{"id":1477,"date":"2016-09-22T11:58:46","date_gmt":"2016-09-22T11:58:46","guid":{"rendered":"https:\/\/esigndesk.com\/?p=1477"},"modified":"2025-10-09T07:03:31","modified_gmt":"2025-10-09T12:33:31","slug":"aadhaar-digital-signature","status":"publish","type":"post","link":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature","title":{"rendered":"Digital Signature And Aadhaar-Based Electronic Signature"},"content":{"rendered":"<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6175 size-full\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature.jpg\" alt=\"Digital Signature And Aadhaar-Based Electronic Signature\" width=\"1200\" height=\"627\" \/><\/h2>\n<h2><span style=\"color: #008000;\"><strong>Digital Signature<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">A <em><strong>digital signature<\/strong><\/em> can be viewed as a fingerprint or a coded message that is unique to both the document being signed and the signer. It binds both of them together.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">If we recall, a handwritten <em>signature<\/em> also does the same thing. However, in the <a style=\"color: #333333;\" href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_signature\">digital signature<\/a> case, this is being done electronically with no paperwork involved.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Instead of using pen and paper, a <a style=\"color: #333333;\" href=\"https:\/\/en.wikipedia.org\/wiki\/Digital_signature\">digital signature<\/a> uses digital keys, also called public-key cryptology. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">A digital signature is considered equal to a handwritten signature.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; color: #333333;\">Just as a person\u2019s identity is attached when signing a paper document, <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/esign-workflow\"><strong>digital signature<\/strong><\/a>\u00a0too acts as a binding commitment and attaches the identity of the person signing it to the document.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Compared to a handwritten signature, it is much more difficult to forge a <em>digital signature<\/em>, provided the keys used to create the <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/esign-workflow\"><em><b>digital signature<\/b><\/em> <\/a>are kept secure.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">The real value is in saving time and avoiding the paper, and keeping your data electronic. <\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>How does Digital Signature Works?<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Digital signatures are based on <a style=\"color: #333333;\" href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptographic_protocol\"><b>cryptographic technology<\/b><\/a>. One can generate two mathematically linked keys using an algorithm. These keys are called private and public keys.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">To create a digital signature, signing software creates something ca<\/span><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">lled a hash of the electronic data to be signed. This hash is then encrypted using the private key.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; color: #333333;\">The <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/blog\/electronic-signature-services-signdesk\"><b>digital signature<\/b><\/a> consists of this encrypted hash, a hashing algorithm along with some other details. You may notice that it is the hash that is encrypted instead of the entire document.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">The reason for this is that a hash function by its nature gives fixed-length value output for any arbitrary input, which is usually much shorter.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">So instead of encrypting random length document, it is considered easier to encrypt fixed length hash. This saves time since hashing is much faster than signing.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>What Makes Digital Signatures Secure?<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">The main feature that makes a digital signature unique from a handwritten signature is that the hash of any data is unique.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Any change in the input data\u00a0results in a different hash value. This inherent feature of hash makes validating the integrity of the data very easy and secure.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">This can be done by decrypting the hash using the signer&#8217;s public key. If the decrypted hash matches another hash of the same document, it proves that the data hasn&#8217;t been tampered with since it\u2019s signed.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">If the two hashes do not match, the data has either been tampered with in some way or the signature was affixed using a private key that doesn&#8217;t correspond to the public key presented by the signer.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">In either case, the fraud has been detected at a very early stage.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>Issues Involved In The Digital Signing Process<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">There are three major issues concerning digital document signing:<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\"><strong>Authentication of the user:<\/strong> This involves making sure that the required person has signed the document.<\/span><\/li>\n<li><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\"><strong>Trusted method of signing:<\/strong> This involves making sure that the document has been securely signed and that no forgery has happened.<\/span><\/li>\n<li><span style=\"color: #333333;\"><span style=\"font-weight: 400; font-size: 16px; font-family: open sans;\"><strong>The document signed is legally binding:<\/strong> This involves making sure that the signed document is legally binding on the parties.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Thankfully for us, the Government of India vide its Gazette Notification <strong>(REGD. No. D. L. 33004\/99 dated 28th January 2015)<\/strong> has announced a new initiative that allows Certifying Authority to offer <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/esign-workflow\"><strong>eSign or digital signature<\/strong><\/a>\u00a0service to citizens who have Aadhaar number.