptocurrency wallet. It is a way of recovering access to a wallet in the event that the wallet's private keys are lost. It is defined by the BIP39 standard. A seed phrase is typically a series of 12-24 words, and it is generated by the wallet software when the wallet is first created. The seed phrase can be used to recreate the private keys for the wallet, which allows the user to access their funds. Seed phrases are a critical part of a wallet's security, and it is important to keep them safe and secure.\u003C/p>"},"name":"Seed phrase"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A private key is a secret piece of data that is used in asymmetric (private-public key) cryptography. It is a string of characters that is used to encrypt and decrypt messages and to prove the ownership of a particular piece of data, such as a cryptocurrency wallet. A private key is typically generated by a wallet or vault software, and it is kept secret by the owner. The private key is created at the same time and is mathematically related to the public key, which is a publicly-known value that can be used to verify digital signatures created with the private key.\u003C/p>"},"name":"Private Key"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Random number generation, or RNG, is the process of generating long sequence of numbers or symbols that are unpredictable and do not follow any pattern. Its aim is to achieve unpredictable uniqueness. It is a fundamental concept in cryptography and security, and random numbers are used in many different applications, including encryption, password generation, and digital signatures. RNG algorithms are designed to produce numbers that are statistically random, which means that they are not biased or predictable. This makes them suitable for use in cryptographic systems, where random numbers are used to create unique private keys, nonces, and other values that are essential for security. RNG algorithms are typically implemented in software, hardware, or a combination of both, and they are used in many different applications, including gaming, simulation, and cryptography.\u003C/p>"},"name":"Random Number Generation (RNG)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Schnorr signatures are a modern type of digital signature scheme that is used in cryptography and blockchain technology. They are a way of creating a digital signature that is more efficient, secure, and flexible than other signature schemes. Schnorr signatures are based on a mathematical problem known as the Schnorr discrete logarithm problem, which is extremely labor-intensive to solve. This makes them suitable for use in cryptographic systems, where they can be used to create secure digital signatures. Schnorr signatures have been proposed as an upgrade to the existing digital signature scheme used in Bitcoin, and they are also used in other cryptocurrencies and blockchain applications. Schnorr signatures provide the ability to merge multiple transactions, potentially extending Bitcoin's capabilities and efficiency.\u003C/p>"},"name":"Schnorr Signatures"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Segregated Witness, or SegWit, is a Bitcoin improvement proposal (BIP) that was deployed in 2017 to improve the scalability and performance of the Bitcoin network. SegWit modified the structure of Bitcoin transactions to allow for more efficient and secure processing by separating the signature data from the rest of the transaction data. This not only allowed for more efficient and secure processing of transactions, it also enabled new features such as the Lightning Network. SegWit is considered to have been an important step forward for the Bitcoin network. Segwit Bitcoin addresses begin with either 3 or bc1 and are recommended to use. Refer to BIP49 and BIP48 standards to learn more.\u003C/p>"},"name":"Segregated Witness (aka SegWit)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Shamir's Secret Sharing is a method of dividing a secret, such as a password or a private key, into multiple shares. The secret can then be reconstructed by combining a certain number of shares defined as the threshold. This allows for secure sharing of a secret among a group of people, as each person only has access to one share of the secret, and the secret cannot be reconstructed without the required number of shares. Shamir's Secret Sharing is a widely-used method and is commonly used in cryptography, blockchain technology, and other applications where secure sharing of sensitive information is needed.\u003C/p>"},"name":"Shamir's Secret Sharing / Key Split"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Sharding is a method of splitting information into smaller, more manageable units, known as shards. Shards can be used to distribute data and workloads across multiple systems in order to improve the performance, scalability, and security. Sharding is commonly used in database management and distributed systems, where it allows for more efficient and secure storage and processing of data. In a sharded system, each shard is a self-contained unit that contains a subset of the data, allowing for parallel and distributed processing of the data. Sharding is also used in blockchain technology, where it is used to improve the scalability and the security of distributed ledger systems.\u003C/p>"},"name":"Sharding"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Signature aggregation is a method of combining multiple digital signatures into a single signature. It can reduce the size and the cost of digital signature schemes by allowing multiple parties to sign a message or a transaction using a single signature. Signature aggregation is commonly used in cryptography and blockchain technology, where it is used to improve the efficiency and the security of digital signature schemes. In signature aggregation, multiple parties can create their own signatures on a message or a transaction, and then the signatures can be mathematically combined into a single signature. This allows for more efficient and secure processing of transactions, as the size and the cost of the signature is reduced. \u003C/p>"},"name":"Signature Aggregation"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A smart contract is a self-executing contract with the terms of the agreement between buyer and seller being directly written into lines of code. The code and the agreements contained therein exist across a distributed, decentralized blockchain network. Smart contracts allow for the automation of digital relationships, enabling the performance of credible transactions without third parties. These transactions are trackable and irreversible. Smart contracts were first proposed by Nick Szabo in 1994. The goal of smart contracts is to provide security that is superior to traditional contract law and to reduce other transaction costs associated with contracting.