ZeraLabs logo

Pre-migration documentation. This site reflects the pre-migration state of the protocol. It’s mostly current, but a few edges may not match ZERA at launch. We’re finalizing the new, detailed ZERA docs now. Thanks for your patience.

Glossary & Reference

A comprehensive guide to the technical concepts behind zero‑knowledge cash

This glossary explains the math, cryptography, and systems concepts used throughout the protocol in clear, approachable language – without academic jargon.

Explore by Topic

Core Mathematical Concepts

Groups

Algebraic structures with one operation satisfying closure, associativity, identity, and inverses. Foundation for secure crypto operations.

Example: (Z, +) — integers under addition form a group
Elliptic Curves

Points on curves of the form y² = x³ + ax + b form groups under geometric addition. Ideal for compact, efficient cryptography.

Example: secp256k1 uses y^2 = x^3 + 7
Finite Fields

Arithmetic on a finite set where operations wrap within the set. Basis for modular arithmetic and many crypto constructions.

Example: Z_p — integers modulo prime p

Cryptographic Foundations

Digital Signatures

Proof that a message was created by someone with a specific private key, without revealing the key.

Example: ECDSA produces (r, s) from a message hash and private key
Hash Functions

One‑way functions mapping arbitrary input to fixed‑length output with preimage and collision resistance.

Example: SHA256 with 512‑bit blocks and compression
Pedersen Commitments

Commitment scheme with perfect hiding and homomorphic addition on elliptic curves.

C(m, r) = g^m · h^r // homomorphic: C(m1, r1) · C(m2, r2) = C(m1+m2, r1+r2)

Privacy‑Preserving Technologies

Zero‑Knowledge Proofs

Prove that a statement is true without revealing underlying secrets. Built on completeness, soundness, and zero‑knowledge.

Idea: Prove knowledge of x such that g^x = Y without revealing x
Range Proofs

Show that a committed value lies within a range without revealing it. Used to prove amounts are non‑negative and bounded.

Example: Prove 0 ≤ v < 2^64 for a commitment C = g^v h^r

Blockchain & Consensus Systems

Merkle Trees & Proofs

Binary hash trees that enable compact inclusion proofs. Any change to leaves changes the root.

Inclusion: leaf → ...root (O(log n) siblings)

System Architecture Components

Distributed Key Generation

Threshold protocols that create a public key while keeping private key shares distributed among participants.

Pedersen DKG: verifiable shares + polynomial commitments

Security Models & Assumptions

Discrete Logarithm Assumption

States that computing x from g^x is intractable in appropriately chosen groups. Underpins signatures and commitments.

Hard problem: given (g, g^x), find x

Recommended Reading Path

  1. Core Mathematical Concepts — build algebra and group theory basics
  2. Cryptographic Foundations — understand signatures, hashes, commitments
  3. Privacy‑Preserving Technologies — learn ZK proofs and range proofs
  4. Blockchain & Consensus Systems — distributed systems and finality
  5. System Architecture Components — how components fit together
  6. Security Models & Assumptions — theoretical foundations
  7. Performance & Implementation — practical considerations

Key Concepts to Explore

What Is Zero-Knowledge Cash?

A simple explanation of privacy‑preserving money

The Privacy Problem

Why traditional cryptocurrencies reveal everything

How It Works

How zero‑knowledge proofs create privacy

Real-World Applications

Where and how ZKC can be used