Glossary

Glossary_

Master the essential terminology of privacy and security in the digital age.

Privacy

The ability to control who has access to personal information and how it is used.

Anonymity

The state of being unrecognizable or unidentified.

Pseudonymity

The use of a false name, often used to protect identity.

Zero-Knowledge Proof (ZKP)

A cryptographic protocol that allows one party (the prover) to demonstrate to another party (the verifier) that they know a value, without revealing that value.

Privacy-Preserving Smart Contracts

Smart contracts that use cryptographic techniques to protect the privacy of their users and data.

Private Transactions

Transactions that are conducted off-chain or using privacy-preserving techniques to protect the sender and recipient's identities.

Privacy-Preserving Wallets

Wallets that use cryptographic techniques to protect the privacy of their users.

Privacy-Preserving Oracles

Oracles that provide data to smart contracts without revealing the content of that data.

Stealth Address

Wallet address that is cryptographically tied to ones' public address, but that is only revealed to the parties transacting.

Homomorphic Encryption

A type of encryption that allows arbitrary computations to be performed on encrypted data without decrypting it first.

Fully Homomorphic Encryption

Can perform any computation on encrypted data, not just linear operations.

Secure Multi-Party Computation (MPC)

A cryptographic technique that allows multiple parties to compute a function over their inputs without revealing their individual inputs to each other.

Differential Privacy

A technique that adds noise to data to protect individual privacy while preserving statistical accuracy.

Ring Signatures

A digital signature scheme that allows a group of individuals to sign a message without revealing which member of the group signed it.

Blind Signatures

A signature scheme that allows a signer to sign a message without knowing its contents, providing anonymity for the message sender.

zk-SNARKs

Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge. A type of ZKP that allow one party to prove to another that they know a value without revealing that value or any additional information.

zk-STARKs

Zero-Knowledge Scalable Transparent Arguments of Knowledge. A type of ZKP that is more efficient than zk-SNARKs and does not require a trusted setup.

Bulletproofs

A type of ZKP that is more efficient than zk-SNARKs and zk-STARKs by using range proofs, aggregation, optimized verification, and transparency.

Privacy-Preserving Ethereum Protocols

Protocols such as Aztec Protocol, Tornado Cash, and Railgun that aim to provide privacy for Ethereum transactions.

Advanced Encryption Standard (AES)

A widely used symmetric-key encryption algorithm.

Blowfish

A symmetric-key encryption algorithm known for its speed and security.

Twofish

A symmetric-key encryption algorithm that was a finalist in the AES competition.

Lattice-Based Cryptography

A type of cryptography that is resistant to quantum computing attacks.

Multi-Party Key Escrow

A technique that allows multiple parties to share the responsibility for managing a private key.

Threshold Signatures

A type of signature scheme that allows a group of individuals to sign a message without revealing which member of the group signed it.

Elliptic Curve Cryptography (ECC)

A type of public-key cryptography that uses points on an elliptic curve for encryption and digital signatures, offering smaller key sizes and faster computations than traditional methods.

Digital Signature Algorithm (DSA)

A digital signature algorithm that uses modular exponentiation and discrete logarithms to verify the authenticity of digital documents.

Schnorr Signatures

A type of digital signature scheme that is more efficient and simpler to implement than DSA, often used in Bitcoin and other cryptocurrencies.

SHA-256

A widely used cryptographic hash function that produces a 256-bit hash value.

SHA-3

A newer cryptographic hash function selected as the winner of the NIST hash function competition, offering improved security and performance.

BLAKE2

A cryptographic hash function known for its speed and security, often used in various applications, including blockchain technology.

Steganography

A technique for hiding information within other information, making it difficult to detect that it is there.

Watermarking

A technique for embedding a hidden message or identification code within a piece of data.

Oblivious Transfer

A cryptographic protocol that allows two parties to exchange information without either party revealing their information to the other.

Data Minimization

The principle of collecting and processing only the data that is necessary for a specific purpose.

Purpose Limitation

The principle that data should only be used for the purposes for which it was originally collected.

Data Retention Limitation

The principle that data should not be kept for longer than necessary.

Data Integrity

The principle that data should be accurate, complete, and up-to-date.

Data Security

The principle that data should be protected from unauthorized access, disclosure, alteration, or destruction.