\u003C/p>"},"name":"Smart Contract"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A spending policy is a set of rules and conditions that determine how a cryptocurrency wallet can be used to make transactions. It is a way of specifying the conditions under which a wallet can be used to spend funds, and it can be used to enforce certain constraints and requirements on the use of the wallet. Spending policies are commonly used in multisignature wallets, where they are used to specify the number of signatures that are required to spend funds, or to specify the types of transactions that are allowed. Spending policies are also used in other decentralized applications, such as in the management of funds for smart contracts, e.g. DAO treasuries, and in the creation of trustless escrow services.\u003C/p>"},"name":"Spending Policy"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>TapRoot and TapScript are upgrades to the Bitcoin protocol that offer improvements to the privacy, efficiency, and scalability of the network. Taproot and TapScript offer new features, such as script versioning and multisignature aggregation, which make it possible to create more complex and flexible transactions. TapScript extends the Bitcoin Script language, allowing creation of more powerful scripts. These changes have enabled new use cases for Bitcoin, such as smart contracts and confidential transactions, and they improve the overall performance and security of the network. The current status of Taproot implementation can be tracked at \u003Ca href=\"https://taprootactivation.com/\" target=\"_blank\">https://taprootactivation.com/\u003C/a>.\u003C/p>"},"name":"TapRoot and TapScript"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Threshold signature schemes are types of multi-party computation (MPC) that support the combination of partial signatures to produce a complete threshold signature that satisfies \"k of n\" approval threshold rules, and even more-complex spending policy rules. A well-known form of threshold signature scheme is \u003Ca href=\"https://vault12.com/crypto-glossary/multi-signature-aka-multisig\">Multisig\u003C/a> transactions, which achieve a prescribed level of approvers in order for a spend transaction to be approved.\u003C/p>"},"name":"Threshold Signature Schemes (TSS)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Two-factor authentication (2FA) is authentication that requires two different factors in order to verify the identity of a user. It is a security measure that is designed to provide an additional layer of protection against unauthorized access to accounts and systems. Two-factor authentication might require two factors from a set of factors including something the user knows (such as a password), something they have (such as a security token or a smartphone), and something they are (such as a biometric characteristic like a fingerprint or a face scan). 2FA makes it more difficult for an attacker to gain access to an account, as they would need to possess multiple factors in order to authenticate. Two-factor authentication is commonly used in online services, such as email, social media, and banking. 2FA is a subset of multi-factor authentication, which may require two or more factors of authentication.\u003C/p>\u003Cp>An example of an application that can generate single-use codes to provide an additional factor of identification is\u003Ca href=\"https://authy.com/\" target=\"_blank\"> Authy\u003C/a>.\u003C/p>"},"name":"Two-Factor Authentication (2FA), Multi-factor authentication"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>An unspent transaction output, or UTXO, is a type of record that is used in Bitcoin and other cryptocurrencies to track the ownership and the availability of funds. It is a way of representing the output of a transaction, and it is used to determine whether a particular output can be spent in a future transaction. UTXOs are a fundamental concept in Bitcoin and other cryptocurrencies, as they are used to track the flow of funds on the blockchain. UTXOs are created when a transaction is broadcast to the network, and they are consumed when they are used as inputs in a subsequent transaction. UTXOs are stored in a database, known as the UTXO set, which is maintained by the nodes on the network. The UTXO is used on multiple blockchains, including Bitcoin, Litecoin, Dogecoin, and Zcash. Rather than tracking account balances with UTXOs, other blockchains like Ethereum, Solana, and Polkadot use an account-based model. \u003C/p>"},"name":"Unspent Transaction Output (UTXO)"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A wallet is a software program or a hardware device that is used to manage and transact with digital currencies such as Bitcoin and Ethereum. Wallets keep track of users' funds, and allow for the creation and the signing of transactions. Wallets typically include a master private key, which is a secret piece of data that is used to sign transactions, and a master public key, which is a publicly-known value that is used to verify the signatures, as well as many subsidiary private and public keys. Wallets can be managed by the user, or they can be managed by a third-party service, such as an exchange or a custodial provider. Different types of wallets have different features and trade-offs, and they are suitable for different purposes. For more details, see the \u003Ca href=\"https://vault12.com/learn/crypto-security-basics/what-is-a-crypto-wallet/\" rel=\"noopener noreferrer\" target=\"_blank\">Vault12 article about cryptocurrency wallets\u003C/a>.\u003C/p>"},"name":"Wallet"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>Wallet addresses are unique identifiers managed by cryptocurrency wallets, and are used to receive or send funds. In representing an account tied to a person or institution, a wallet address is similar to a bank account number or an email address. A wallet address is generated by wallet software, and typically takes the form of a long and complex string of characters derived from the wallet's public key. A wallet address may safely be shared with others, and can be used to receive funds from other wallets. Different cryptocurrencies have different formats for wallet addresses, and they may use different algorithms to generate the addresses. Wallet addresses are an essential part of the cryptocurrency ecosystem, and they are used to track the flow of funds on the blockchain.\u003C/p>"},"name":"Wallet Address"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"\u003Cp>A zero-knowledge proof, or ZKP, is a method of proving the knowledge of a secret without revealing the secret itself. Zero-knowledge proofs are a fundamental concept in cryptography and blockchain technology, and they are used to enable private and secure interactions between parties. In a zero-knowledge proof, a person, known as the prover, can prove to another person, known as the verifier, that they know a certain secret, without revealing any details about the secret itself. This is done using a mathematical protocol that allows the prover to convince the verifier that they know the secret. Zero-knowledge proofs are an active area of research in cryptography and blockchain technology, and they have many potential applications.\u003C/p>"},"name":"Zero-Knowledge Proof (ZKP)"}]}
BIP32 is a standard for hierarchical deterministic (HD) wallets for Bitcoin.
