Blockchain Distributed Ledger Glossary PDF
Blockchain Distributed Ledger Glossary PDF
You may download, store, display on your computer, view, print, and link to International
Standardization Council Policies & Procedures Security at https://cloudsecurityalliance.org/
download/international-standardization-council-policies-procedures, subject to the following:
(a) the Report may be used solely for your personal, informational, non-commercial use;
(b) the Report may not be modified or altered in any way;
(c) the Report may not be redistributed; and
(d) the trademark, copyright or other notices may not be removed. You may quote portions of
the Report as permitted by the Fair Use provisions of the United States Copyright Act, provided
that you attribute the portions to International Standardization Council Policies & Procedures.
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 2
Acknowledgements
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 3
51% attack A theoretical situation where a single miner or group of miners controls
(aka Consensus more than half of the networks computing power and decides to use this
HiJacking) power to their advantage. The attacker can double spend his money –
meaning he can pay with the same Bitcoin twice or even more. The attacker
will also be able to prevent transactions from being confirmed and prevent
other miners from generating new Bitcoins.
Source: https://99bitcoins.com/bitcoin-glossary-faq/
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: https://blockgeeks.com/guides/blockchain-address-101/
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Altcoin A General name given to cryptocurrencies other than Bitcoin. For example,
Litecoin, Feathercoin, Dash, etc. For a list of many Altcoin go to
http://www.altcoins.com.
Source: https://99bitcoins.com/bitcoin-glossary-faq/
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 4
Bitcoin Block Contains a standard 80 bytes of information as follows:
Header
Bytes Name Description
Source: https://en.bitcoin.it/wiki/Block_hashing_algorithm
Bitcoin BTC most common currency code. XBT unofficial ISO currency code
Currency Units
Value in @ $100 per @ $200 per @ $500 per
Unit
BTC/XBT BTC/XBT BTC/XBT BTC/XBT
Source: http://bitcoinchaser.com/bitcoin-units-and-denominations
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 5
Bitcoin is peer-to-peer with transactions taking place between users directly,
Payment without an intermediary. These transactions are verified by network nodes
and recorded in a public distributed ledger called the blockchain, which
System
uses bitcoin as its unit of account. Since the system works without a central
repository or single administrator, the U.S. Treasury categorizes bitcoin as a
decentralized virtual currency. Bitcoin is often called the first cryptocurrency,
although prior systems existed and it is more correctly described as the first
decentralized digital currency. Bitcoin is the largest of its kind in terms of
total market value.
Source: https://en.wikipedia.org/wiki/Bitcoin
Bitcoin The Bitcoin transaction lock time is the time at which a particular transaction
Transaction can be added to the blockchain. This is the earliest time that miners can
include the transaction in their hashing of the Merkle root to attach it in the
Locktime
latest block to the blockchain.There are two specific types of transaction
locktime. Firstly when the locktime figure is less than 500 million it is
interpreted as a block height and miners therefore have to wait until that block
height has been reached before attempting to include it in a block. If it is above
500 million it is converted to a unix timestamp – a unix timestamp being the
number of seconds since January 1st 1970.
Source: https://www.cryptocompare.com/coins/guides/what-is-bitcoin-
transaction-locktime/
Bitcoin randomly crisscrosses your bitcoins with other users’ bitcoins so that you get
Tumbler/Mixer a clean address that the blockchain cannot connect with any of the addresses
from which the coins were stolen. The tumbler is only accessible through the
anonymizing Tor network, making it difficult for law enforcement to trace traffic
to it or discover the people behind it.
Source: http://www.theverge.com/2013/12/19/5183356/how-to-steal-bitcoin-
in-three-easy-steps
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 6
example above could take 1 week to generate.
Block A group of transactions. Each block has a reference to the previous block and
that is how a “blockchain” is built. Mining is the process that actually builds the
blockchain. Because of this there is no way for someone to tamper with the
system and add their own “custom” block to the chain.
Source: https://99bitcoins.com/bitcoin-glossary-faq/
Block Explorer Block Explorer is an open source web tool that allows you to view information
about blocks, addresses, and transactions on the Bitcoin blockchain. The
source code is on GitHub.
Source: https://blockexplorer.com/
Block Height Block height refers to the number of blocks connected together in the block
chain. For example, Height 0, would be the very first block, which is also called
the Genesis Block.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: https://en.wikipedia.org/wiki/Blockchain_(database)
Source: https://ieet.org/index.php/IEET2/more/swan20141110
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 7
Blockchain 2.0 is contracts - the whole slate of economic, market, and financial applications
using the blockchain that are more extensive than simple cash transactions
like stocks, bonds, futures, loans, mortgages, titles, smart property, and
smart contracts.
Source: https://ieet.org/index.php/IEET2/more/swan20141110
Blockchain 3.0 is applications beyond currency, finance, and markets, particularly in the areas
of government, health, science, literacy, culture, and art.
