A commitment scheme can protect the integrity of transmitted data, but it does not attest to its authenticity. Put another way, we need a mechanism to allow the sender to endorse the transferred data and for the receiver to verify this is indeed the case. The solution is to use digital signatures.Brief recap on digital signaturesAs mentioned in our previous article, digital signatures rely on public key cryptography and every user is responsible for generating their own key pair:Public key PP...