This means that it's a way to generate a hierarchical, tree-like account structure of private and public keys, starting from a single "seed" key (or master private key). The advantage of using an HD wallet is that it allows you to generate a large number of separate accounts within a single wallet, and it’s easier to backup and restore your wallet. There is an improved version of this proposal, BIP44, that supports keys for multiple cryptocurrencies.
BIP39
BIP39 is a standard for a mnemonic phrase (more widely known as “Seed phrase”) that is used to control a wallet.
This means that it's a way to represent a wallet’s private key as a set of 12 or 24 words. The advantage of using a mnemonic phrase representation of a cryptographical private key is that it's easy for people to read it and write it down, which makes it easier to backup and recover your wallet.
BIP44
BIP44 is a Bitcoin improvement Proposal that built on BIP32 by extending standards for multi-coin wallet management. Not only Bitcoin supported, but almost all other cryptocurrencies, like Ethereum, Dogecoin, etc.
Bitcoin
Bitcoin is a digital currency that allows people to send and receive payments securely over the internet, and as such, it is a public currency protocol. It was created in 2009 by a person or group of people using the pseudonym "Satoshi Nakamoto." Unlike traditional currencies, which are issued by governments, Bitcoin is decentralized, which means that it is not controlled by any single entity. Instead, it is executed by a network of computers that work together to verify and record transactions on a form of public ledger called a blockchain. The supply of Bitcoin is limited, and the currency can be bought and sold on online exchanges. Many people and institutions are attracted to Bitcoin because of its potential for high returns on investment, as well as its independence from governments and central banks.
Bitcoin Address
A Bitcoin address is a unique string of characters that represents the destination of a Bitcoin payment. It is similar to an email address, but instead of being used to send and receive messages, a Bitcoin address is used to send and receive payments on the Bitcoin network. A Bitcoin address can be shared publicly, and anyone who knows the address can send payments to it. Bitcoin addresses are typically generated by a wallet software and are comprised of a string of letters and numbers. Depending on the protocol used to generate them, they typically begin with the number "1" (Legacy), "3" (Script), “bc1q” (SegWit), or "bc1p" (Taproot).
Bitcoin Core
Bitcoin Core is a free, open-source software program that acts as the reference implementation of Bitcoin. Its nodes are distributed among many participants, and can be run by anyone on nearly any variety of computer. Bitcoin Core can download and verify the entire Bitcoin blockchain, verify transactions, operate a wallet, and/or mine bitcoin.
Bitcoin Improvement Proposal (BIP)
A Bitcoin Improvement Proposal (BIP) is a proposal for a change or an improvement to the Bitcoin network. It is a way for anyone to submit a bitcoin change proposal to the community for discussion and review. BIPs are typically submitted by Bitcoin developers. The process of reviewing and implementing BIPs is designed to be open and transparent, and it is overseen by a group of volunteers known as the Bitcoin Improvement Proposals Working Group. BIPs can include changes to the Bitcoin protocol, new features, and improvements to the user experience.
Bitcoin Script is a simple programming language that is used to validate and control spending conditions for transactions on the Bitcoin network. For example, a script might specify that a certain number of signatures from a group of people are required in order to spend some Bitcoin (see “multisignature”), or that a payment can only be made if a certain condition is met. Newer types of Bitcoin Script such as Taproot extend its originally-simple functionality to include more-complex smart contracts, which are self-executing contracts with the terms of the agreement between buyer and seller directly written into lines of code.
