Appendix G. Glossary of Terms & Notation
Copy/paste (plain text):
Jason St George. "Appendix G. Glossary of Terms & Notation" in Next‑Gen Store of Value: Privacy, Proofs, Compute. Version v1.0. /v/1.0/read/appendix/g-glossary/ Appendix G: Glossary of Terms & Notation
Triad: Privacy, Proofs, and Compute — the three cryptographic capacities that can function as monetary primitives.
VerifyPrice(W): A public KPI vector measuring the cost and time to verify workload W.
VerifyReach(N,R): Metrics for network reachability under censorship conditions.
VerifySettle(C): Metrics for settlement success and safety on corridor C.
r(W): Verification overhead ratio — v(W)/p(W), where v is verification cost and p is production cost.
Work Credit: A claim on standardized units of triad work (privacy settlement, proof generation, or verified compute) produced and attested under public SLOs.
PIDL: Proof Interface Definition Language — the minimal receipt schema for proofs and settlements.
PaL: Proofs-as-a-Library — SDK that compiles claims to proofs.
PRK: Privacy Rails Kit — executes non-custodial, refund-safe settlement over privacy corridors.
FER: Facility Energy Receipt — signed summary of a site’s energy use over a time interval.
PoUW: Proof of Useful Work — consensus mechanism where block rewards are earned by producing verifiable receipts of useful compute.
SLO: Service Level Objective — published targets for system performance and availability.
Bronze/Silver/Gold: SLA tiers for proof and settlement services with different latency, redundancy, and interruptibility characteristics.
MatMul-PoUW: Proof of Useful Work construction based on matrix multiplication verification.
ZK Money: Instruments primarily referencing Privacy + Proofs (shielded settlement capacity, ZK proof capacity).
AI Money: Instruments primarily referencing Compute + Proofs (verified FLOPs, inference capacity).
Layer 0: Verifiable Machines & Energy — open hardware and sampled supply chains as base reality.
Layer 1: Reachability — communications and transport resilience.
Layer 2: Distribution & Execution — software supply and runtime.
Layer 3: Identity & Claims — pseudonymous credentials without doxxing.
Layer 4: Truth & Work — proof systems, PoUW, VerifyPrice.
Layer 5: Value & Settlement — privacy rails and non-custodial flow.
Layer 6: Governance & Telemetry — keeping neutrality and resilience measurable.
Tip: hover a heading to reveal its permalink symbol for copying.