What are Digital Signatures and How Do They Work?

preview_player
Показать описание
What is a Digital Signature? In this animation, we will explain how digital signatures work using cryptography.

In some ways, digital signatures do what their names suggest: they provide validation in the same way signatures do, in digital form.

Thanks for watching!

Lisk makes it easy for developers to build and deploy blockchain applications in JavaScript.

👨‍💻👩‍💻 For developers:

👫Join our community channels:
Рекомендации по теме
Комментарии
Автор

To my understanding:-

1. The author sends "Document+Digital Signature" to the recipient.
2. The receiver verification process:-
a) The receiver runs hashing algo. on the received document, generates a Digest.
b) Decrypts the Digital Signature using author's Public Key, a Digest is produced.
c) The receiver now compares both the Digest produced in above (a) & (b) steps for legitimacy.

faisalhukkeri
Автор

This is the best explanation I've found about digital signatures so far. I couldn't quite wrap my head around the verification process due to conflicting explanations but this video has put my mind to rest. Thank you!

MunkyChunk
Автор

This is the best video available on youtube to understand the digital signature procedure. Thank you Lisk Academy for this video.

nikky
Автор

Informative video, it's interesting to see how Digital Signatures works.

ICOTalk
Автор

So lucid and clear, no jargon explanation of Digital Signature!

dashgandhi
Автор

Awesome video. Keep learning thanks to the lisk crew.

LeandroIamele
Автор

Thanks for this series. You are helping whole cryptocurrency ecosystem, by decreasing the blockchain technology entry point !

StasBar
Автор

Thank you so much
It seems very helpful 💯

nikitayadav
Автор

this is exactly what i am looking for !! great works there!

huangjason
Автор

Great explanation video ! By you've missed something very important and can lead people to assume a mistake you mention in last second of video ... which is a digital signature assure that the sender is the person who claim he is but is actually not true as you need for that digital certificat issued by a trusted third party. A digital signtaure surely assure the integrity of the transmitted data but it does not verify securely the identity of the sender...

bennanihamza
Автор

Amazing video. Though I was wondering what kind of video editing tool you guys use? It'd be great for making clear presentations

inigo
Автор

Thanks for the video . Its very helpful and easy to understand

divyeshpk
Автор

Great video. 'The video covered all the important points and is easy to understand.

aalampratapbedi
Автор

Thank you so much for the great explanation!

xrfox
Автор

Good and high quality stuff! :-) Very well explained!

OliverEckstein
Автор

Almost great explanation, but a little confusing at the end. Still, thank you for the video.

TricoliciSerghei
Автор

Great video, this is what I am looking for! Some notes of my taking away from this video, please correct me if I am wrong.
1. The hashing algorithm is public for everyone.
2. The bob's public key can decrypt the digital signature which encrypted by the bob's private key.
3. Bob is sending the original document, the hashing algorithm, the digital signature, the public key to Alice altogether.
Question: Can the public key decrypt the content encrypted by itself (the same public key)?

XCai-xqnn
Автор

This video is perfect and wow, tha voice is deep

Maracaca
Автор

cool, very clear explanation.one small question, whether is the plaintext normally encrypted with conterpart’s public key (shared secret key)?

Recordingization
Автор

The best and simplest explanation ever! Thanks a lot!

MohammedNoureldin