Cold Storage
Cold storage refers to the practice of storing Bitcoin or other cryptocurrencies in a way that is not connected directly to the internet. This is typically done for security reasons, as it reduces the risk of the cryptocurrencies being stolen by hackers. Cold storage can take many forms, such as storing the private keys for a cryptocurrency on a piece of paper or a hardware device that is not connected to the internet. Some people also use offline computers or "air-gapped" devices, which are not connected to the internet at all and are therefore considered more secure. Cold storage is typically used for long-term storage of cryptocurrencies, as opposed to hot wallets, which are connected to the internet and are used for more frequent transactions.
Cryptographic Signature
A cryptographic signature is a mathematical scheme that is used to verify the authenticity and integrity of a message or a piece of data. It is a way of signing a message with a digital key, which can be used to verify that the message was indeed sent by the person who claims to have sent it. Cryptographic signatures are an essential part of many cryptographic protocols, and they are used in a wide range of applications, including secure email communications, inter-device communication protocols, and blockchain technology. To create a cryptographic signature, a sender uses a secret key to generate a unique "signature" for the message. The signature is then attached to the message, and it can be verified by anyone who has the corresponding key. This allows recipients to verify that the message was indeed sent by the owner of the secret key, and has not been tampered with. In the world of blockchain and cryptocurrencies, a form of asymmetric encryption is used wherein the crypto owner maintains the secret encryption key and the corresponding key is not secret and may be shared with the public.
dApp
A dApp, or decentralized application, is a type of software application that runs on a decentralized network, such as a blockchain. Unlike traditional applications, which are typically hosted on a single server or a group of servers, dApps are distributed across a network of computers, which means that they are not controlled by any single entity, they are executed collectively. This makes them more resistant to censorship and tampering, and allows them to operate in a decentralized and trustless manner. dApps can be built on top of various blockchain platforms, such as Ethereum, Polygon, and others, and they can be used for a wide range of purposes, including financial transactions, gaming, and social networking. Some popular examples of dApps include decentralized cryptocurrency exchanges and decentralized autonomous organizations (DAOs).
Decentralized Finance ("DeFi")
Decentralized finance, or "DeFi", refers to financial systems that are built on top of public blockchain technologies. DeFi provides financial services and products such as loans, insurance, and investment opportunities without the need for traditional intermediaries, such as banks and financial institutions. DeFi allows users to access these services directly using smart contracts and other decentralized code. This allows for faster and cheaper transactions, and it also enables new types of financial products and services that were not previously possible. DeFi has the potential to revolutionize the way that finance works, and it attracts a growing number of users and investors seeking high returns and independence from traditional financial institutions.
Elliptic Curve Digital Signature Algorithm (ECDSA)
The Elliptic Curve Digital Signature Algorithm (ECDSA) is a type of digital signature algorithm that is used to sign and verify messages. It is based on the mathematics of elliptic curves, which are curves that can be used to define a group of points that have certain mathematical properties. ECDSA is used in many cryptographic protocols, including the Bitcoin and Ethereum networks, and it is considered to be more secure and efficient than other digital signature algorithms. To create a digital signature with ECDSA, a sender uses their private key to generate a unique "signature" for the message. The signature is then attached to the message, and can be verified by anyone who has the corresponding public key. This allows recipients to verify that the message was indeed sent by the owner of the private key, and that it has not been tampered with.
Encryption
Encryption is a way of converting information into a secret code that can only be read by someone who knows a secret key to decrypt it. It is a fundamental technique in cryptography, which is the science of keeping information secure. Encryption is used to protect sensitive information such as credit card numbers, passwords, and military communications from unauthorized access. It is also used to verify the authenticity of a message or a piece of data, by generating a unique "signature" that can be verified by anyone who has the corresponding key. Encryption is a core feature of digital security systems.
Encryption Keys
Encryption keys are a crucial part of encryption, which is the process of converting information into a secret code. An encryption key is a piece of information that is used to encrypt and decrypt a message or a piece of data. It is a secret code that is used to scramble the original information in a way that can only be read by someone who knows the key. Encryption keys are a fundamental concept in cryptography, and there are many different encryption algorithms. The two main types of encryption are symmetric and asymmetric. Symmetric encryption uses the same key for encryption and decryption, and the biggest practical challenge with symmetric encryption is the need to securely and privately distribute the symmetric key to both parties (when originally deployed, and in the future, if the keys ever need to be changed). The other main type of encryption, asymmetric encryption, uses a set of two keys wherein one is secret and one is public. The primary form of asymmetric (private-public key) encryption used in modern blockchains and cryptocurrencies is the Elliptic Curve Digital Signature Algorithm (ECDSA).
