Slamanig, “Structure-preserving signatures on equivalence classes and constant-size anonymous credentials,” Journal of Cryptology, vol. 32, no. 2, pp. 498–546, Apr. 2019. ◼ [TG20] S.-Y. Tan and T. Groß, “MoniPoly - an expressive q-SDH-based anonymous attribute- based credential system,” in ASIACRYPT 2020, Part III, ser. LNCS, S. Moriai and H. Wang, Eds., vol. 12493. Springer, Heidelberg, Dec. 2020, pp. 498–526. ◼ [S20] O. Sanders, “Efficient redactable signature and application to anonymous credentials,” in PKC 2020, Part II, ser. LNCS, A. Kiayias, M. Kohlweiss, P. Wallden, and V. Zikas, Eds., vol. 12111. Springer, Heidelberg, May 2020, pp. 628–656. ◼ [SP21] O. Steele and M. Prorock, “JSON Web Proofs for Binary Merkle Trees,“ https://w3c- ccg.github.io/Merkle-Disclosure-2021/jwp/ ◼ [FY22] D. Fett and K. Yasuda, “Selective Disclosure JWT (SD-JWT),“ Internet-Draft, Jul. 2022, https://datatracker.ietf.org/doc/draft-fett-oauth-selective-disclosure-jwt/02/ ◼ [MJ22] J. Miller and M. Jones, “JSON Proof Algorithms,“ Internet-Draft, Jul. 2022, https://www.ietf.org/archive/id/draft-jmiller-jose-json-proof-algorithms-00.html ◼ [ISO/IEC 27551] ISO/IEC 27551:2021, Information security, cybersecurity and privacy protection — Requirements for attribute-based unlinkable entity authentication