The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.
Sources:
NIST SP 800-12 Rev. 1
under Digital Signature
from
FIPS 140-2
An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation, but not confidentiality protection.
Sources:
NIST SP 800-63-3
under Digital Signature
NISTIR 8011 Vol. 3
under Digital Signature
from
NIST SP 800-63-3
The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, assurance of data integrity, and signatory non-repudiation.
Sources:
NIST SP 1800-16B
under Digital Signature
NIST SP 1800-16C
under Digital Signature
NIST SP 1800-16D
under Digital Signature
The result of a cryptographic transformation of data that, when properly implemented, provides the services of origin authentication, data integrity, and signer nonrepudiation.
Sources:
NISTIR 7316
under Digital Signature