Skip to main content
. 2019 Aug 7;7:189. doi: 10.3389/fbioe.2019.00189

Table 2.

Principles and features of digital signatures as counterparts of traditional signatures (and with the intent toward their generalization to DNA signatures).

Digital signatures
How they work “Public-key” signatures rely on the usage of specific secrets - the keys used to generate a signature. They are generated by applying a mathematical formula or an algorithm, to scramble the information into a string of digits
Who can produce a valid signature? Only the holder of the private (secret) key–the signer–can produce such an “electronic autograph”
Who can verify a signature? In the public-key setting, the signature can be verified by anyone
Useful features
They provide authenticity and enable supply chain security For messages distributed through a non-secure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender
They provide data integrity and ensure anti-counterfeiting Any change in the message after signature will invalidate that signature, which ensures the integrity of the signed data (“the message”) against tampering or corrupting during transmission
They are binding Once it is published, a signature cannot be altered or repudiated
What can be signed? As with anything in the cyber-realm, the message is an alphanumeric string, including anything that can be represented as such (genomic information, producer information, processes used, etc)