1. How to Leak a Secret;Rivest,2001
2. L-out-of-n signatures from a variety of keys;Masayuki,2002
3. A ring signature scheme using bilinear pairings;Xu,2004
4. An efficient signature scheme from bilinear pairings and its applications;Zhang,2004
5. Deniable ring authentication;Naor,2002