Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols (and abbreviated terms)
5 General model and requirements
6 Mechanisms with linking capability
7 Mechanisms with opening capability
8 Mechanisms with both opening and linking
capabilities
Annex A (normative) - Object identifiers
Annex B (normative) - Special hash-functions
Annex C (informative) - Security guidelines for the
anonymous signature mechanisms
Annex D (informative) - Comparison of revocation
mechanisms
Annex E (informative) - Numerical examples
Annex F (informative) - Proof of correct generation
in Mechanism 5
Bibliography