Source: https://ieet.org/index.php/IEET2/more/swan20141110
Source: http://www.ibm.com/developerworks/cloud/library/cl-blockchain-
basics-glossary-bluemix-trs/index.html
Source: https://www.channele2e.com/2016/02/04/cloud-market-share-2016-
aws-microsoft-ibm-google/
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 8
Blockchain writes chaincode (smart contracts), and client-side applications to invoke
Developer smart contracts. The Blockchain Developer could deploy chaincode directly
to the network, through a REST interface. To include credentials from a
Traditional Data source in chaincode, the developer could use an out-of-
band connection to access the data.
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
Blockchain Embedded mining is a relatively new concept where mining chips are
Embedded embedded into internet connected devices. In comparison to industrial grade
mining hardware (e.g. servers in a data center), embedded mining chips can
Mining
operate inside everyday devices such as a cell phone. Embedded mining
is speculated to be a solution to previously uneconomical efforts, such as
micropayments and monetizing the internet-of-things.
Source: http://www.blockchaintechnologies.com/blockchain-mining
Blockchain a hash function takes an input of any length and creates an output of fixed
Hash length. The output is called a Hash. SHA256 is a hash function that takes any
length input and creates an output of 256 bits (32 bytes). A Blockchain Hash
is calculated for each block in a chain with the hash for the first block used as
input when calculating the hash for the next block.
Source: https://decentralize.today/if-you-understand-hash-functions-youll-
understand-blockchains-9088307b745d#.lh2gflo8c
Source: http://www.blockchaintechnologies.com/blockchain-mining
Blockchain CPU/GPU Bitcoin Mining: The least powerful category of bitcoin mining
Mining hardware is your computer itself. Theoretically, you could use your computer’s
CPU to mine for bitcoins, but in practice, this is so slow by today’s standards
Hardware
that there isn’t any point. You can enhance your bitcoin hash rate by adding
graphics hardware to your desktop computer. Graphics cards feature
graphical processing units (GPUs). These are designed for heavy mathematical
lifting so they can calculate all the complex polygons needed in high-end video
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 9
games. This makes them particularly good at the SHA hashing mathematics
necessary to solve transaction blocks. For example, an ATI 5970 graphics card
can give you over 800 MH/sec compared with a CPU, which will generally give
you less than 10 MH/sec.
Source: http://www.coindesk.com/information/how-to-set-up-a-miner/
Source: http://www.ibm.com/developerworks/cloud/library/cl-blockchain-
basics-glossary-bluemix-trs/index.html
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
Blockchain It is not required for most fully validating nodes to store the entire blockchain,
Pruning currently around 127 GB. Reducing the amount of data to the size of the
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 10
current unspent output size, currently 1.7 GB, plus some additional for data
that is needed to handle re-orgs can reduce the stress on many nodes.
Blockchain Due to the existence of multiple copies of the entire transaction database
RTBF Risk it would be difficult to prove all data had been deleted. The fact that data
in the blockchain is immutable – which means that it cannot be altered or
removed once it has been entered – provides transparency and accountability.
However, it may also compromise privacy and data protection, especially when
it comes to personal or sensitive data (which should never be stored on a
blockchain). Blockchains do not guarantee anonymity and, the more personal
the data is, the easier it is to identify the individual to which it pertains. This
immutability may compromise the ‘right to be forgotten’, whereby users may,
under certain circumstances, demand that their personal data be erased.
Blockchain As of bitcoin core 0.9, transactions from the network must match a set of
Standard rules, Those transactions are called standard transactions. Only standard
transactions are mined or broadcast by peers running the default Bitcoin
Transaction
Core software. The standard transaction types are as follows:
Types
1. Pay to PubKey Hash (P2PKH) - standard way to send Bitcoins to a single
address
2. Pay to Address - standard way of assigning newly mined Bitcoins and
transaction fees to an address
3. Pay to Script Hash (P2SH) - moves the responsibility for supplying the
conditions to redeem a transaction from the creator of the transaction
to the payee(s)
4. Multi-Signature - used for multi-signature transactions by specifying the
multi-signature script in the P2SH (#3) redeemScript, they can also be
specified directly in the scriptPubKey
5. Null_Data - They allow the creator of the transaction to include some
arbitrary data in the blockchain in exchange for paying a transaction fee.
The output is unspendable
6. Non_Standard – None of the above
Source: http://www.quantabytes.com/articles/a-survey-of-bitcoin-transaction-
types and https://bitcoin.org/en/developer-guide#standard-transaction
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 11
Blockchain submits a transaction to the Permissioned Blockchain network. The
User transaction can be a deploy, invoke or query, and is issued through a client-
side application leveraging an SDK, or directly through a REST API.
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
BTC is still the most often used code for Bitcoin and is listed on https://www.oanda.
com/currency/converter/ as well as in the form of a trust on http://www.
nasdaq.com/symbol/gbtc that invests in Bitcoin. XBT is the unofficial ISO 4217
International Standard for currency codes. You can find XBT traded on https://
www.bloomberg.com/quote/COINXBT:SS and http://www.xe.com.
Source: http://www.coindesk.com/bitcoin-gaining-market-based-legitimacy-xbt/
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 12
Chaincode The standard transaction types are as follows:
Standard
1. Init () - when you first deploy your chaincode. This should be used to
Transaction
initialize your chaincode.
