How to Leak a Secret: Theory and Applications of Ring Signatures

Ronald L. Rivest, Adi Shamir, Yael Tauman. How to Leak a Secret: Theory and Applications of Ring Signatures. In Oded Goldreich, Arnold L. Rosenberg, Alan L. Selman, editors, Theoretical Computer Science, Essays in Memory of Shimon Even. Volume 3895 of Lecture Notes in Computer Science, pages 164-186, Springer, 2006. [doi]

@inproceedings{RivestST06,
  title = {How to Leak a Secret: Theory and Applications of Ring Signatures},
  author = {Ronald L. Rivest and Adi Shamir and Yael Tauman},
  year = {2006},
  doi = {10.1007/11685654_7},
  url = {http://dx.doi.org/10.1007/11685654_7},
  researchr = {https://researchr.org/publication/RivestST06},
  cites = {0},
  citedby = {0},
  pages = {164-186},
  booktitle = {Theoretical Computer Science, Essays in Memory of Shimon Even},
  editor = {Oded Goldreich and Arnold L. Rosenberg and Alan L. Selman},
  volume = {3895},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-32880-7},
}