We the first equation we considered when looking at public/private key cryptography was
(Recall and are inverses)
And we looked at how this enabled private messages to be sent across an insecure channel. Now consider the equation
This represents Alice encrypting a message () using her secret key. Anybody can now decrypt the message using her public key, but since only Alice can use they can be sure it was her who encrypted the message. Suppose Alice didn't want to hide the message, merely provide a means for people to verify it was her who sent it. She could send both the origional message, , and . Clearly anybody can read and anyone who bothers to find Alice's public key can apply to . If the result of this matches they can be reasonably sure it was Alice who sent the message, so by providing with the message Alice has `signed' it.
Of course transmitting and is a waste, since we are now sending a message that is twice as long as .