Skip to main content

Glossary

TermDefinition
aghostThe base unit of the GHOST token. 1 GHOST = 10^18 aghost. Equivalent to wei in Ethereum.
Access proofA non-destructive ZK proof that proves knowledge of a commitment without consuming it. Used for persistent key access.
AssetGuardSmart contract that maintains the whitelist of tokens authorized for Ghost Protocol operations.
Blinding factorA random value included in the commitment preimage to prevent grinding attacks.
BN254The elliptic curve (also called alt_bn128) used for Groth16 proof verification. Supported natively by Ethereum precompiles.
CometBFTThe Byzantine Fault Tolerant consensus engine used by Specter. Provides instant finality.
CommitmentA Poseidon hash of secret inputs (secret, nullifierSecret, tokenIdHash, amount, blinding). Stored in the Merkle tree.
CommitRevealVaultThe central smart contract that orchestrates all Ghost Protocol commit and reveal operations.
CommitmentTreeAn append-only Merkle tree (depth 20, ~1M capacity) that stores all commitments.
Ghost ProtocolSpecter's core privacy primitive — a commit-reveal system using ZK proofs for unlinkable token transfers.
GhostERC20A privacy-enabled ERC20 token with vault-controlled mint/burn functions.
GhostmintThe precompile at address 0x0808 that enables smart contracts to mint and burn native GHOST tokens.
GHOST tokenThe native gas and staking token of the Specter network.
Groth16A zero-knowledge proof system with constant-size proofs (256 bytes) and fast verification.
Merkle treeA hash tree structure used to prove set membership. Specter uses depth-20 Poseidon Merkle trees.
NativeAssetHandlerThe smart contract authorized to call the Ghostmint precompile on behalf of the CommitRevealVault.
NullifierA value derived from the user's nullifierSecret and leaf index. Registered on-chain to prevent double-reveals.
NullifierRegistrySmart contract that tracks spent nullifiers.
Open ProtocolA variant of Ghost Protocol for public data commitments (no privacy, but integrity and provenance).
Phantom KeysA key management system using access proofs for persistent, reusable key storage.
PolicyA smart contract implementing IRevealPolicy that enforces conditions on reveals (timelocks, restrictions, etc.).
PolicyRegistrySmart contract that maps commitments to their associated reveal policies.
PoseidonA ZK-friendly hash function used for commitments and Merkle tree nodes.
PoseidonT3The on-chain Poseidon hash library (arity 2, ~55KB bytecode).
RevealThe process of proving knowledge of a commitment's preimage and minting fresh tokens.
Root updaterA relayer service that maintains the Merkle tree off-chain and submits updated roots on-chain.
ShardedTreeRegistryA registry managing 16 parallel Merkle trees for scaling.
snarkjsA JavaScript library for generating and verifying Groth16 ZK proofs.
specterdThe Specter node binary (CLI + daemon).
Trusted setupThe ceremony that generates the Groth16 proving and verification keys.