Digital Signature Solution
One of the most confusing aspects for an organization wishing to deploy an e-signature solution is understanding the technical jargon that different providers use. There are many e-signature schemes being offered in the market, with significant differences in terms of security and trust, legal acceptance, ease of use, interoperability and costs.
However there is very little documentation that explains these different techniques and thus allows them to be compared and assessed for their suitability in meeting a particular business purpose. Below different modules help business managers and technical architects understand the various types of e-signature that exist.
Basic security properties of digital signatures
Signer authentication: proof of who actually signed the document. i.e. digital signatures linking the user’s signature to an actual identifiable entity.
Data integrity: proof that the document has not been changed since signing. The digital signature depends on every binary bit of the document and therefore can’t be re-attached to any other document.
Non-repudiation: the signer should not be able to falsely deny having signed their signature. That is, it should be possible to prove in a court that the signer in fact created the signature.
Types of e-Signature: