Digital signature
nounid
2326·updated May 12, 2026candidate
An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation.
polysemousMWE
Classifications
Entity Type
Credential0%rule-basedmulti_axis_classifier_low_confidence.v1
Sensitivity
Regulated80%llm-generatedllm:claude-haiku-4-5
Information Class
—60%llm-generatedllm:claude-haiku-4-5
Variants
- plural
- Digital signatures
- possessive
- Digital signature's
- pluralpossessive
- Digital signatures'
Framework definitions
- §1
- A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission.
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Lexicon1 senseview framework →
- §1
- A value computed with a cryptographic process using a private key and then appended to a data object, thereby digitally signing the data.
- §1
- A piece of information, a digitized form of signature, that provides sender authenticity, message integrity and non-repudiation A digital signature is generated using the sender’s private key or applying a one-way hash function.
- §1
- An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation.
- §2 · sense_2_pending_review
- A nonforgeable transformation of data that allows the proof of the source (with non-repudiation) and the verification of the integrity of that data.
- §3 · sense_3_pending_review
- The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.
- §4 · sense_4_pending_review
- The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, data integrity, and signatory non-repudiation.
- §5 · sense_5_pending_review
- Cryptographic process used to assure data object originator authenticity, data integrity, and time stamping for prevention of replay.
- §1
- Cryptographic process used to assure data object originator authenticity, data integrity, and time stamping for prevention of replay.
- §1
- An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation.
- §1
- The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.
- §1
- A nonforgeable transformation of data that allows the proof of the source (with non-repudiation) and the verification of the integrity of that data.
- §1
- The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, data integrity, and signatory non-repudiation.
Outgoing relationships
- related
- →electronic signaturenoun
Incoming relationships
- related
- ←electronic signaturenoun