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">This initiative takes care of all the three issues highlighted above.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>The Aadhaar Initiative<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">India took a great leap of faith by implementing the <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/blog\/foundation-for-a-digitized-india\" target=\"_blank\" rel=\"noopener\">Aadhaar programme<\/a> through which every citizen of India is being assigned a<a style=\"color: #333333;\" href=\"https:\/\/uidai.gov.in\/my-aadhaar\/get-aadhaar.html\"><strong> 12-digit unique identification (UID) number.<\/strong><\/a><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Originally implemented to make the subsidy target of Government of India more transparent, Aadhaar has, over the course of time, opened new avenues to reform other areas of governance.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\"><span style=\"font-weight: 400; font-size: 16px; font-family: open sans;\">One of them is the area of <\/span><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/blog\/digital-signature-your-documents\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\"><b>digital signatures<\/b><\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>How Does <a style=\"color: #008000;\" href=\"https:\/\/uidai.gov.in\/my-aadhaar\/get-aadhaar.html\">Aadhaar<\/a> Bridge The Gap?<\/strong><\/span><\/h2>\n<ol>\n<li style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Aadhar service validates the authenticity of the person.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">A Public Key Infrastructure is used to securely sign the document and establish the trust.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">These services are offered by trusted third-party service providers, like <strong>Certifying Authorities (CA)<\/strong>, licensed as per the Information Technology Act, 2000, under the <strong>Controller of Certifying Authorities (CCA)<\/strong>, which makes them legally binding. <\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400; color: #008000;\"><strong><a style=\"color: #008000;\" href=\"https:\/\/melento.ai\/en-in\/esign-workflow\">Digital Signature<\/a> Process Explained<\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">The way this whole process works is very simple. First, a person with Aadhaar number uploads his document to an <strong><span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/electronic-signature\">eSign service provider\u2019s portal<\/a><\/span> (<a style=\"color: #333333;\" href=\"https:\/\/signdesk.com\/\">melento.ai<\/a>)<\/strong>, to get it digitally signed.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Next, he enters his Aadhaar number and gets a\u00a0one time password (OTP) to his mobile number registered with Aadhaar. Then he enters the OTP in the field provided.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">In the backend, validation of the user is carried out using Aadhaar service and a key pair (a public key and a private key) is generated for the user and an eSign is affixed to the document using the private key.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">The user can then download the <strong>eSigned document<\/strong>.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Not only this, but the person can also share the eSigned document to another person for further signing.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">The invited person can also eSign the document in the same manner i.e, by entering his Aadhaar no. and OTP sent to his mobile, from any remote location.<\/span><\/p>\n<h2><span style=\"color: #008000;\"><strong>Digital Signature &#8211; The Way Forward <\/strong><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Thus, we can say that <a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/electronic-signature\">eSign<\/a> is the way forward for a secure and time-efficient way of signing documents.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Built on top of the foundation laid down by the Unique Identification Authority of India (UIDAI), it authenticates the user securely and provides a seamless interface to digitally sign any document. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">Leveraging the power of Aadhaar, Melento (Formerly SignDesk) has come up with a one-stop solution for digitally signing all your legal documents.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\"><span style=\"font-weight: 400; font-size: 16px; font-family: open sans;\">You can upload your document, <\/span><strong><a style=\"color: #333333;\" href=\"https:\/\/melento.ai\/en-in\/blog\/how-to-esign-a-document\" target=\"_blank\" rel=\"noopener\"><b>eSign it using Aadhaar<\/b><\/a><\/strong><span style=\"font-weight: 400;\"> and invite other people as well to get the document eSigned. <\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #333333;\"><span style=\"font-weight: 400; font-size: 16px; font-family: open sans;\">To simplify the process for small businesses and for people who want just a single signature, Melento (Formerly SignDesk) has a separate <\/span><strong><a style=\"color: #333333;\" href=\"#name\">pricing structure<\/a><\/strong><span style=\"font-weight: 400;\"> based on the number of eSign requirements of different entities as well.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 16px; font-family: 'open sans'; color: #333333;\">So, as a user in a competitive world, you can be the person who moves at digital speed, or you can be the person waiting for the ink to dry. The choice is yours.