Blockchain: A decentralized, append-only database that maintains a
cryptographically secured chain of blocks containing transaction records. Each
block is linked to its predecessor through cryptographic hashing, ensuring
immutability and transparency across the network.Smart Contract: Self-executing computer programs on a blockchain that
automatically enforce and execute agreements. Think of them as digital vending
machines that run exactly as programmed.L1 (Layer 1): A base blockchain network like Ethereum or Ritual Chain that
handles its own transaction validation and security.On-chain: Data or computations that exist directly on the blockchain’s
virtual machine.Off-chain: Data or computations that exist outside the blockchain’s virtual
machine, and are brought on-chain as needed.Cross-chain: The ability to execute transactions and transfer assets between
different blockchain networks while maintaining security and atomicity. This
enables interoperability and composability across diverse blockchain ecosystems.
See how we enable this in
Chain Abstraction.EOA (Externally Owned Account): A regular blockchain account controlled by a
private key, like your personal wallet.Staking: The process of locking up tokens as collateral to participate in
network consensus, validation, or other protocol functions. Staked tokens can be
slashed for malicious behavior, creating economic security. Related to our
Economic Design.ZK (Zero-Knowledge) Proof: A method to prove something is true without
revealing the underlying information.
EVM: The Ethereum Virtual Machine, a Turing-complete state machine that
executes smart contract bytecode in a sandboxed environment. It maintains
deterministic execution across all network nodes while managing gas consumption
and state transitions. Learn more about our extended version at
EVM++.EVM++: Ritual’s enhanced version of the EVM that adds native support for AI
operations, scheduled transactions, and advanced features while maintaining
backward compatibility. This enables sophisticated smart contracts with built-in
AI capabilities. Learn more in EVM++ Overview.Symphony Protocol: A consensus protocol that implements dual proof sharding,
distributed verification, and optimal sampling to reduce redundant execution. It
enables the execute-once-verify-many-times paradigm while maintaining security
guarantees. Learn more in Symphony.Resonance Mechanism: A dynamic fee mechanism that matches compute supply
with demand through a market-driven approach. It optimizes resource allocation
by considering workload characteristics and node specialization. See details in
Resonance.EOVMT (Execute-Once-Verify-Many-Times): An optimization protocol where
complex computations are executed by one node and verified efficiently by others
through cryptographic proofs. This reduces network-wide computational redundancy
while maintaining security. Learn more in Symphony.
Node Specialization: A network architecture that allows nodes to optimize
for specific types of computation (AI, ZK, TEE) while maintaining network
consensus participation. This enables efficient resource allocation and parallel
processing of heterogeneous workloads. Learn more in
Node Specialization.Proof Sharding: A technique in Symphony that distributes the verification of
computation proofs across different node subsets to improve scalability and
efficiency. See our implementation in
Symphony.Distributed Verification System: A component of Symphony that enables
efficient verification of complex computations through proof partitioning and
committee-based consensus. See our approach in
Symphony.Execution Sidecar: A modular component that handles specialized computation
tasks asynchronously from the main chain. Sidecars enable complex operations
while maintaining EVM compatibility and security guarantees. Learn more in
Execution Sidecars.Chain Abstraction Layer: A protocol layer that enables seamless interaction
between different blockchain networks while maintaining security and consistency
guarantees. See details in
Chain Abstraction.
Model Inference: The process of using a trained AI model to generate outputs
from new inputs. This includes preprocessing inputs, running them through the
model’s computational graph, and post-processing outputs. Learn about our
implementation in AI Primitives.Fine-tuning: A machine learning technique that adapts a pre-trained model to
a specific task by updating its parameters with new data. This preserves the
model’s base knowledge while optimizing for targeted use cases. See our approach
in AI Primitives.Verifiable Model Training: The process of training AI models with
cryptographic guarantees of correctness and provenance, using techniques like
watermarking and backdoors. Learn more in
Verifiable Provenance.Enshrined Model: An AI model that is natively represented on-chain as a
first-class citizen, enabling direct smart contract integration and verifiable
execution. Learn more in
Enshrined AI Models.
TEE (Trusted Execution Environment): A secure hardware enclave that isolates
sensitive computations from the main system. TEEs provide confidentiality and
integrity guarantees through hardware-based encryption and attestation. See our
implementation in TEE Execution.ZKML (Zero-Knowledge ML): A system that combines zero-knowledge proofs with
machine learning to verify model computations without revealing inputs, weights,
or intermediate values. This enables private and verifiable AI execution. See
our implementation in
ZK Proving and Verification.OPML (Optimistic-ML): A verification system that assumes AI computations are
correct by default but allows for challenge periods. Challengers can dispute
results by providing counter-examples, leading to efficient verification of
large models. See AI Primitives.PPML (Probabilistic Proof ML): A verification approach that uses statistical
properties and backdoors in ML models to prove training authenticity and detect
unauthorized modifications. This provides efficient verification for model
provenance. Learn more in
Verifiable Provenance.Modular Computational Integrity: A flexible system that allows developers to
choose and combine different verification approaches (ZKML, OPML, PPML) based on
their specific needs. See our implementation in
Modular Computational Integrity.
Oracle: A bridge between blockchains and external data sources that enables
smart contracts to access off-chain information in a secure and verifiable way.
Oracles validate and authenticate external data before making it available
on-chain. See how Ritual implements oracles in
Enshrined Oracles.Infernet: A decentralized oracle network specifically designed for bringing
verified AI computation on-chain. It provides secure model execution, result
verification, and cross-chain integration capabilities. See
Infernet to Chain.Agent Launchpad: A platform for deploying and managing autonomous agents
with built-in economic incentives and security guarantees. It provides
standardized interfaces and safety mechanisms for agent-protocol interactions.
See Agents.Model Registry: A decentralized system for registering, tracking, and
managing AI models on-chain. It handles model versioning, ownership, and
provenance verification. Learn more in
Enshrined AI Models.Model Marketplace: A decentralized platform for trading AI models with
built-in provenance tracking, licensing, and automated revenue distribution.
Learn more in Model Marketplace.Ritual Guardians: A specialized node system that monitors network health and
verifies complex computations. Guardians form a security layer complementing
traditional validators, particularly for heterogeneous workloads. See
Guardians.Ritual Portals: Cross-chain bridges built on GMP protocols that enable
secure access to Ritual’s specialized compute capabilities from any blockchain.
Portals handle message verification, state synchronization, and result delivery.
Learn more in Ritual to World.Modular Storage: A flexible storage architecture that supports multiple
backend solutions while providing a unified interface for developers. This
enables optimization for different data types while maintaining consistency and
availability. See Modular Storage.Provenance: A comprehensive system for tracking and verifying the complete
lifecycle of digital assets, including creation, ownership transfers, and
modifications. This enables trust and accountability in decentralized systems.
See our approach in
Verifiable Provenance.