Cryptographic proof that a message was authorized by the holder of a private key, e.g., ECDSA, EdDSA, BLS. ← DAG (Directed Acyclic Graph) DID Method →