Blockchain Transactions, Keys, Signatures, ZK-SNARKs

0.0(0)
studied byStudied by 3 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Blockchain Wallet

A digital tool that allows users to manage, store and interact with crypto assets.

2
New cards

What is a public key?

Cryptographic code derived from the private key used to generate a wallet address and receive finds. Meant to be shared publicly.

3
New cards

What is a private key?

A secret cryptographic code that signs transactions and proves ownership of funds. Must be kept secret.

4
New cards

What is a cold wallet?

Offline wallet.

5
New cards

Pros of cold wallet

very secure

6
New cards

Cons of cold wallet

less convenient

7
New cards

What is a hot wallet?

wallet connected to the internet

8
New cards

Pros of hot wallet?

Convenience

9
New cards

Cons of hot wallet?

prone to hacks

10
New cards

What is a custodial wallet?

A service provider controls keys. (Coinbase etc)

11
New cards

Pros of custodial wallet?

convenience

12
New cards

Cons of custodial wallet?

lack of control & trust dependency

13
New cards

What is a non-custodial wallet?

A wallet where the user controls their private keys.

14
New cards

Pros of non-custodial wallet

Full ownership

15
New cards

Cons of non-custodial wallet

more responsibility

16
New cards

What are the main steps of blockchain transactions?

Sender creates transactions > Broadcast to network > Miners validate > Added to blockchain > Receiver obtains funds

17
New cards

What is a block explorer?

A tool showing transaction details, block information, balances and mining data on a blockchain. eg Solscan

18
New cards

What is double spending?

When the same cryptocurrency is spent more than once. Prevented by consensus, confirmation, and economic penalties

19
New cards

How can double spending happen?

Broadcasting two transactions at once

Attempting to reverse a transaction

20
New cards

How does blockchain prevent double spending?

Network-wide validation
Mining & confirmations
High cost of reversing a block
Economic penalties in PoS systems

21
New cards

What is a nonce in mining?

A number used once, adjusted by miners to find a valid hash for a block

22
New cards

What does a nonce do in a transaction (ETH)?

Ensures each transaction from a wallet is unique; prevents replay attacks > duplicate transactions are rejected

23
New cards

What is asymmetric cryptography?

A system using a public key + private key for encryption, signing and verification.

24
New cards

How are digital signatures created?

Private key encrypts the message hash > Receiver uses public key to verify the hash matches.

25
New cards

What does a digital signature prove?

The sender is authentic
The message wasn’t tampered with 

26
New cards

How does encryption differ depending on the key used?

Private > public decrypts > verifies sender
Public > private decrypts > keeps message confidential to receiver

27
New cards

What does ZK-SNARK stand for?

Zero-Knowledge Succinct Non-Interactive Argument of Knowledge

28
New cards

What is zero knowledge proof?

A method to prove knowledge of something without revealing the information itself.

29
New cards

What is a key feature of SNARKs?

Very small. fast verifiable proofs
No interaction needed between prover and verifier

30
New cards

Application of ZK-SNAKRs

Privacy transactions

Scalability
Confidential blockchain voting system

31
New cards

What is symmetric encryption?

One key use for both encryption and decryption; fast; key sharing beforehand. Used in private blockchians. 

32
New cards

Examples of symmetric encryption?

AES, Triple DES, Blowfish

33
New cards

What is asymmetric encryption?

Uses a public key for encryption and private key for decryption; used in public blockchain verification. 

34
New cards

Common asymmetric algorithms

RSA, Elliptic Curve Cryptography

35
New cards

Why is ECC preferred over RSA?

Provides the same security with much smaller key sizes > more efficient.