DGT DOCS
search
Ctrlk
  • 1. INTRODUCTIONchevron-right
  • 2. REAL WORLD APPLICATIONSchevron-right
  • 3. DGT ARCHITECTUREchevron-right
    • 3.1 Scalable Architecture Designchevron-right
    • 3.2 Performance Metrics
    • 3.3 Network Architecturechevron-right
    • 3.4 Fault-Tolerant Architecturechevron-right
    • 3.5 Transactions and Performancechevron-right
    • 3.6 Data-Centric Modelchevron-right
    • 3.7 Cryptography and Securitychevron-right
      • 3.7.1 Security Architecture Approach
      • 3.7.2 Base Cryptography
      • 3.7.3 Permission Design
      • 3.7.4 Key Management
      • 3.7.5 Encryption and Decryption
      • 3.7.6 Secure Multi Party Computation
      • 3.7.7 Cryptographic Agility
      • DGTTECH_3.8.4 Gateway Nodes
    • 3.8 Interoperabilitychevron-right
    • 3.9 DGT API and Consumer Appschevron-right
    • 3.10 Technology Stack
    • REFERENCES
  • 4. TOKENIZATION AND PROCESSINGchevron-right
  • 5. EXPLORING TOKENOMICSchevron-right
  • 6. ADMINISTRATOR GUIDEchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 3. DGT ARCHITECTURE

3.7 Cryptography and Security

3.7.1 Security Architecture Approachchevron-right3.7.2 Base Cryptographychevron-right3.7.3 Permission Designchevron-right3.7.4 Key Managementchevron-right3.7.5 Encryption and Decryptionchevron-right3.7.6 Secure Multi Party Computationchevron-right3.7.7 Cryptographic Agilitychevron-rightDGTTECH_3.8.4 Gateway Nodeschevron-right
Previous3.6.5 DAG Synchronizationchevron-leftNext3.7.1 Security Architecture Approachchevron-right

Last updated 1 year ago