Digital Signatures What we want is a true digital signature, with the following properties: If Bob receives a message with Alice's digital signature on it, then: Alice, and not an impersonator, sent the message, the message has not been altered since it was sent, and Bob can prove these facts to a third party. How do we arrange this? Use similar techniques to public-key cryptography.