Ethereum
Ethereum is an open-source, decentralized blockchain platform that runs smart contracts: applications that execute automatically when the underlying conditions are met. This enables developers to create markets, store registries of debts or promises, move funds in accordance with instructions given in the past (like a will or a futures contract), all while reducing traditional counterparty risks. The project was bootstrapped in 2014 and is maintained by the Ethereum Foundation, a Swiss non-profit, with contributions from volunteers and institutional supporters.
Ethereum Request for Comment (ERC)
An Ethereum Request for Comment (ERC) is a proposal for a new feature, improvement, or standard for the Ethereum blockchain (analogous to Bitcoin BIPs). It is a way to propose ideas for how to improve Ethereum to the Ethereum community for discussion and review. ERCs are typically submitted by Ethereum developers. The process of reviewing and implementing ERCs is designed to be open and transparent, and it is overseen by a group of volunteers known as the Ethereum Improvement Proposals Working Group (EIP WG). ERCs can cover a wide range of topics, including changes to the Ethereum protocol, new features, and improvements to the user experience. You can find ERCs here: https://eips.ethereum.org/erc.
ERC-20 token
An ERC-20 token is a type of digital asset that is built on the Ethereum blockchain. It is a standardized way of creating and issuing tokens, which are digital assets on the Ethereum network. ERC-20 tokens follow a specific set of rules, which makes it easy for developers to create and manage them, and for exchanges to support them. This has led to the widespread adoption of ERC-20 tokens, and there are now thousands of different tokens that follow the ERC-20 standard. ERC-20 tokens are commonly used to raise funds through initial coin offerings (ICOs), and they are also used to represent assets, such as digital collectibles and game items. The ERC-20 standard may be found here: https://ethereum.org/en/developers/docs/standards/tokens/erc-20/.
ERC-721 token
An ERC-721 token is a type of digital asset that is built on the Ethereum blockchain. Unlike ERC-20 tokens, ERC-721 tokens are Non-Fungible Tokens (NFTs), meaning that they are unique and not exactly the same as any other token of its kind. ERC-721 tokens are commonly used to represent unique assets, such as digital collectibles, art, and game items. They are also used to create decentralized marketplaces, where users can buy and sell unique assets. ERC-721 tokens were first introduced in 2017, and they have gained popularity due to their ability to represent a wide range of unique digital assets. The ERC-721 standard may be found here: https://ethereum.org/en/developers/docs/standards/tokens/erc-721/.
Hardware Wallet
A hardware wallet is a physical device that is used to store the private keys that control cryptocurrencies, such as Bitcoin and Ethereum. Hardware wallets are usually kept offline as cold storage, not connected to the internet, and therefore more secure than online wallets. Hardware wallets store the private keys for a cryptocurrency offline, in a secure environment that is protected by a PIN code and other security measures, making it very difficult for hackers to access or steal the keys. Hardware wallets are portable and relatively easy to use, and they are considered to be one of the most secure ways to store cryptocurrencies. Popular hardware wallets brands include Ledger, Trezor, and KeepKey.
Hash & Hash Functions
Hash functions are used in many different applications, including blockchain technology and password security. A hash is a fixed-size string of characters that is created by applying a mathematical algorithm, known as a hash function, to a piece of data. The hash, then, is a unique "fingerprint" for the source data, and can be used to verify its integrity and authenticity. The same input will always produce the same output, and even a small change to the input will produce a completely different output. A hash data transformation is strictly one-way: while a given input will reliably product the same output hash, the output hash can not be used to identify anything about the input other than the simple fact that it produced the hash output. This makes it safe to distribute hashes of secret data without fear of exposing the secret data itself.
Hierarchical Deterministic Wallet
A hierarchical deterministic wallet, or HD wallet, is a type of cryptocurrency wallet that uses a system of keys to generate a large number of private and public keys from a single seed key. This is known as deterministic key generation, and it allows the wallet to be easily backed up and restored. An HD wallet also has a hierarchical structure, which means that the keys are organized into different levels or "chains" of keys. This allows the wallet to support multiple accounts and addresses, and it makes it easier to manage and organize the keys. HD wallets are commonly used for Bitcoin and other cryptocurrencies, and they are considered to be more secure and user-friendly than non-deterministic wallets. It is an industry standard described in BIP32 and BIP44.
Hot and Cold Wallets
Hot and cold wallets are two different types of cryptocurrency wallets, which are used to store and manage digital assets, such as Bitcoin and Ethereum. A hot wallet is a wallet that is connected to the internet, and it is used for more frequent transactions. A cold wallet, on the other hand, is a wallet that is not connected to the internet, and it is used for long-term storage of cryptocurrencies. Due to their more-limited exposure to potentially bad actors, Cold wallets are more secure than hot wallets, being less vulnerable to hacking and other online threats. Hot wallets are more convenient to use, but they are also more susceptible to security risks. Many people use a combination of hot and cold wallets, depending on their needs and the amount of cryptocurrency that they are holding.