Types
2. Invoke () - when you want to call chaincode functions to do real work
3. Query () - whenever you query your chaincode’s state.
4. Main () – when it’s time to setup the communication between the
chaincode & the peer that deployed it.
Source: https://github.com/IBM-Blockchain/learn-chaincode
Source: http://bitcoinist.com/chainwashing-r3-swanson-blockchain-hype/
Source: http://searchcloudstorage.techtarget.com/definition/cloud-washing
Confirmation A confirmation means that the blockchain transaction has been verified by the
network. This happens through a process known as mining, in a proof-of-work
system (e.g. Bitcoin). Once a transaction is confirmed, it cannot be reversed
or double spent. The more confirmations a transaction has, the harder it
becomes to perform a double spend attack.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Consensus A consensus algorithm, does two things: it ensures that the next block in a
Algorithms/ blockchain is the one and only version of the truth through agreement of
participants, and it keeps powerful adversaries from derailing the system and
Protocols
successfully forking the chain. Some of the better known protocols are: Proof
of Work (Pow), Proof of Stake (PoS), Proof of Activity (PoA), Proof of Burn (PoB),
Proof of Elapsed Time (PoET), Proof of Capacity (PoC).
Source: http://www.coindesk.com/short-guide-blockchain-consensus-protocols/
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 13
Consensus A point – either in time, or defined in terms of a set number or volume of
Point records to be added to the ledger – where peers meet to agree the state of
the ledger.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: https://blog.ethereum.org/2015/08/07/on-public-and-private-
blockchains/
Contract Contracts are written in high level language and deployed in byte code. The
Accounts address of a contract is determined at the time the contract is created (it is
derived from the creator address and the number of transactions sent from
(Ethereum)
that address, the so-called “nonce”).
Source: http://solidity.readthedocs.io/en/develop/introduction-to-smart-
contracts.html#accountsibmblockchain_overview.html
Source: https://en.wikipedia.org/wiki/Cryptocurrency
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 14
Any modifications or alterations to transaction input — even the most
minuscule change — results in a different hash value being computed, which
indicates potentially compromised transaction input. Thus, the hash value can
be used to detect the integrity of the transaction input.
Source: http://www.ibm.com/developerworks/cloud/library/cl-blockchain-
basics-glossary-bluemix-trs/index.html
Decentralized are a type of software program designed to exist on the Internet in a way that is
Apps (DAPPS) not controlled by any single entity. For an application to be considered a Dapp it
must meet the following criteria:
Source: https://blockchainhub.net/dapps/
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Digest Access It is a general purpose protocol for authentication that provides integrity
Authentication protection through use of simple authentication and security layer (SASL).
Uses include:
•• Authenticated client access to a Web site
•• Authenticated client access using SASL
•• Authenticated client access with integrity protection to a directory service
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 15
Using LDAP
Source: https://technet.microsoft.com/en-us/library/cc778868(v=ws.10).aspx
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Distributed database in which storage devices are not all attached to a common
Database processor. It may be stored in multiple computers, located in the same
physical location; or may be dispersed over a network of interconnected
computers. Unlike parallel systems, in which the processors are tightly coupled
and constitute a single database system, a distributed database system
consists of loosely coupled sites that share no physical components.
Source: https://en.wikipedia.org/wiki/Distributed_database
Source: https://en.wikipedia.org/wiki/Distributed_ledger
Source: http://www.hkma.gov.hk/media/eng/doc/key-functions/finanical-
infrastructure/Whitepaper_On_Distributed_Ledger_Technology.pdf
Double Double spend refers to a scenario, in the Bitcoin network, where someone
Spending tries to send a bitcoin transaction to two different recipients at the same time.
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 16
However, once a bitcoin transaction is confirmed, it makes it nearly impossible
to double spend it. The more confirmations that a particular transaction has,
the harder it becomes to double spend the bitcoins.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_
Algorithm and https://bitcoinmagazine.com/articles/the-power-of-schnorr-the-
signature-algorithm-to-increase-bitcoin-s-scale-and-privacy-1460642496/
Elliptic Curve is a public key encryption technique based on elliptic curve theory that can
Cryptography be used to create faster, smaller, and more efficient cryptographic keys.
ECC generates keys through the properties of the elliptic curve equation
instead of the traditional method of generation as the product of very large
prime numbers.
Source: http://searchsecurity.techtarget.com/definition/elliptical-curve-
cryptography
Ether is the name of the currency used within Ethereum. It is used to pay for
computation within the EVM. A list of exchanges where Ether is traded can be
found at coinmarketcap.com
Source: http://ethdocs.org/en/latest/ether.html
Double Ethereum is a programmable open blockchain. Rather than give users a set
Spending of predefined operations (e.g. bitcoin transactions), Ethereum allows users
to create their own operations of any complexity they wish. In this way, it
serves as a platform for many different types of decentralized blockchain
applications, including but not limited to cryptocurrencies. At the heart
of it is the Ethereum Virtual Machine (“EVM”), which can execute code of
arbitrary algorithmic complexity. In computer science terms, Ethereum is
“Turing complete”. Developers can create applications that run on the EVM
using friendly programming languages modelled on existing languages like
JavaScript and Python
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 17
Source: http://ethdocs.org/en/latest/introduction/what-is-ethereum.html
External Ethereum Virtual Machine, has concept of External Accounts which are
Accounts given to the external entities (e.g. Humans). External accounts are created
with public-private key pair and the account ID is derived from public
(Ethereum)
key. Account ID is used in transaction messages to address owner and
destination of transactions.
