Login / Signup
Threshold Signatures with Private Accountability.
Dan Boneh
Chelsea Komlo
Published in:
CRYPTO (4) (2022)
Keyphrases
</>
privacy preserving
computer vision
database
neural network
data structure
signature verification
threshold selection
similarity measure
private data
thresholding method