Lightning Network
The Lightning Network is a layer 2 payment protocol that is built on top of the Bitcoin blockchain. It is a way of enabling faster and cheaper transactions on the Bitcoin network by using a network of payment channels that are off-chain (executing outside of the main blockchain). The Lightning Network allows users to open a payment channel with one or more other users, and to perform many transactions between them without having to broadcast each transaction to the blockchain. This allows for faster and cheaper transactions, as there are fewer blockchain fees and confirmations. The Lightning Network also has the potential to enable new types of applications and use cases for Bitcoin, such as instant micropayments and cross-chain atomic swaps.
Merkle Tree (aka Hash Tree)
A Merkle tree, also known as a hash tree, is a type of data structure that is used in cryptography and blockchain technology. It is a tree-like data structure that allows for the efficient and secure verification of large amounts of data. A Merkle tree is constructed by taking a group of data items and calculating the hash, or the "fingerprint," of each item. These hashes are then grouped together to form new hashes, and this process is repeated until there is only one hash left, known as the root hash. This root hash serves as a unique "fingerprint" for the entire data set, and it can be used to verify the integrity of the entire data structure.
Miniscript
Miniscript is a high-level programming language that is used to write Bitcoin smart contracts. It is a simplified version of the Bitcoin Script language, which is the native programming language of the Bitcoin network. Miniscript allows developers to write smart contracts in a more readable and easier-to-understand format. Miniscript also includes a number of features, such as type checking and static analysis, that make it easier to write correct and secure smart contracts. The use of Miniscript has grown in popularity in recent years, and it is now supported by many different Bitcoin wallets and other tools.
(MPC) Multi Party Computation
Multi-party computation, or MPC, is a type of cryptographic protocol that allows a group of parties to compute a shared function without revealing their inputs to each other. This allows the parties to securely compute a function on distributed sensitive data. MPC protocols are used in many different applications, including threshold signature schemes, decentralized key generation, distribution of pieces of private keys, and partially-offchain transaction computations. MPC is used by some privacy-focused blockchain projects like Monero and Zcash. MPC protocols typically involve a mix of cryptographic techniques, such as secret sharing and zero-knowledge proofs. MPC has the potential to revolutionize the way that sensitive information is processed and used, by enabling secure computation on sensitive data without revealing it to the parties involved.
Multi-Signature (aka Multisig)
Multi-signature, or multisig, is a type of digital signature scheme that requires more than one key to sign a document or a transaction. It is a way of creating a joint account or a shared wallet, where multiple people or keys must sign a transaction before it is executed. This can provide an added layer of security and accountability, and can be used to create joint accounts, where multiple people can spend from the same account.
National Institute of Standards and Technology (NIST)
The National Institute of Standards and Technology (NIST) is an agency of the U.S. Department of Commerce. NIST conducts research and develops technology, standards, and guidelines in a wide range of areas, including information technology, manufacturing, and biotechnology. NIST is also a leading authority on cryptography and cybersecurity, and it develops and publishes standards and guidelines for the use of cryptography in government and industry.
Non-Fungible Token (NFT)
A non-fungible token, or NFT, is a type of digital asset that is unique among all tokens, representing a specific item, such as a digital collectible, virtual property, or piece of art, on the blockchain. Unlike other cryptocurrencies, such as Bitcoin and Ethereum, which are interchangeable (fungible), NFTs are each unique. NFTs are created on blockchain platforms and are often used to create and manage decentralized marketplaces for unique digital assets. For more information, see Vault12's article about NFTs.
Partially Signed Bitcoin Transaction (PSBT)
A partially-signed Bitcoin transaction, or PSBT, is a type of Bitcoin transaction that is only partially signed. It is a way of representing a Bitcoin transaction that is in the process of being signed by multiple parties. A PSBT contains all of the information that is needed to complete the transaction, such as the inputs and outputs, the scripts and other conditions that must be satisfied, and the signatures of some, but not all, of the parties involved. A PSBT is typically created by wallet software, and it is then sent to one or more other parties for signing. Once all of the required signatures have been added, the PSBT can be finalized and confirmed on the Bitcoin network.
Passphrase (for Seed phrase)
The passphrase is an optional extension to the BIP39Seed phrase standard, sometimes referred to as an "extra word" (although it does not need to take the form of a single word) and it can be used as an additive authentication feature beyond the standard 12-to-24-word seed phrase. Some wallets call this passphrase a mnemonic seed extension or a 13th or 25th word. If used, the passphrase should be securely backed up and stored, because like your seed phrase, if you forget or lose it, you will lose access to your cryptocurrency.
WARNING: Losing your passphrase would have the same effect as losing your seed phrase, resulting in losing access to your crypto!
