Electronic Identities Need Private Credentials

J. Camenisch, A. Lehmann, G. Neven
2012 IEEE Security and Privacy  
doi:10.1109/msp.2012.7 fatcat:xf6t47z7sffyboumcta67xxhqm