How to Leak a Secret: Theory and Applications of Ring Signatures

Ronald L. Rivest, Adi Shamir, Yael Tauman. How to Leak a Secret: Theory and Applications of Ring Signatures. In Oded Goldreich, Arnold L. Rosenberg, Alan L. Selman, editors, Theoretical Computer Science, Essays in Memory of Shimon Even. Volume 3895 of Lecture Notes in Computer Science, pages 164-186, Springer, 2006. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.