Page 11 - FIGI: Security Aspects of Distributed Ledger Technologies
P. 11

Mining                  The act of validating Blockchain transactions. Requires computing power and electricity to
                                    solve “puzzles”. Mining rewards coins based on ability to solve blocks.
            Mining pool             A collection of miners who come together to share their processing power over a network
                                    and agree to split the rewards of a new block found within the pool.
            Node                    A copy of the ledger operated by a user on the blockchain
            Nonce                   A number only used once in a cryptographic communication (often includes a timestamp)
            Off-chain               Where data is not processed on a native blockchain, but which may later be placed on a
                                    blockchain. That data may not be accurate however.
            On-chain governance     A system for managing and implementing changes to a crypto-currency blockchain
            Oracles                 An agent that finds and verifies real-world occurrences and submits this information to a
                                    blockchain to be used by smart contracts.
            P2P (Peer to Peer)      Denoting or relating to computer networks in which each computer can act as a server for
                                    the others, allowing shared access to files and peripherals without the need for a central
                                    server.
            PKI (Public Key Infrastruc-  A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and
            ture)                   revoke digital certificates and manage public-key encryption.
            Private Blockchain      Blockchain that can control who has access to it. Contrary to a public blockchain a Private
                                    Blockchain does not use consensus algorithms like POW or POS, instead they use a system
                                    known as byzantine fault tolerant (BFT). BFT is not a trustless system which makes a BFT
                                    system less secure
            Proof of Activity       Active Stakeholders who maintain a full node are rewarded
            Proof of Capacity       Plotting your hard drive (storing solutions on a hard drive before the mining begins). A hard
                                    drive with the fastest solution wins the block
            Proof of elapsed time   Consensus algorithm in which nodes must wait for a randomly chosen time period and the
                                    first node to complete the time period is rewarded
            Proof of Work (POW)     A consensus algorithm which requires a user to “mine” or solve a complex mathematical
                                    puzzle in order to verify a transaction. “Miners” are rewarded with Cryptocurrencies based
                                    on computational power.
            Public key cryptography  Encryption that uses two mathematically related keys. A public and private key. It is impos-
                                    sible to derive the private key based on the public key.
            Sharding                Dividing a blockchain into several smaller component networks called shards capable of
                                    processing transactions in parallel.
            Smart Contract          Self-executing contract with the terms of agreement written into the code
            Solidity                Solidity is a contract-oriented programming language for writing smart contracts. It is used
                                    for implementing smart contracts on various blockchain platforms.
            Token                   Representation of a crypto-asset built on an existing blockchain
            Turing Complete language  A computer language that is able to perform all, possibly infinite, calculations that a com-
                                    puter is capable of
            Wallet                  Stores a crypto-asset token
            51% Attack              A situation in which the majority of miners in the blockchain launch an attack on the rest of
                                    the nodes (or users). This kind of attack allows for double spending.
























                                                                   Security Aspects of Distributed Ledger Technologies  9
   6   7   8   9   10   11   12   13   14   15   16