<\/span><\/p>\n<div align=\"center\"><strong><a href=\"https:\/\/melento.ai\/en-in\/talk-to-sales\"><button class=\"wpcf7-form-control wpcf7-submit envor-btn envor-btn-primary envor-btn-normal \">eSign A Document<\/button><\/a><\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Digital Signature A digital signature can be viewed as a fingerprint or a coded message that is unique to both the document being signed and the signer. It binds both of them together. If we recall, a handwritten signature also does the same thing. However, in the digital signature case, this is being done electronically [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6175,"comment_status":"closed","ping_status":"open","sticky":false,"template":"page_templates\/blog-new-3.php","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[16],"tags":[33,95,598,612,616,617,692,796,837,838,885,981,1072,1109,2070,2099,2101],"class_list":["post-1477","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-esign","tag-aadhaar","tag-aadhaar-based-electronic","tag-digital-signature","tag-digital-signature-works","tag-digital-signatures-secure","tag-digital-signing-process","tag-document-signed-is-legally","tag-e-kyc","tag-elecronic-signature","tag-electronic","tag-emandate","tag-esign","tag-esign-service-provider","tag-esigned-document","tag-sign-the-document","tag-signing-documents","tag-signing-software"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Signature v\/s Aadhaar based electronic signature<\/title>\n<meta name=\"description\" content=\"Learn about Digital signature &amp; issues involved in digital dignature. How digital signature works and what makes e-signatures secure?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Signature v\/s Aadhaar based electronic signature\" \/>\n<meta property=\"og:description\" content=\"Learn about Digital signature &amp; issues involved in digital dignature. How digital signature works and what makes e-signatures secure?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature\" \/>\n<meta property=\"og:site_name\" content=\"Melento (Formerly SignDesk)\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-22T11:58:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-09T12:33:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhijith NS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhijith NS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature\",\"name\":\"Digital Signature v\/s Aadhaar based electronic signature\",\"isPartOf\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#primaryimage\"},\"image\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#primaryimage\"},\"thumbnailUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature-1.jpg\",\"datePublished\":\"2016-09-22T11:58:46+00:00\",\"dateModified\":\"2025-10-09T12:33:31+00:00\",\"author\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\"},\"description\":\"Learn about Digital signature & issues involved in digital dignature. How digital signature works and what makes e-signatures secure?\",\"breadcrumb\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#primaryimage\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature-1.jpg\",\"contentUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature-1.jpg\",\"width\":1200,\"height\":627,\"caption\":\"Digital Signature And Aadhaar-Based Electronic Signature\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/melento.ai\/en-in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Signature And Aadhaar-Based Electronic Signature\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/\",\"name\":\"Melento\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\",\"name\":\"Abhijith NS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"caption\":\"Abhijith NS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Signature v\/s Aadhaar based electronic signature","description":"Learn about Digital signature & issues involved in digital dignature. How digital signature works and what makes e-signatures secure?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature","og_locale":"en_US","og_type":"article","og_title":"Digital Signature v\/s Aadhaar based electronic signature","og_description":"Learn about Digital signature & issues involved in digital dignature. How digital signature works and what makes e-signatures secure?","og_url":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature","og_site_name":"Melento (Formerly SignDesk)","article_published_time":"2016-09-22T11:58:46+00:00","article_modified_time":"2025-10-09T12:33:31+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature-1.jpg","type":"image\/jpeg"}],"author":"Abhijith NS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhijith NS","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature","url":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature","name":"Digital Signature v\/s Aadhaar based electronic signature","isPartOf":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#primaryimage"},"image":{"@id":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#primaryimage"},"thumbnailUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature-1.jpg","datePublished":"2016-09-22T11:58:46+00:00","dateModified":"2025-10-09T12:33:31+00:00","author":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23"},"description":"Learn about Digital signature & issues involved in digital dignature. How digital signature works and what makes e-signatures secure?","breadcrumb":{"@id":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#primaryimage","url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature-1.jpg","contentUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2016\/09\/digital-signature-1.jpg","width":1200,"height":627,"caption":"Digital Signature And Aadhaar-Based Electronic Signature"},{"@type":"BreadcrumbList","@id":"https:\/\/melento.ai\/en-in\/blog\/aadhaar-digital-signature#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/melento.ai\/en-in\/blog\/"},{"@type":"ListItem","position":2,"name":"Digital Signature And Aadhaar-Based Electronic Signature"}]},{"@type":"WebSite","@id":"https:\/\/melento.ai\/en-in\/blog\/#website","url":"https:\/\/melento.ai\/en-in\/blog\/","name":"Melento","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23","name":"Abhijith NS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","caption":"Abhijith NS"}}]}},"_links":{"self":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/1477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/comments?post=1477"}],"version-history":[{"count":0,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/1477\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media\/6175"}],"wp:attachment":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media?parent=1477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/categories?post=1477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/tags?post=1477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}