Information security — Anonymous entity authentication —Part 3: Mechanisms based on blind signaturesSécurité de ...