The document provides an overview of a proposed anonymous certification system that uses pseudonyms. Key points:
- It aims to allow users to generate multiple unlinkable pseudonyms from a single master secret key, providing anonymity while still allowing authentication.
- Pseudonyms are generated using an identity generation process that squares the master public key. Certificates are obtained on pseudonyms using an anonymous certification scheme based on blind signatures.
- The system includes protocols for identification, where a user proves possession of a certified pseudonym, and tracing, where a trustee can reveal a user's identity using a verification transcript.
- The security is based on computational assumptions like factoring and the square root problem. Protocols are described