Login / Signup

How to Leak a Secret: Theory and Applications of Ring Signatures.

Ronald L. RivestAdi ShamirYael Tauman
Published in: Essays in Memory of Shimon Even (2006)
Keyphrases
  • theoretical framework
  • theoretical basis
  • database
  • theoretical foundation
  • formal theory
  • real world
  • machine learning
  • signature verification
  • secret sharing scheme