Implementations of Ring Signature schemes. See How to Leak a Secret for the original paper.
The paper describes ring signatures using RSA, but this repository implements ring signatures using elliptic curves instead, based on Schnorr signatures.
## Disclaimer
Note that this implementation didn't go through a proper cryptographic audit. It's most likely not secure for real-world use. It hasn't been performance-tested either, so it's probably not the most performant implementation you could find either. If you do look at the code and find security issues, please open an issue: I would be really interested in understanding what could go wrong and fixing it (and maybe eventually this will become a usable implementation, who knows?).