Research Article

Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems

Figure 5

(a) Time-consuming of key generation (left). (b) Time-consuming of secret reconstruction by different methods (right).
(a)
(b)