Source: http://solidity.readthedocs.io/en/develop/introduction-to-smart-
contracts.html#accounts
Fiat Currency Legal tender that has been designated as such by government. This requires
that the public has confidence and faith in the government and the money’s
ability to serve as a storage medium for purchasing power.
Source: http://www.dummies.com/personal-finance/investing/how-the-fiat-
system-works/
Fork a regular fork where all nodes follow the same consensus rules, so the fork
is resolved once one chain has more proof of work than another. When two
or more blocks have the same block height, forking the block chain. Typically
occurs when two or more miners find blocks at nearly the same time. Can also
happen as part of an attack.
Source: https://bitcoin.org/en/glossary/soft-fork
Source: http://www.blockchaintechnologies.com/blockchain-glossary
ECDSA Bitcoins have a finite supply, which makes them a scarce digital commodity. The
Signatures total number of bitcoins that will ever be issued is 21 million. The number of bitcoins
generated per block (Block Reward) is decreased 50% every four years. This is called
“halving.” Currently the reward is 12.5 Bitcoins. The next haling in 2020 will drop
the reward to 6.25 per block. The final halving will take place in the year 2140. The
countdown to the final halving can be monitored at http://www.bitcoinblockhalf.com/
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 18
HardFork A permanent divergence in the blockchain, commonly occurs when non-
upgraded nodes can’t validate blocks created by upgraded nodes that follow
newer consensus rules. A hardfork is a change to the blockchain protocol that
makes previously invalid blocks/transactions valid, and therefore requires all
users to upgrade their clients. The most recent example of a hardfork in public
blockchains is the Ethereum hardfork which happened on July 21st 2016.
The hardfork changed the Ethereum protocol, therefore second blockchain
emerged (Ethereum Classic, ETC) which supports the old Ethereum protocol.
In order to continue existing ETC needs miners, which would validate the
transactions on the blockchain.
Digital The number of hashes that can be performed by a bitcoin miner in a given
Commodity period of time (usually a second).
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Hashrate The denomination of hash rates follows the International System of Units (SI).
Denominations kilo-, mega-, giga-, tera-, peta-, exa-
Source: http://molinn.is/.crypt/btc-e/WalletBitcoinMining/bitcoin-mining-
conversion.php
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 19
Intel® is an Intel technology for application developers who are seeking to protect
Software Guard select code and data from disclosure or modification. Intel SGX makes such
protections possible through the use of enclaves, which are protected
Extensions
areas of execution. Application code can be put into an enclave by special
(SGX)
instructions and software made available to developers via the Intel® SGX
Software Development Kit (SDK). The Intel SGX SDK is a collection of APIs,
libraries, documentation, sample source code, and tools that allows software
developers to create and debug Intel SGX.
Source: https://software.intel.com/en-us/sgxcommunity/projects
Interledger The Interledger Protocol provides for routing payments across different
Protocol (ILP) digital asset ledgers while isolating senders and receivers from the risk of
intermediary failures. Secure multi-hop payments and automatic routing
enables a global network of networks for different types of value that can
connect any sender with any receiver.
Source: https://interledger.org/rfcs/0003-interledger-protocol/#preface
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 20
Merged Mining Merged mining is the process of allowing two different crypto currencies
based on the same algorithm to be mined simultaneously. This allows low
hash powered crypto currencies to increase the hashing power behind their
network by bootstrapping onto more popular crypto currencies. Two of the
best examples of this are scrypt mining of both litecoin and dogecoin, as well
as namecoin and bitcoin with sha-256.
Source: https://www.cryptocompare.com/mining/guides/what-is-merged-
mining-bitcoin-namecoin-litecoin-dogecoin/
Merkle Root The root node of a Merkle tree, a descendant of all the hashed pairs in the
tree. Block headers must include a valid Merkle root descended from all
transactions in that block.
Source: https://bitcoin.org/en/glossary/merkle-root
Merkle Tree Basic idea behind Merkle tree is to have some piece of data that is linking
to another. You can do this by linking things together with a cryptographic
hash. The content itself can be used to determine the hash. By using the
cryptographic hashing, we can address the content, and content gets
immutable because if you change anything in the data the cryptographic
hash changes and the link will be different. Bitcoin uses cryptographic
hashing, where every block points to the previous one, if you modify the
block, the hash will change and will make the block invalid.
Source: https://blockchainhub.net/glossary/
Source: http://www.blockchaintechnologies.com/blockchain-mining
Mining The process by which transactions are verified and added to a blockchain.
