Information technology — Security techniques — Anonymous entity authentication —Part 1: GeneralTechnologies de l’...