Login / Signup
How to Leak a Secret: Theory and Applications of Ring Signatures.
Ronald L. Rivest
Adi Shamir
Yael Tauman
Published in:
Essays in Memory of Shimon Even (2006)
Keyphrases
</>
theoretical framework
theoretical basis
database
theoretical foundation
formal theory
real world
machine learning
signature verification
secret sharing scheme