This process of solving cryptographic problems using computing hardware
also triggers the release of cryptocurrencies.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 21
Mining Pool where the miner pools resources with other miners to find blocks more
often, with the proceeds being shared among the pool miners in rough
correlation to the amount of hashing power they each contributed, allowing
the miner to receive small payments with a lower variance (shorter time
between payments).
Source: https://bitcoin.org/en/developer-guide#mining
Mining Solo where the miner attempts to generate new blocks on his own, with the
proceeds from the block reward and transaction fees going entirely to himself,
allowing him to receive large payments with a higher variance (longer time
between payments)
Source: https://bitcoin.org/en/developer-guide#mining
Multi Signature Multi-signature (multisig) addresses allow multiple parties to require more
than one key to authorize a transaction. The needed number of signatures is
agreed at the creation of the address. Multisignature addresses have a much
greater resistance to theft.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: http://chimera.labs.oreilly.com/books/1234000001802/ch08.html
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 22
Node Each copy of the ledger operated by a participant in the blockchain network.
Entries in the ledger are synchronized to all ledgers in the network.
Source: http://www.ibm.com/developerworks/cloud/library/cl-blockchain-
basics-glossary-bluemix-trs/index.html
Source: https://en.wikipedia.org/wiki/Cryptographic_nonce
Source: https://nxt.org/what-is-nxt/
Off-Ledger A currency minted off-ledger and used on-ledger. An example of this would
Currency be using distributed ledgers to manage a national currency such as EUR.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
On-Ledger A currency minted on-ledger and used on-ledger. An example of this would
Currency be the cryptocurrency, Bitcoin.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 23
Open- This is a collaborative effort to develop a robust, commercial-grade,
Transactions fully-featured, free-software toolkit implementing the OTX protocol as
well as a full-strength financial cryptography library, API, GUI, command-
Project
line interface, and prototype notary server. The project is managed
by a worldwide community of volunteers that use the Internet to
communicate, plan, and develop the Open-Transactions toolkit and its
related documentation.
Source: http://opentransactions.org/wiki/index.php?title=Main_Page
Orphan Block Detached or Orphaned blocks are valid blocks which are not part of the main
chain. They can occur naturally when two miners produce blocks at similar
times or they can be caused by an attacker (with enough hashing power)
attempting to reverse transactions.
Source: https://blockchain.info/orphaned-blocks
Participant An actor who can access the ledger: read records or add records.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Peer An actor that shares responsibility for maintaining the identity and integrity
of the ledger.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 24
3. Avoiding the liquidity shortages and market fluctuations associated with
new currencies
4. Since sidechains are separate systems, technical and economic
innovation is not hindered
5. Despite bidirectional transferability between Bitcoin and pegged
sidechains, they are isolated:
a. in the case of a cryptographic break (or malicious design) in a
sidechain, the damage is entirely confined to the sidechain itself.
Source: https://blockstream.com/sidechains.pdf
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: https://blog.ethereum.org/2015/08/07/on-public-and-private-
blockchains/
Private Key A private key is a string of data that shows you have access to bitcoins in a
specific wallet. Private keys can be thought of as a password; private keys
must never be revealed to anyone but you, as they allow you to spend the
bitcoins from your bitcoin wallet through a cryptographic signature.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 25
Proof of Proof-of-Authority is a replacement for Proof-of-Work, which can be used
Authority (PoA) for private chain setups. It does not depend on nodes solving arbitrarily
difficult mathematical problems, but instead uses a hard-configured set of
“authorities” - nodes that are explicitly allowed to create new blocks and
secure the blockchain. This makes it easier to maintain a private chain and
keep the block issuers accountable. A Proof of authority is a consensus
mechanism in a private blockchain which essentially gives one client (or a
specific number of clients) with one particular private key the right to make
all of the blocks in the blockchain.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Proof-of-Work A system that ties mining capability to computational power. Blocks must be
(PoW) hashed, which is in itself an easy computational process, but an additional
variable is added to the hashing process to make it more difficult. When a
block is successfully hashed, the hashing must have taken some time and
computational effort. Thus, a hashed block is considered proof of work.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Public is a blockchain that anyone in the world can read, anyone in the world can
Blockchain send transactions to and expect to see them included if they are valid, and
anyone in the world can participate in the consensus process – the process
for determining what blocks get added to the chain and what the current
state is. As a substitute for centralized or quasi-centralized trust, public
blockchains are secured by cryptoeconomics – the combination of economic
incentives and cryptographic verification using mechanisms such as proof of
work or proof of stake, following a general principle that the degree to which
someone can have an influence in the consensus process is proportional
to the quantity of economic resources that they can bring to bear. These
blockchains are generally considered to be “fully decentralized”.
Source: https://blog.ethereum.org/2015/08/07/on-public-and-private-
blockchains/
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 26
QR Code A QR code in the case of a Bitcoin transaction is the machine-readable
representation of the transactors bitcoin address. The QR code is a more
efficient and effective method of transferring between parties the the 27
to 34 characters that make up a bitcoin address. The QR code also has the
possibility to display other information such as the amount of the transaction.
