Implementation of a signature scheme from: "How to Leak a Secret" by Ronald L. Rivest, Adi Shamir, Yael Tauman, 2001, ASIACRYPT 2001, LNCS 2248 [https://people.csail.mit.edu/rivest/pubs/RST01.pdf]