Alice wants to authenticate to a paid service. Anonymous credentials can help her authenticate and use the service without revealing any information about her identity.
Anonymous credentials provide identity and authentication while providing strong privacy guarantees.
There are two main types of anonymous credential systems:
- Tokens, which are lightweight anonymous credentials that encode a single message and can be used only once
- Credentials, which are more structured, allow for embedding different attributes, and can be used multiple times
In this website we attempt to organize the vast universe of anonymous credentials:
- We present a variety of published anonymous credential schemes
- We provide details on the mathematical primitives that underlay these constructions
- We categorize the various properties that anonymous credential schemes can support
- To improve intuition we attempt to organize the various schemes in tree form