Digital Signature with Public Key
For each message we add a signature which is constructed as follows:
- Compute a digest function of the message (like hash function) to reduce length.
- Encrypt the result using our private key.
The receiver
- Deciphers the signature using our public key.
- Computes the digest function on the document.
- Compares the two to validate the document.