An Enhanced E-Signature Experience

Experience a seamless and secure process of signing and verifying documents with Indestamp.

Indestamp Logo

Here's what happens when you use our service:

When you use Indestamp, you're getting an experience like that of familiar e-signature services but with added layers of protection. Here's what happens when you use our service:

  • 1

    Seamless Signing: Just like other e-signature services, you upload your document so you and others can sign it digitally in a user-friendly interface.

  • 2

    Cryptographic Proof: Once your document is signed, we create a unique cryptographic hash of your document. This hash is a unique identifier, akin to a digital fingerprint of your document.

  • 3

    Blockchain Recording: The cryptographic hash is then recorded in the blockchain of your choice. This publicly-owned, distributed network is impervious to tampering, providing an immutable proof of your signature. This means that even if our service ceases to exist, your proof of signature is preserved independently.

  • 4

    Privacy Protection: After the proof of signature is securely stored on the blockchain, we do not retain your sensitive documents. This ensures that even in the unlikely event of a security breach or phishing attempt on your account, there will be no sensitive documents to be stolen. Your confidentiality and security are our top priorities.

  • 5

    Verification Process: At any point, you can verify the authenticity of the signed document by submitting it to Indestamp. Indestamp compares the document with the cryptographic hash saved in the blockchain, confirming its authenticity and legally admissable proof of signature without a doubt.

With Indestamp, you get the familiar simplicity of a DocuSign-like experience, coupled with the added security and privacy of blockchain technology. It's the next generation of e-signatures, providing you with complete peace of mind.

Why blockchain?

Blockchains are distributed systems that preserve a history of all transactions with strong cryptography.

When you sign with Indestamp, you are recording a unique cryptographic fingerprint of your document - and not the document itself - into the blockchain. This means that proof of your document's existence and its signatures are forever saved in a pubilc place, while the document itself is kept confidential between you and anyone else who signs it. Verifying this proof requires simply comparing your document's fingerprint to what was saved and signed in the blockchain.

The result is enhanced confidentiality and security: if someone gains access your Indestamp account, they won't have access to any of the documents you've already signed. In the future, Indestamp will also be available for advanced blockchain users like financial institutions and governments. It will serve as an intermediate step in executing smart contracts in any blockchain, proving that specific parties entered into the agreement codified by the smart contract without publicly sharing the parties’ private information. This will give organizations a mechanism for regulating permissionless blockchain transactions and conducting diligence such as KYC, while preserving the privacy of involved parties.

Interested in learning more about how Indestamp will help usher in the future of Web3?

Contact us
Harness the security, transparency, and reliability of blockchain technology with Indestamp.

Indestamp technical details

Indestamp facilitates the digital signing of documents through the use of blockchain technology and related cryptographic signatures. In this section, we will provide a step-by-step explanation of the Indestamp process, from document creation to publishing the proof of signing onto a blockchain of choice.

  • 1

    Document creation: The user initiates the process by creating a document consisting of a set of files that need to be signed. The user provides file information to the Indestamp platform - filename and cryptographic digest of file contents. The files themselves never leave the user's computer and neither Indestamp nor its employees have access to the files.

  • 2

    Adding signers: The user specifies other parties required to digitally sign the document and all files that are a part of it. Each party receives an email invitation with a secure link to sign the document on the Indestamp platform.

  • 3

    Cryptographic signatures: Each signer verifies the file's contents and adds their digital signature. Indestamp uses public key cryptography to generate a unique signature for each signer. The signer's private key, managed by Indestamp and encrypted using the user's login credentials, is used to sign the document, while their public key will be used to verify the signature.

  • 4

    Proof of signing creation: Once all signees have added their cryptographic signatures, Indestamp generates a proof of all signatures for all files and generates a cryptographic hash of the proof.

  • 5

    Publishing to blockchain: To create an indelible and tamper-proof record of the signing process, Indestamp publishes the cryptographic hash of proof of signing onto a blockchain. This provides a decentralized and immutable record of the document's signatures, which can be easily verified by anyone with access to the blockchain.

  • 6

    Generate verification link: After the document has been signed and published to blockchain, an additional URL is generated that includes the proof of signing and information about blockchain. This link can be shared with anyone and can be used to validate authenticity of the file(s) signed by Indestamp as well as the fact of signing said files by all parties.

It's the next generation of e-signatures.