Research Article

Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems

Figure 6

(a) Time-consuming of secret distribution and secret reconstruction (left). (b) Time-consuming in Waters key-generation (W.KG), Waters signature (W.Sig), linear encryption key-generation (LE.KG), and entire interaction process of SPHF (right).
(a)
(b)