Source: https://bitcoin.stackexchange.com/questions/8111/what-are-qr-
codes-and-how-do-you-use-them-as-request-payment-from-wallet and
https://en.wikipedia.org/wiki/QR_code
Replicated A ledger with one master (authoritative) copy of the data, and many slave (non-
Ledger authoritative) copies.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Source: https://ripple.com/technology/
Source: https://bitcoincore.org/en/2017/03/23/schnorr-signature-
aggregation/
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 27
Script is a simple programming language, which is evaluated from left to right
using a stack. The language is designed such that it guarantees all scripts will
execute in a limited amount of time (it is not Turing-Complete).
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Segregated is where data, or more specifically data related to signatures are removed
Witness from bitcoin transactions making them smaller in size. This in turn makes
the blocks smaller meaning more transactions can be included in a block.
(Segwit)
Technically, “Segregated witness (Segwit) is a soft fork that, if activated, will
allow transaction-producing software to separate (segregate) transaction
signatures (witnesses) from the part of the data in a transaction that is
covered by the txid.”
Source: https://decentralize.today/segregated-witness-explained-like-im-5-
c00a8994ea7c#.k3fic6d7n
SHA 256 The SHA (Secure Hash Algorithm) is one of a number of cryptographic hash
functions. A cryptographic hash is like a signature for a text or a data file.
SHA-256 algorithm generates an almost-unique, fixed size 256-bit (32-byte)
hash. Hash is a one way function – it cannot be decrypted back. This makes it
suitable for password validation, challenge hash authentication, anti-tamper,
digital signatures. SHA-256 is one of the successor hash functions to SHA-1,
and is one of the strongest hash functions available.
Source: http://www.xorbin.com/tools/sha256-hash-calculator
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 28
Sharding In a sharding, nodes hold a subset of the state (UTXOs), and a subset of the
blockchain. Instead of miners/validators redundantly doing the same work,
they are going share the load but still have an only economic assurance
even though they’re not going to validate every transaction. For example, a
sharding scheme on Ethereum might put all addresses starting with 0x00
into one shard, all addresses starting with 0x01 into another shard, etc. In a
simple version of the scheme, each user maintains a light client on all shards,
while validators fully download and track a few shards that they are assigned
to at some particular time.
Source: https://diyhpl.us/wiki/transcripts/scalingbitcoin/sharding-the-
blockchain/ and https://github.com/ethereum/wiki/wiki/Sharding-FAQ
Shared Ledger The shared ledger is the single source of truth, or the entire history of
validated transactions, on a blockchain network. Any discrepancies in the
shared ledger across nodes are resolved through consensus. The ledger has
the following attributes:
•• It records all validated transactions on the network.
•• It is shared across all network participants.
•• It is replicated, so that each participant has their own copy.
•• It is permissioned, so that participants can only view their own
transactions.
Source: http://www.ibm.com/developerworks/cloud/library/cl-blockchain-
basics-glossary-bluemix-trs/index.html
Signature is a set of mathematical rules that link the private key, public key and signature
Scheme together. Examples are Schnorr and ECDSA.
Source: https://bitcoinmagazine.com/articles/the-power-of-schnorr-the-
signature-algorithm-to-increase-bitcoin-s-scale-and-privacy-1460642496/
Source: https://bitcoin.org/bitcoin.pdf
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 29
Smart Contract (also called self-executing contracts, blockchain contracts, or digital
contracts) are simply computer programs that act as agreements where
the terms of the agreement can be preprogrammed with the ability to self-
execute and self-enforce itself. The main goal of a smart contract is to enable
two anonymous parties to trade and do business with each other, usually
over the internet, without the need for a middleman. The origin and history
of smart contracts is much older than bitcoin and dates back to the 1990’s.
The term ‘smart contract’ was first coined in 1993 by one of bitcoin’s alleged
creators, Nick Szabo, and referred to self-automated computer programs
that can carry out the terms of any contract.
Source: http://www.blockchaintechnologies.com/blockchain-smart-
contracts#smart-contract-explained
SoftFork A SoftFork is a change to the bitcoin protocol wherein only previously valid
blocks/transactions are made invalid. Since old nodes will recognize the new
blocks as valid, a SoftFork is backward-compatible.
Source: https://bitcoin.org/en/glossary/soft-fork
Source: http://solidity.readthedocs.io
SPV (Simplified Simplified Payment Verification. A Bitcoin protocol feature that is usually
Payment implemented in wallets. It allows the creation of “lightweight” wallet clients
- wallets that don’t need to download the whole blockchain in order to
Verification)
operate. This makes it possible to install SPV wallets on mobile phones and
other space limited devices.
Source: https://bitcoin.org/en/glossary/simplified-payment-verification
Swarm Swarm is a distributed storage platform and content distribution service, a native
base layer service of the Ethereum web 3 stack. The primary objective of Swarm
is to provide a decentralized and redundant store of Ethereum’s public record, in
particular to store and distribute Dapp code and data as well as block chain data.
Source: http://swarm-gateways.net/bzz:/theswarm.eth/
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 30
Tainted % The taint percent for a bitcoin is the amount of correlation between two
Bitcoin addresses. In other words, how likely the two addresses are related.
