Anonymous credentials: an illustrated primer (Part 2)
Summary
The article explains anonymous credential systems, detailing the roles of issuer, resources, and users, and how credentials can be used privately with features like bounded use and expressive statements. It hardens on real-world deployments (Privacy Pass) and contrasts publicly verifiable RSA-based blind signatures with privately verifiable cryptographic tokens, while discussing practical issues such as real-time issuance and timing attacks, and previews future work on zero-knowledge credentials.