The first appears to have been in Some industries have established common interoperability standards for the use of digital signatures between members of the industry and with regulators. Fifth Printing (August 2001) page 445.
All digital signature schemes share the following basic prerequisites regardless of cryptographic theory or legal provision:
Four revisions to the initial specification have been released. A private key can be stored on a user's computer, and protected by a local password, but this has two disadvantages: This can be shown as follows: The problem is that the semantic interpretation of bits can change as a function of the processes used to transform the bits into semantic content. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. A digital signature scheme typically consists of three algorithms; Legislatures, being importuned by businesses expecting to profit from operating a PKI, or by the technological avant-garde advocating new solutions to old problems, have enacted statutes and/or regulations in many jurisdictions authorizing, endorsing, encouraging, or permitting digital signatures and providing for (or limiting) their legal effect. SIAM Journal on Computing, 17(2):281–308, Apr. This encrypted hash along with other information like the hashing algorithm is the digital signature. "A digital signature scheme secure against adaptive chosen-message attacks. DSA is a United States Federal Government standard for digital signatures. Using digital signatures only with trusted applicationsUsing separate key pairs for signing and encryptionUsing digital signatures only with trusted applicationsUsing separate key pairs for signing and encryptionGoldreich's FoC, vol. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender, and that the message was not altered in transit. Technically speaking, a digital signature applies to a string of bits, whereas humans and applications "believe" that they sign the semantic interpretation of those bits. This digital signature is appended with the data and sent to the verifier. In Asymmetric Cryptography example we discussed the use of Public Key Pair in Cryptography. WYSIWYS (What You See Is What You Sign)An ink signature could be replicated from one document to another by copying the image manually or digitally, but to have credible signature copies that can resist some scrutiny is a significant manual or technical skill, and to produce ink signature copies that resist professional scrutiny is very difficult.