Quadratic Funding

Quadratic Funding: Democratic Resource Allocation

Quadratic funding uses mathematical formulas to allocate resources based on community preferences while preventing wealthy individuals from dominating funding decisions. It's democracy with math.

Quadratic funding is a mechanism for allocating resources that gives more weight to the number of contributors than the amount contributed, using quadratic formulas to prevent wealthy individuals from overwhelming community preferences. Small donations are amplified to match community interest.

How Quadratic Funding Works

Contribution matching uses mathematical formulas where the funding amount increases based on the square root of contributions rather than linear amounts.

Community signal amplification means projects with many small supporters receive more total funding than those with fewer large contributors.

Sybil resistance requires identity verification to prevent individuals from gaming the system through multiple fake accounts.

[IMAGE: Quadratic funding formula showing how multiple small contributions generate larger matching funds than single large contributions]

Real-World Examples

  • Gitcoin Grants uses quadratic funding to allocate millions in cryptocurrency public goods funding
  • CLR.fund provides quadratic funding infrastructure for community resource allocation
  • Government experiments in Taiwan and other jurisdictions testing quadratic voting for budget allocation

Why Beginners Should Care

Democratic funding enables communities to direct resources toward projects they value without being overwhelmed by wealthy donors.

Public goods support through quadratic funding helps maintain open-source software, research, and infrastructure that benefits everyone.

Participation incentives make small contributions meaningful and impactful rather than insignificant compared to large donations.

Related Terms: Public Goods, Community Governance, Sybil Attack, Resource Allocation

Back to Crypto Glossary


Similar Posts

  • Stealth Address

    Stealth Address: Private Payment DestinationsStealth addresses create unique, one-time addresses for each transaction to enhance privacy by breaking the link between payments and recipient identities. They're like using a different PO box for every package delivery so no one can track all your mail to the same location.Stealth addresses are unique, one-time payment destinations generated…

  • SocialFi

    SocialFi: Social Media Meets Financial Incentives SocialFi combines social networking with decentralized finance, rewarding users for creating content and engaging with communities. It’s like getting paid to post, but with actual economic models behind it. SocialFi refers to social finance applications that integrate social media features with DeFi economics, enabling users to monetize social interactions…

  • Tokenomics

    Tokenomics: The Economics of Digital Assets Tokenomics determines how cryptocurrencies create, distribute, and maintain value over time. It’s the difference between digital money and digital monopoly money. Tokenomics refers to the economic design and mechanics of a cryptocurrency token, including supply schedules, distribution methods, utility functions, and incentive structures. Good tokenomics align stakeholder interests while…

  • Liquid Staking

    Liquid Staking: Staking Without LockupsLiquid staking allows earning staking rewards while maintaining the ability to trade or use staked assets through tokenized representations. It's like having your cake and eating it too.Liquid staking enables users to stake cryptocurrency for rewards while receiving liquid tokens representing their staked position that can be traded or used in…

  • Wallet Security

    Wallet Security: Protecting Cryptocurrency AccessWallet security encompasses all measures taken to protect cryptocurrency wallets from theft, loss, or unauthorized access. It's like comprehensive security for your digital bank account.Wallet security refers to practices, technologies, and procedures used to protect cryptocurrency wallets and their contents from various threats including hacking, phishing, and user error. Proper security is…

  • Verification

    Verification: Confirming Accuracy and AuthenticityVerification is the process of confirming that information, transactions, or claims are accurate and authentic without requiring trust in the information source. It's like being able to personally test that a diamond is real using scientific instruments instead of just believing the jeweler's word.Verification refers to the mathematical and cryptographic processes…