Signing Documents with Public Key Cryptography
Alice encrypts the document with her private key, thereby signing the document.
Alice sends the signed document to Bob.
Bob decrypts the document with Alice’s public key, thereby verifying the signature.
Authentic, unforgeable, not reusable, unalterable, can’t be repudiated.