DGT DOCS
Ctrlk
  • 1. INTRODUCTION
  • 2. REAL WORLD APPLICATIONS
  • 3. DGT ARCHITECTURE
    • 3.1 Scalable Architecture Design
    • 3.2 Performance Metrics
    • 3.3 Network Architecture
    • 3.4 Fault-Tolerant Architecture
    • 3.5 Transactions and Performance
    • 3.6 Data-Centric Model
    • 3.7 Cryptography and Security
      • 3.7.1 Security Architecture Approach
      • 3.7.2 Base Cryptography
      • 3.7.3 Permission Design
      • 3.7.4 Key Management
      • 3.7.5 Encryption and Decryption
      • 3.7.6 Secure Multi Party Computation
      • 3.7.7 Cryptographic Agility
      • DGTTECH_3.8.4 Gateway Nodes
    • 3.8 Interoperability
    • 3.9 DGT API and Consumer Apps
    • 3.10 Technology Stack
    • REFERENCES
  • 4. TOKENIZATION AND PROCESSING
  • 5. EXPLORING TOKENOMICS
  • 6. ADMINISTRATOR GUIDE
Powered by GitBook
On this page
  1. 3. DGT ARCHITECTURE

3.7 Cryptography and Security

3.7.1 Security Architecture Approach3.7.2 Base Cryptography3.7.3 Permission Design3.7.4 Key Management3.7.5 Encryption and Decryption3.7.6 Secure Multi Party Computation3.7.7 Cryptographic AgilityDGTTECH_3.8.4 Gateway Nodes
Previous3.6.5 DAG SynchronizationNext3.7.1 Security Architecture Approach

Last updated 1 year ago