Information technology — Security techniques — Anonymous entity authentication —Part 2: Mechanisms based on signa...