Research Article
Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems
Figure 4
(a) Time-consuming of secret distribution in different thresholds (left). (b) Time-consuming of secret reconstruction (right).
(a) |
(b) |