Source: https://blockchain.info/taint/1dice6GV5Rz2iaifPvX7RMjfhaNPC8SXH
Source: https://www.gipp.com/wp-content/papercite-data/pdf/gipp15a.pdf
and https://app.originstamp.org/home
Timestamp Initially, the original data is hashed. Hashing authenticates the exact data
Trusted content, because the hash function ensures that changing a single bit in
the data would generate a different hash value. The hash is then transmitted
to a TSA, which joins the hash with a plain text timestamp. The resulting string,
i.e. the hash combined with the timestamp, is hashed once more and digitally
signed using the TSA’s private key. The resulting ciphertext represents the
trusted timestamp, which, together with the plain text timestamp, is returned
to the requester. The validity of the trusted timestamp can be verified by
decoding the ciphertext using the public key of the TSA. To verify that some data
is identical to the data authenticated by the TSA, the process of creating the
trusted timestamp has to be replicated and the results have to be compared to
the decoded trusted timestamp. The need for a central TSA is a weakness of
established timestamping approaches, since the integrity of the timestamping
process is inevitably bound to the integrity of the TSA (Adams et al., 2001).
Source: https://www.gipp.com/wp-content/papercite-data/pdf/gipp15a.pdf
Tokenless A tokenless ledger refers to a distributed ledger that doesn’t require a native
Ledger currency to operate.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 31
Tokens Asset- Asset backed tokens are claims on an underlying asset.
Backed
Source: https://bitsonblocks.net/2015/09/28/a-gentle-introduction-to-digital-
tokens/#more-130
Tokens Intrinsic (also known as ‘native or ‘built-in’ tokens) are made-up resources that have
some utility. Bitcoin for example. Even though they are traded there is no
claim to an asset.
Source: https://bitsonblocks.net/2015/09/28/a-gentle-introduction-to-digital-
tokens/#more-130
Traditional a data system that already exists which may impact the behavior of smart
Data Source contracts.
Source: https://www.docdroid.net/zNAiO8Z/exploring-hyperledger-
applications.pdf.html
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
Transaction A collection of transactions on the bitcoin network, gathered into a block that
Block can then be hashed and added to the blockchain.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Transaction Fee A small fee imposed on some transactions sent across the bitcoin network.
The transaction fee is awarded to the miner that successfully hashes the block
containing the relevant transaction.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 32
Transactions A transaction that has been added to the blockchain and is irreversible.
Confirmed
Source: https://blockchain.info/wallet/bitcoin-faq
(CTXNs)
Transactions It means that the transaction has not yet been included in the blockchain,
Unconfirmed and is still reversible. A transaction typically takes around 10 minutes to be
confirmed. When that happens, it is said that one confirmation has occurred
(UTXNs)
for the transaction. With each subsequent block that is found, the number
of confirmations is increased by one. To protect against double spending, a
transaction should not be considered as confirmed until a certain number of
confirmations is seen.
Source: https://blockchain.info/wallet/bitcoin-faq
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
Trusted a trusted third party that issues timestamps. These timestamps prove when
Stamping data existed (e.g. contracts, medical records, and prevents backdating by
the data’s owners. Blockchain does not need TSAs because transactions are
Authority (TSA)
included in blocks which are generated every 10 minutes (on average) and
you get a block’s timestamp for all its transactions.
Source: https://blog.signatura.co/using-the-blockchain-as-a-digital-signature-
scheme-f584278ae826
Turing A machine is Turing complete if it can perform any calculation that any other
Completeness programmable computer is capable of. All modern computers are Turing-
complete in this sense. The Ethereum Virtual Machine (EVM) which runs on the
Ethereum blockchain is Turing complete. Thus, it can process any “computable
function”. It is, in short, able to do what you could do with any conventional
computer and programming language.
Source: https://blockchainhub.net/glossary/
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 33
Unpermissioned Unpermissioned ledgers such as Bitcoin have no single owner — indeed,
(Permissionless) they cannot be owned. The purpose of an unpermissioned ledger is to allow
anyone to contribute data to the ledger and for everyone in possession of
Ledgers
the ledger to have identical copies. This creates censorship resistance, which
means that no actor can prevent a transaction from being added to the ledger.
Participants maintain the integrity of the ledger by reaching a consensus about
its state dynamically in real-time.
Source: http://www.blockchaintechnologies.com/blockchain-glossary
Unspent Bitcoin phrase for output or the amount that is sent through a standard
Transaction transaction to a Bitcoin address with a set of rules to unlock the output amount.
Output (UTXO)
Source: https://www.cryptocoinsnews.com/bitcoin-transaction-really-works/
User Agent user agent fields embedded in the each node’s software contain information
related to the version and codebase the nodes are using. These fields are
exchanged between 2 nodes anytime contact is made. By reading and
summarizing these fields for all nodes a conclusion can be reached regarding
the health of the network. For Example: Node 1: /Satoshi:5.64/bitcoin-qt:0.4/
Node 2: /Satoshi:5.12/Spesmilo:0.8/. Both nodes use the same protocol
version of Bitcoin software but they use different versions of the codebase.
