Information technology — Security techniques — Anonymous entity authentication —Part 4: Mechanisms based on weak...