@article{nakamoto2008bitcoin, title={{B}itcoin: {A} peer-to-peer electronic cash system}, author={Nakamoto, Satoshi} } @article{noether2016ring, title={Ring confidential transactions}, author={Noether, Shen and Mackenzie, Adam and others}, journal={Ledger}, volume={1}, pages={1--18}, year={2016} } @inproceedings{liu2004linkable, title={Linkable spontaneous anonymous group signature for ad hoc groups}, author={Liu, Joseph K and Wei, Victor K and Wong, Duncan S}, booktitle={ACISP}, volume={4}, pages={325--335}, year={2004}, organization={Springer} } @article{rivest2001leak, title={How to leak a secret}, author={Rivest, Ronald and Shamir, Adi and Tauman, Yael}, journal={Advances in Cryptology, ASIACRYPT 2001}, pages={552--565}, year={2001}, publisher={Springer} } @article{abe20021, title={1-out-of-n signatures from a variety of keys}, author={Abe, Masayuki and Ohkubo, Miyako and Suzuki, Koutarou}, journal={Advances in Cryptology, Asiacrypt 2002}, pages={639--645}, year={2002}, publisher={Springer} } @misc{van2013cryptonote, title={Cryptonote v 2. 0}, author={van Saberhagen, Nicolas}, year={2013} } @inproceedings{pointcheval1996security, title={Security proofs for signature schemes}, author={Pointcheval, David and Stern, Jacques}, booktitle={Eurocrypt}, volume={96}, pages={387--398}, year={1996}, organization={Springer} } @inproceedings{ohta1998concrete, title={On concrete security treatment of signatures derived from identification}, author={Ohta, Kazuo and Okamoto, Tatsuaki}, booktitle={Annual International Cryptology Conference}, pages={354--369}, year={1998}, organization={Springer} } @inproceedings{bresson2002threshold, title={Threshold ring signatures and applications to ad-hoc groups}, author={Bresson, Emmanuel and Stern, Jacques and Szydlo, Michael}, booktitle={Annual International Cryptology Conference}, pages={465--480}, year={2002}, organization={Springer} } @inproceedings{bender2006ring, title={Ring signatures: Stronger definitions, and constructions without random oracles}, author={Bender, Adam and Katz, Jonathan and Morselli, Ruggero}, booktitle={TCC}, volume={6}, pages={60--79}, year={2006}, organization={Springer} } @article{scozzafava1993uniform, title={Uniform distribution and sum modulo $m$ of independent random variables}, author={Scozzafava, Paola}, journal={Statistics \& probability letters}, volume={18}, number={4}, pages={313--314}, year={1993}, publisher={Elsevier} } @misc{maxwell2015borromean, title={Borromean ring signatures}, author={Maxwell, Gregory and Poelstra, Andrew}, year={2015} } @article{bonehthreshold, title={Threshold Cryptosystems From Threshold Fully Homomorphic Encryption}, author={Boneh, Dan and Gennaro, Rosario and Goldfeder, Steven and Jain, Aayush and Kim, Sam and Rasmussen, Peter MR and Sahai, Amit} } @article{shamir1979share, title={How to share a secret}, author={Shamir, Adi}, journal={Communications of the ACM}, volume={22}, number={11}, pages={612--613}, year={1979}, publisher={ACm} } @incollection{shamir1981mental, title={Mental poker}, author={Shamir, Adi and Rivest, Ronald L and Adleman, Leonard M}, booktitle={The mathematical gardner}, pages={37--43}, year={1981}, publisher={Springer} }