Initially designed in 2001, ring signatures was proposed as a method to “leak a secret”. For example, a ring signatureRing signatures conceal the signer's identity by having them "sign" as a group. The only condition for verification of a... Read More could be used to provide an anonymous signature from “a high-ranking White House official”, without revealing which official signed the message. Ring signatures are similar to group signatures but differ in two key ways: first, there is no way to revoke the anonymity of an individual signature, and second, any group of users can be used as a group without additional setup. This signature implementation was then incorporated in cryptocurrencyA digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by... design which gave birth to Monero and other privacy coinsPrivacy coins are designed and developed with the continual focus of transaction privacy and data anonymity in mind. The foremost... Read More.
