cool hit counter The Most Complete Blockchain Jargon Inventory of 2018_Intefrankly

The Most Complete Blockchain Jargon Inventory of 2018

When you first enter the chain world, you may feel that you have never heard of some terms and are confused by all kinds of terminology, so here we have compiled the 48 most common blockchain terms for your reference and reference.

1、Blockchain - Blockchain

Blockchain is a new application model of computer technology such as distributed data storage, peer-to-peer transmission, consensus mechanisms, and cryptographic algorithms. is a shared distributed ledger in which transactions are permanently recorded through additional blocks.

2. Block - block

In the Bitcoin network, data is permanently recorded in the form of files, which we call blocks. A block is the set of records for some or all of the latest bitcoin transactions and is not recorded by other previous blocks.

3. Block head

Inside the block header stores the block's header information, containing the hash of the previous block (PreHash), the hash of the body of this block (Hash), and the timestamp (TimeStamp), among other things.

4. Satoshi Nakamoto

The self-proclaimed Japanese-American, often translated as Tetsuhisa Nakamoto in the Japanese media, is the creator of the Bitcoin protocol and its related software Bitcoin-Qt, but his true identity is unknown.

5. Cryptocurrency

Cryptocurrency is a type of digital currency (or virtual currency). It is a medium of exchange that uses cryptographic principles to secure transactions and control the creation of trading units.

6. Node - node

A copy of the ledger operated by a participant in the blockchain network.


Oracle bridges the gap between it real world and the blockchain by providing data to smart contracts.

8. Decentralization

Decentralization is a phenomenon or structure that must occur or exist in a system with many nodes or in a swarm with many individuals. Node-to-node effects can form non-linear causal relationships through the network.

9. Consensus mechanisms

The consensus mechanism is the verification and confirmation of a transaction in a very short time through the voting of special nodes; for a transaction, if a number of nodes with unrelated interests can reach consensus, we can assume that the whole network can reach consensus on it as well.

10. Pow - proof of workload

Proofof Work, which is how much cryptocurrency you get, depends on the amount of work you contribute to mining, and the better your computer performs, the more mines will be distributed to you.

11. PoS - Proof of Interest

Proofof Stake, a system that distributes interest based on the amount and duration of your cryptocurrency holdings, is a POS model in which your "mining" earnings are proportional to the age of your coins, independent of the computing performance of your computer.

12. Smart contracts

A smart contract is a computer protocol designed to disseminate, validate or enforce a contract in an informational manner. Smart contracts allow for trusted transactions without a third party, which are traceable and irreversible.

13. Timestamp

A timestamp is a string or encoded message used to identify the date in time when it was recorded. The international standard is ISO 8601.

14. Turing completeness

Turing completion is the ability of a machine to perform any other computation that a programmable computer can perform. An example is the Ethereum Virtual Machine (EVM).

15. 51% attack

When a single individual or a group has more than half of the computing power, that individual or group can control the entire cryptocurrency network and if they have some malicious ideas, they can potentially send out some conflicting transactions to damage the entire network.

16. Dapp - decentralized application

is an open source application that runs automatically, stores its data on the blockchain, is motivated by cryptographic tokens, and operates with a protocol that shows proof of value.

17. DAO - Decentralized Autonomous Organization

It can be thought of as a company that operates without any human intervention and gives all forms of control to an unbreakable set of business rules.

18. DistributedLedger - distributed ledger

The data is stored through a network of distributed nodes. A distributed ledger is not required to have its own currency; it may be licensed and private.

19、DistributedNetwork - Distributed Network

A network where processing power and data are distributed across nodes rather than having a centralized data center.

20. Prophecy machine

A prophecy machine is a trusted entity that introduces information about the state of the external world through signatures, thus allowing deterministic smart contracts to react to an uncertain external world. Prophecy machines are non-tamperable, stable in service, auditable, and have financial incentives to keep them running.

21. Zero knowledge proof

Zero-knowledge proofs were proposed by S. Goldwasser, S. Micali, and C. Rackoff in the early 1980s. It refers to the ability of a prover to convince a verifier that an assertion is correct without providing any useful information to the verifier.

22、PrivateKey - private key

A private key is a string of data that is a token that allows you to access a specific wallet in your wallet. They are hidden as passwords, except for the owner of the address.

23、PublicKey - public key

is present in pairs with the private key, and the public key can count the address of the coin, and therefore can be used as a credential to own the address of this coin.

24、AES - Advanced Encryption Standard

The Advanced Encryption Standard (AES) in cryptography, also known as Rijndael cryptography, is a block encryption standard adopted by the United States federal government.

25、Wallet - Wallet

A file containing the private key. It usually contains a software client that allows access to view and create transactions for the particular blockchain the wallet is designed for.

26. Cold purse

In layman's terms a cold wallet is a wallet that stores digital currency offline, where the player generates the digital currency address and private key on top of an offline wallet, which is then saved. Whereas, cold wallets are used for storing digital currencies without any network, so hackers cannot access the wallet to get the private key.