Seed phrase
A seed phrase, or seed recovery phrase, is a sequence of words that is used as a backup for a cryptocurrency wallet. It is a way of recovering access to a wallet in the event that the wallet's private keys are lost. It is defined by the BIP39 standard. A seed phrase is typically a series of 12-24 words, and it is generated by the wallet software when the wallet is first created. The seed phrase can be used to recreate the private keys for the wallet, which allows the user to access their funds. Seed phrases are a critical part of a wallet's security, and it is important to keep them safe and secure.
Private Key
A private key is a secret piece of data that is used in asymmetric (private-public key) cryptography. It is a string of characters that is used to encrypt and decrypt messages and to prove the ownership of a particular piece of data, such as a cryptocurrency wallet. A private key is typically generated by a wallet or vault software, and it is kept secret by the owner. The private key is created at the same time and is mathematically related to the public key, which is a publicly-known value that can be used to verify digital signatures created with the private key.
Random Number Generation (RNG)
Random number generation, or RNG, is the process of generating long sequence of numbers or symbols that are unpredictable and do not follow any pattern. Its aim is to achieve unpredictable uniqueness. It is a fundamental concept in cryptography and security, and random numbers are used in many different applications, including encryption, password generation, and digital signatures. RNG algorithms are designed to produce numbers that are statistically random, which means that they are not biased or predictable. This makes them suitable for use in cryptographic systems, where random numbers are used to create unique private keys, nonces, and other values that are essential for security. RNG algorithms are typically implemented in software, hardware, or a combination of both, and they are used in many different applications, including gaming, simulation, and cryptography.
Schnorr Signatures
Schnorr signatures are a modern type of digital signature scheme that is used in cryptography and blockchain technology. They are a way of creating a digital signature that is more efficient, secure, and flexible than other signature schemes. Schnorr signatures are based on a mathematical problem known as the Schnorr discrete logarithm problem, which is extremely labor-intensive to solve. This makes them suitable for use in cryptographic systems, where they can be used to create secure digital signatures. Schnorr signatures have been proposed as an upgrade to the existing digital signature scheme used in Bitcoin, and they are also used in other cryptocurrencies and blockchain applications. Schnorr signatures provide the ability to merge multiple transactions, potentially extending Bitcoin's capabilities and efficiency.
Segregated Witness (aka SegWit)
Segregated Witness, or SegWit, is a Bitcoin improvement proposal (BIP) that was deployed in 2017 to improve the scalability and performance of the Bitcoin network. SegWit modified the structure of Bitcoin transactions to allow for more efficient and secure processing by separating the signature data from the rest of the transaction data. This not only allowed for more efficient and secure processing of transactions, it also enabled new features such as the Lightning Network. SegWit is considered to have been an important step forward for the Bitcoin network. Segwit Bitcoin addresses begin with either 3 or bc1 and are recommended to use. Refer to BIP49 and BIP48 standards to learn more.
Shamir's Secret Sharing / Key Split
Shamir's Secret Sharing is a method of dividing a secret, such as a password or a private key, into multiple shares. The secret can then be reconstructed by combining a certain number of shares defined as the threshold. This allows for secure sharing of a secret among a group of people, as each person only has access to one share of the secret, and the secret cannot be reconstructed without the required number of shares. Shamir's Secret Sharing is a widely-used method and is commonly used in cryptography, blockchain technology, and other applications where secure sharing of sensitive information is needed.
Sharding
Sharding is a method of splitting information into smaller, more manageable units, known as shards. Shards can be used to distribute data and workloads across multiple systems in order to improve the performance, scalability, and security. Sharding is commonly used in database management and distributed systems, where it allows for more efficient and secure storage and processing of data. In a sharded system, each shard is a self-contained unit that contains a subset of the data, allowing for parallel and distributed processing of the data. Sharding is also used in blockchain technology, where it is used to improve the scalability and the security of distributed ledger systems.
Signature Aggregation
Signature aggregation is a method of combining multiple digital signatures into a single signature. It can reduce the size and the cost of digital signature schemes by allowing multiple parties to sign a message or a transaction using a single signature. Signature aggregation is commonly used in cryptography and blockchain technology, where it is used to improve the efficiency and the security of digital signature schemes. In signature aggregation, multiple parties can create their own signatures on a message or a transaction, and then the signatures can be mathematically combined into a single signature. This allows for more efficient and secure processing of transactions, as the size and the cost of the signature is reduced.
Smart Contract
A smart contract is a self-executing contract with the terms of the agreement between buyer and seller being directly written into lines of code. The code and the agreements contained therein exist across a distributed, decentralized blockchain network. Smart contracts allow for the automation of digital relationships, enabling the performance of credible transactions without third parties. These transactions are trackable and irreversible. Smart contracts were first proposed by Nick Szabo in 1994. The goal of smart contracts is to provide security that is superior to traditional contract law and to reduce other transaction costs associated with contracting.
