When you submit an eSignature, a mathematical algorithm generates a distinct digital fingerprint—also known as a hash—that is unique to the specific document. The hash then gets encrypted via your private key, which is used to encrypt and decrypt protected information. Your digital signature will also be assigned a public key, which is publicly visible. The encrypted hash and your public key merge to become your digital signature.
Digital signatures are verified when a document is opened in a designated program that uses your public key to decrypt the encoded hash. If the decrypted information matches the signature at the time of signing, then it is validated.