Research Article

Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems

Figure 4

(a) Time-consuming of secret distribution in different thresholds (left). (b) Time-consuming of secret reconstruction (right).
(a)
(b)