27. SPV - Light Wallet

Light wallets rely on other full nodes on the Bitcoin network and only sync data relevant to themselves, essentially allowing for decentralization.

28. Full node

Full nodes are nodes that have a complete blockchain ledger. Full nodes need to occupy memory to synchronize all blockchain data, can independently verify all transactions on the blockchain and update data in real time, and are mainly responsible for the broadcast and verification of blockchain transactions.

29. Byzantinefailures - The Byzantine General Issue

The Byzantine General problem is a fundamental problem in peer-to-peer communication posed by Leslie Lambert. The implication is that it is impossible to attempt to achieve consistency by means of message passing on unreliable channels where message loss exists. Thus studies of consistency generally assume that the channel is reliable or that there is no present problem.

30. Superbook

Hyperledger is an open source project launched by the Linux Foundation in 2015 to advance blockchain digital technology and transaction validation. Assist organizations in scaling, building industry-specific applications, platforms and hardware systems to support members' respective transactional operations by creating common distributed ledger technology.

31. Lightning Network

The purpose of the Lightning Network is to enable secure off-chain transactions, which is essentially a mechanism that uses hash-time-locked smart contracts to securely perform 0-confirmation transactions by setting up clever "smart contracts" that make unconfirmed transactions on the Lightning Network as secure as gold.

32. P2P - peer-to-peer networks

That is, a peer-to-peer computer network, a distributed application architecture that distributes tasks and workloads among peers (Peers), is a form of networking or network formed by the peer-to-peer computing model at the application layer.

33. Mining - mining

Mining is the nickname for the exploration method of acquiring bitcoins. The process of using computer hardware to calculate the location of coins and acquire them is called mining.

34. Miners

A computing device or software that attempts to create blocks and add them to the blockchain. In a blockchain network, when a new valid block is created, the system generally automatically gives the block creator (miner) a certain number of tokens as a reward.

35. Mining pools

is a fully automated mining platform that enables miners to contribute their respective computing power to mine together to create blocks, receive block rewards, and distribute profits based on the percentage of computing power contributed (i.e. miners access the pool - provide computing power - receive revenue).

36. Public chains

A fully open blockchain is one that anyone can read, anyone can send transactions and have them validly confirmed, anyone in the world can participate in maintaining the system, and anyone can read and write data through transactions or mining.

37. Private chains

Write access to a blockchain that is only for a particular organization or a specific few objects. Read access can be made available to the public, or restricted to any degree.

38. Alliance chains

The consensus mechanism is a blockchain controlled jointly by a designated number of institutions.

39. Main link

The term masterchain derives from mainnet (as opposed to testnet testnet), the officially live, independent blockchain network.

40. Side chains

Wedged sidechain technology (pegged sidechains), which will enable the transfer of bitcoin and other digital assets between multiple blockchains, meaning users will be able to access new cryptocurrency systems while still using the assets they already have.

41. Cross-chain technology

Cross-chain technology can be understood as a bridge to connect various blockchains, and its main applications are to enable atomic transactions between blockchains, asset conversion, interoperability of information within blockchains, or to solve Oracle's problems, etc.

42. Hard bifurcation

A permanent disagreement in the blockchain occurs, and a hard fork usually occurs after a new consensus rule is released and some of the nodes that have not upgraded are unable to validate the blocks produced by the nodes that have upgraded.

43. Soft bifurcation

When the new consensus rule is released, nodes that have not upgraded will produce illegitimate blocks because they are unaware of the new consensus rule under which a temporary fork will be created.

44. Hash - hash value

General translation done" hash", There is also a direct phonetic translation of" hash (computing)" of。 It is simply a function that compresses a message of arbitrary length into a message digest of some fixed length。

45. Hash rate

Assuming that mining is solving an equation problem, and that it can only be calculated by substituting each integer, the hash rate is the rate at which data is processed per second.

46. hashtree - hash tree

A hash tree is a tree data structure in which each leaf node is labeled with the hash of the data block, while non-leaf nodes are labeled with the cryptographic hash of their child node labels.


SHA-256 is the cryptographic algorithm used by some of Bitcoin's listed digital currencies. However, it uses a lot of computing power and processing time, forcing miners to form mining pools to generate revenue.


KYC stands for Know Your Customer, meaning know your customer, and in the international AML regulations, organizations are required to develop a comprehensive understanding of their customers in order to anticipate and detect unreasonable and potentially illegal business practices.

Customer Service WeChat

1、This tech companys new technology will bring allaround advances to the NFLs data tracking analysis
2、Written at the time of death
4、Domestic and foreign media interview groups praise Xiuwens big data kiwifruit
5、The big truck was unmanned but hit two cars because of a small negligence of the driver

    已推荐到看一看 和朋友分享想法
    最多200字,当前共 发送