In private key/public key cryptography, a signature can be produced by hashing data with your private key. A public key, which is derived from the private key, can be used to verify that the signature was indeed signed by the key holder.
Word missing from the glossary or definition needs improvement? Let us know!