User-facing- The top layer is the user-facing application that meets the needs of the
application network participants. The application lets users invoke smart contracts that
trigger transactions in the business network.
Source: http://www.ibm.com/developerworks/cloud/library/cl-blockchain-
basics-glossary-bluemix-trs/index.html
Validating Peer A network node that runs the consensus protocol for the network to validate
transactions and maintain the ledger. Validated transactions are appended
to the ledger, in blocks. If a transaction fails consensus, it is purged from
the block and therefore, not written to the ledger. A validating peer (VP) has
authority to deploy, invoke and query chaincode.
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 34
Virgin Bitcoin All bitcoins start out as virgins, and stay that way until the second they are
moved to another address. When new bitcoins are mined, they are noted on
the blockchain in the first transaction in a block. This is called the coinbase
transaction, (nothing to do with the popular bitcoin wallet coinbase). These
bitcoins are always created by a miner, and they include a single coinbase (or
coinbase field) as the sole input for coinbase transactions. The purpose of the
coinbase is to allow the miner who solved the block to claim the block reward,
which is currently 12.5 bitcoins.
Source: https://ihb.io/2015-07-30/news/virgin-bitcoins-8248
Wallet DDOS A DDOS attack can be made by using wallets, of which there are an estimated
12.8 million wallet users, pushing spam transactions to a targeted network.
Denial of service results from increased processing due to the nodes verifying
the validity of the transactions.
Wallet A bitcoin wallet that uses a physical piece of hardware in order to operate and
Hardware keep it more secure. Examples of hardware wallets are TREZOR, LedgerWallet
and Keepkey. A hardware wallet is usually more secure since it’s considered to
be a form of cold storage.
Source: https://99bitcoins.com/bitcoin-glossary-faq/
Wallet Hot Any Bitcoin wallet that is connected to the Internet. Hot wallets are
considered far less secure than cold storage since they can be hacked easier
due to their connectivity.
Source: https://99bitcoins.com/bitcoin-glossary-faq/
Weak Key Risk is the risk that the Key generation method used is faulty allowing the
attacker to duplicate the key gaining access to the objective (wallet,etc.).
For example a poor random number generator (RNG) can create the same
‘random’ number on more than one occasion. When the transaction is
hashed, this number is multiplied by the same generator point (ie: same
random number) as the public key. Since one unknown has been removed
from the equation, the private key can be revealed by effectively reversing
the hash through additional mathematical operations.
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 35
Source: https://www.enisa.europa.eu/publications/blockchain-security and
http://www.coindesk.com/open-source-tool-identifies-weak-bitcoin-wallet-
signatures/
Wei “Sathosi” is the smallest unit of coin in Bitcoin blockchain system, likewise “Wei”
is the smallest unit in Ethereum coin, which is equal to 0.000000000000000001
ether (1 Ether = 1000000000000000000 Wei). There are other units as well
wei, Kwei, Mwei, szabo, finney, Kether, Mether, Gether and Tether.
Source: http://ether.fund/tool/converter
World State Key-value database used by chaincodes to store their state when executed
by a transaction.
Source: https://console.ng.bluemix.net/docs/services/blockchain/
ibmblockchain_overview.html
XBT is the unofficial ISO 4217 currency code. ISO 4217 is the International
Standard for currency codes. You can find XBT traded on https://www.
bloomberg.com/quote/COINXBT:SS and http://www.xe.com. BTC is still the
most often used code for Bitcoin and is listed on https://www.oanda.com/
currency/converter/ as well as in the form of a trust on http://www.nasdaq.
com/symbol/gbtc that invests in Bitcoin.
Source: http://www.coindesk.com/bitcoin-gaining-market-based-legitimacy-xbt/
Zero are transactions that are not yet included in a block. They reside in the miners
Confirmation memory pool. Once included in a block and written to the block chain the
transaction has one confirmation.
Transaction
Source: https://www.cryptocoinsnews.com/zero-confirmation-transactions-safe/
Source: https://en.wikipedia.org/wiki/Zero-knowledge_proof
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 36
ZkSNARK (Zero- are the cryptographic tools underlying Zcash (open, permissionless
knowledge cryptocurrency protecting privacy of transactions using zero-knowledge
cryptography). They are proofs that you have performed a computation over
Succinct Non-
some inputs without revealing all of the inputs. Zcash uses these proofs to
interactive
verify transactions while protecting users’ privacy.
ARguments of
Knowledge) Source: https://z.cash/blog/zksnarks-in-ethereum.html and https://z.cash/
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 37
Further Reading
Website Description
The above table lists websites that provide in depth technical, financial and operational information
concerning all aspects of Blockchain/Distributed Ledger technology.
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 38
Examples of Public Blockchain Companies
Source: http://investingnews.com/daily/tech-investing/fintech-investing/7-blockchain-technology-stocks/
The above table lists 7 Blockchain/Distributed Ledger Technology companies that have made it to the
public markets via an IPO or other means (restructuring). These are just a handful of examples at the
time of the publication of this document.
Blockchain/Distributed Ledger Working Group Glossary © Copyright 2016, Cloud Security Alliance. All rights reserved 39