Spending Policy
A spending policy is a set of rules and conditions that determine how a cryptocurrency wallet can be used to make transactions. It is a way of specifying the conditions under which a wallet can be used to spend funds, and it can be used to enforce certain constraints and requirements on the use of the wallet. Spending policies are commonly used in multisignature wallets, where they are used to specify the number of signatures that are required to spend funds, or to specify the types of transactions that are allowed. Spending policies are also used in other decentralized applications, such as in the management of funds for smart contracts, e.g. DAO treasuries, and in the creation of trustless escrow services.
TapRoot and TapScript
TapRoot and TapScript are upgrades to the Bitcoin protocol that offer improvements to the privacy, efficiency, and scalability of the network. Taproot and TapScript offer new features, such as script versioning and multisignature aggregation, which make it possible to create more complex and flexible transactions. TapScript extends the Bitcoin Script language, allowing creation of more powerful scripts. These changes have enabled new use cases for Bitcoin, such as smart contracts and confidential transactions, and they improve the overall performance and security of the network. The current status of Taproot implementation can be tracked at https://taprootactivation.com/.
Threshold Signature Schemes (TSS)
Threshold signature schemes are types of multi-party computation (MPC) that support the combination of partial signatures to produce a complete threshold signature that satisfies "k of n" approval threshold rules, and even more-complex spending policy rules. A well-known form of threshold signature scheme is Multisig transactions, which achieve a prescribed level of approvers in order for a spend transaction to be approved.
Two-factor authentication (2FA) is authentication that requires two different factors in order to verify the identity of a user. It is a security measure that is designed to provide an additional layer of protection against unauthorized access to accounts and systems. Two-factor authentication might require two factors from a set of factors including something the user knows (such as a password), something they have (such as a security token or a smartphone), and something they are (such as a biometric characteristic like a fingerprint or a face scan). 2FA makes it more difficult for an attacker to gain access to an account, as they would need to possess multiple factors in order to authenticate. Two-factor authentication is commonly used in online services, such as email, social media, and banking. 2FA is a subset of multi-factor authentication, which may require two or more factors of authentication.
An example of an application that can generate single-use codes to provide an additional factor of identification is Authy.
Unspent Transaction Output (UTXO)
An unspent transaction output, or UTXO, is a type of record that is used in Bitcoin and other cryptocurrencies to track the ownership and the availability of funds. It is a way of representing the output of a transaction, and it is used to determine whether a particular output can be spent in a future transaction. UTXOs are a fundamental concept in Bitcoin and other cryptocurrencies, as they are used to track the flow of funds on the blockchain. UTXOs are created when a transaction is broadcast to the network, and they are consumed when they are used as inputs in a subsequent transaction. UTXOs are stored in a database, known as the UTXO set, which is maintained by the nodes on the network. The UTXO is used on multiple blockchains, including Bitcoin, Litecoin, Dogecoin, and Zcash. Rather than tracking account balances with UTXOs, other blockchains like Ethereum, Solana, and Polkadot use an account-based model.
Wallet
A wallet is a software program or a hardware device that is used to manage and transact with digital currencies such as Bitcoin and Ethereum. Wallets keep track of users' funds, and allow for the creation and the signing of transactions. Wallets typically include a master private key, which is a secret piece of data that is used to sign transactions, and a master public key, which is a publicly-known value that is used to verify the signatures, as well as many subsidiary private and public keys. Wallets can be managed by the user, or they can be managed by a third-party service, such as an exchange or a custodial provider. Different types of wallets have different features and trade-offs, and they are suitable for different purposes. For more details, see the Vault12 article about cryptocurrency wallets.
Wallet Address
Wallet addresses are unique identifiers managed by cryptocurrency wallets, and are used to receive or send funds. In representing an account tied to a person or institution, a wallet address is similar to a bank account number or an email address. A wallet address is generated by wallet software, and typically takes the form of a long and complex string of characters derived from the wallet's public key. A wallet address may safely be shared with others, and can be used to receive funds from other wallets. Different cryptocurrencies have different formats for wallet addresses, and they may use different algorithms to generate the addresses. Wallet addresses are an essential part of the cryptocurrency ecosystem, and they are used to track the flow of funds on the blockchain.
Zero-Knowledge Proof (ZKP)
A zero-knowledge proof, or ZKP, is a method of proving the knowledge of a secret without revealing the secret itself. Zero-knowledge proofs are a fundamental concept in cryptography and blockchain technology, and they are used to enable private and secure interactions between parties. In a zero-knowledge proof, a person, known as the prover, can prove to another person, known as the verifier, that they know a certain secret, without revealing any details about the secret itself. This is done using a mathematical protocol that allows the prover to convince the verifier that they know the secret. Zero-knowledge proofs are an active area of research in cryptography and blockchain technology, and they have many potential applications.