A cryptographic output used to verify the authenticity of data

two operations :

  1. Signing Operation - uses a signing key to produce a signature over raw data
  2. Verification Operation - signature can be validated by a party who has no knowledge of the signing key


two participants signer creates an asymmetric key uses this key to create multiple signatures


Asymmetric vs Symmetric Key

public + private key pair

Satoshi Nakamoto, computer activists