DGT DOCS
search
⌘Ctrlk
DGT DOCS
  • 1. INTRODUCTION
  • 2. REAL WORLD APPLICATIONS
  • 3. DGT ARCHITECTURE
    • 3.1 Scalable Architecture Design
    • 3.2 Performance Metrics
    • 3.3 Network Architecture
    • 3.4 Fault-Tolerant Architecture
    • 3.5 Transactions and Performance
    • 3.6 Data-Centric Model
    • 3.7 Cryptography and Security
      • 3.7.1 Security Architecture Approach
      • 3.7.2 Base Cryptography
      • 3.7.3 Permission Design
      • 3.7.4 Key Management
      • 3.7.5 Encryption and Decryption
      • 3.7.6 Secure Multi Party Computation
      • 3.7.7 Cryptographic Agility
      • DGTTECH_3.8.4 Gateway Nodes
    • 3.8 Interoperability
    • 3.9 DGT API and Consumer Apps
    • 3.10 Technology Stack
    • REFERENCES
  • 4. TOKENIZATION AND PROCESSING
  • 5. EXPLORING TOKENOMICS
  • 6. ADMINISTRATOR GUIDE
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 3. DGT ARCHITECTURE

3.7 Cryptography and Security

3.7.1 Security Architecture Approachchevron-right3.7.2 Base Cryptographychevron-right3.7.3 Permission Designchevron-right3.7.4 Key Managementchevron-right3.7.5 Encryption and Decryptionchevron-right3.7.6 Secure Multi Party Computationchevron-right3.7.7 Cryptographic Agilitychevron-rightDGTTECH_3.8.4 Gateway Nodeschevron-right
Previous3.6.5 DAG Synchronizationchevron-leftNext3.7.1 Security Architecture Approachchevron-right

Last updated 1 year ago