Next‑Gen SoV

Appendix G. Glossary of Terms & Notation

v1.0
Cite this section

Copy/paste (plain text):

Jason St George. "Appendix G. Glossary of Terms & Notation" in Next‑Gen Store of Value: Privacy, Proofs, Compute. Version v1.0. /v/1.0/read/appendix/g-glossary/

Appendix G: Glossary of Terms & Notation

Triad: Privacy, Proofs, and Compute — the three cryptographic capacities that can function as monetary primitives.

VerifyPrice(W): A public KPI vector measuring the cost and time to verify workload W.

VerifyReach(N,R): Metrics for network reachability under censorship conditions.

VerifySettle(C): Metrics for settlement success and safety on corridor C.

r(W): Verification overhead ratio — v(W)/p(W), where v is verification cost and p is production cost.

Work Credit: A claim on standardized units of triad work (privacy settlement, proof generation, or verified compute) produced and attested under public SLOs.

PIDL: Proof Interface Definition Language — the minimal receipt schema for proofs and settlements.

PaL: Proofs-as-a-Library — SDK that compiles claims to proofs.

PRK: Privacy Rails Kit — executes non-custodial, refund-safe settlement over privacy corridors.

FER: Facility Energy Receipt — signed summary of a site’s energy use over a time interval.

PoUW: Proof of Useful Work — consensus mechanism where block rewards are earned by producing verifiable receipts of useful compute.

SLO: Service Level Objective — published targets for system performance and availability.

Bronze/Silver/Gold: SLA tiers for proof and settlement services with different latency, redundancy, and interruptibility characteristics.

MatMul-PoUW: Proof of Useful Work construction based on matrix multiplication verification.

ZK Money: Instruments primarily referencing Privacy + Proofs (shielded settlement capacity, ZK proof capacity).

AI Money: Instruments primarily referencing Compute + Proofs (verified FLOPs, inference capacity).

Layer 0: Verifiable Machines & Energy — open hardware and sampled supply chains as base reality.

Layer 1: Reachability — communications and transport resilience.

Layer 2: Distribution & Execution — software supply and runtime.

Layer 3: Identity & Claims — pseudonymous credentials without doxxing.

Layer 4: Truth & Work — proof systems, PoUW, VerifyPrice.

Layer 5: Value & Settlement — privacy rails and non-custodial flow.

Layer 6: Governance & Telemetry — keeping neutrality and resilience measurable.

Tip: hover a heading to reveal its permalink symbol for copying.