Hello World
Glossary
A full glossary of terms used in Verity documentation
Term | Definition |
---|---|
Verity | A data security infrastructure solution that enables developers to verify data authenticity, integrity, and transformation, creating verifiable data pipelines between traditional systems and blockchains. |
Verity Prover Orchestrator | The process created by the Developer to orchestrate the data pipeline, using the Verity Client to interface with the Verity Prover. |
Verity Prover Proxy | A proxy node for generating MPC-TLS proofs. |
Verity Client | A client interface used to interact with the Verity Prover and manage data pipeline orchestration. |
Verity Notary | A node that verifies TLS proofs generated by the Prover, ensuring the integrity and authenticity of the data. |
Verity Network | A network of nodes, including Provers and Notaries, that collectively collaborate over a protocol to verify data authenticity, integrity, and transformation. |
Verity CLI | A command-line interface for operating Verity Network Nodes and verifying TLS proofs. |
Verity Data Processor (VDP) | A framework that provides libraries and tools to process multiple TLS attestations into a verifiable output via a zkVM, ensuring scalability and efficiency. |
zkTLS | A protocol that combines Zero-Knowledge (ZK) and Multi-Party Computation (MPC) cryptographic primitives to cryptographically prove data authenticity for TLS-enabled sources. |
Data Flow Proofs (DFPs) | Cryptographically verifiable proofs of data flow, ensuring that data is sourced and processed according to predefined logic. Used interchangeably with zkTLS proofs. |
Verifiable Data Processing Environment (VDPE) | An environment, such as a zkVM or a decentralised replicated compute platform, where data processing logic is executed and verified. |
Oracle Integrations | Collaborations with Decentralised Oracle Networks (DONs) and Data Delivery Networks (DDNs) to integrate zkTLS proofs into blockchain systems, simplifying the delivery of private data on-chain. |
zkRollup | A method of consolidating numerous TLS attestations into a single verifiable proof via ZK VDPE. |
TLS Proof | A cryptographic proof generated by the Verity Prover to verify the authenticity and integrity of data sourced from TLS-enabled endpoints. Used interchangeably with MPC-TLS proofs. |
MPC-TLS | An implementation of TLS that uses Multi-Party Computation to ensure data authenticity and integrity. |
Verifier | The coordination and verification layer of the Verity network, ensuring non-collusion and authorised notary selection. |
Proof Precomputation | The process of extracting and processing public elements from TLS proofs to optimise ZK computations and minimise proving times. |
Proof Verification & Conversion | The process of verifying TLS proofs and facilitating conversions to cryptographic formats like tECDSA for reduced ZK computational load and wider compatibility with destination systems. |
Source | A TLS-enabled HTTP endpoint, either third-party or first-party data owned by the Prover, from which data is sourced. May also be first-party data provided directly. |
Destination | Typically a blockchain for trustless final verification, but may also include centralised systems for data analysis, trust management, and cybersecurity applications. |
zkVM | A virtual machine that uses Zero-Knowledge proofs to verify computations, ensuring data privacy and integrity. |
Decentralised Oracle Networks (DONs) | Networks that decentralise trust in data sourcing, enabling the delivery of real-world data to blockchains. |
Data Delivery Networks (DDNs) | Networks that facilitate the delivery of data feeds to multiple parties, often used in conjunction with Oracle technologies. |
IC (Internet Computer) | A decentralised and replicated compute platform that enables the processing of data in a verifiable manner. It uses Chain-key cryptography to facilitate secure and efficient computation, allowing for the integration of real-world data into blockchain systems. |
Chain-key Cryptography | A cryptographic primitive specific to the Internet Computer (IC) that combines several advanced cryptographic techniques, including MPC, TSS, and DKG, to produce portable cryptographic outputs. |