What you get and what makes us different to our competitors
Core & advanced features which ensure you get the most out of our signing software.
Our platform seamlessly integrates with most industry specific providers.
We have a flexible pricing model to suit anyone’s specific needs.
What you get and what makes us different to our competitors.
Frequently asked questions and solutions that might be relevant to you.
Plans for Small, Medium & Enterprise level businesses.
No setup fees & pay as you need notary features & add-ons.
Digital signing which integrates with most Recruitment ATS & CRM’s
Improve staff & client experience with digital signatures & notary.
Increasing compliance across life science & device businesses.
Solutions for state, federal, local, county & regional government.
Founded in 2010 to be a simple, smart, and secure signing platform.
ISO 27001 certified software which is backed by PKI Technology.
Technology which ensures non-forgeability & non-repudiation.
The latest Secured Signing company news and awards.
New & updated features and how to use them.
Updates about software we integrate with.
Blog articles, helpful tips and guides on digital signing & notary.
We have a flexible pricing model to suit anyone's specific needs.
Secured Signing continues partnership to integrate digital signatures within Bullhorn.
5 reasons government agencies and councils are adopting digital signatures.
New feature: Signing completion certificate.
Home // Posts // Introduction to Digital Signatures
The Process & Validity behind Digital Signature Technology.
A cryptographic system that uses two keys, a public key known to everyone and a private key, the private key has full control to the key owner, and has to keep in secured environment. A unique element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key.
When David wants to send a secure message to Donna, he uses Donna’s public key to encrypt the message. Donna then uses her private key to decrypt it.
Public key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. It is also called asymmetric encryption because it uses two keys instead of one key (symmetric encryption).
Using David and Donna, we can demonstrate how digital signatures are work.
From David’s point of view, the signing process operation is simple. But few steps are happening while signing process is started. :
For digitally sign documents, David needs to obtain a Private and Public Key – a one-time process , it’s done by Secured Signing Service while user registered. The Private Key isn’t shared and is used only by David sign documents. The Public Key is available for all, used for validate the signatory’s digital signature.
A unique document’s hash that represent the document is created using a math scheme (like as SHA-1).
The hash result and the user’s digital certificate that includes user’s Public Key are mixed into a digital signature; it’s done by using the user’s Private Key to encrypt the document hash. The resulting signature is unique to both the document and the user. Finally, the digital signature is embedded to the document.
David sends the signed document to Donna. Donna uses David’s public key (which is included in the signature within the Digital Certificate) to authenticate David’s signature and to ensure the document didn’t alter after it was signed.
CA issued certificates to ensure the authenticity of the signatories. Certificates are similar to ID Document. When you want to identify a user in the system you check his certificate. This certificate issued in registration process once all require information filled in. In PKI world the CA uses the CA’s certificate for authenticating user’s identity.
Find us on