You can make use of hash based message authentication code's (HMAC), or even just hash codes.
For example, you can just hash the document and verify the hash to ensure no tampering occurred. Problem here is managing that hash value, because let's say you pass that hash with the document. Somebody could edit the document, update the hash, and you would be none the wiser.
A keyed hash solves all those problems, but you must properly manage that secret key.