Verifier (ZK)

Smart contract or program that checks a zero knowledge or validity proof using a verification key, returning true if the proof is correct.

Verifiable Presentation

Package of one or more verifiable credentials shown to a verifier, may use selective disclosure or zero knowledge to reveal only required attributes.

VC, Verifiable Credential

W3C data model for cryptographically signed claims that can be privately presented and verified without contacting the issuer, often used with DIDs.

Validity Proof

Cryptographic proof that a state transition is correct without re executing it, used in zk rollups and validium systems to ensure safety with minimal on chain work.

Verkle Tree

Commitment tree using vector commitments to reduce proof size and speed state proofs compared to Merkle Patricia tries, proposed for Ethereum state.

Volition

Hybrid L2 approach letting users choose between on chain data availability like a rollup or off chain like a validium on a per transaction basis.

Validium

L2 design that uses validity proofs for state transitions while storing data off chain, improving throughput at the cost of data availability trust assumptions.

ViT, Vision Transformer

Image model that applies transformer architectures to patch tokens, scaling well with data and compute, often used in multimodal and perception stacks.

VDF Friendly Curve

Elliptic curves or groups chosen to make verifiable delay functions efficient and secure, balancing hardware resistance and verification speed.

VAMPIRE Attack

Growth tactic where a new protocol lures liquidity or users from an incumbent with rewards or fee cuts, often via incentives and airdrops.

VAE, Variational Autoencoder

Generative model that learns a latent distribution by optimizing a variational lower bound, useful for synthesis and representation learning.