“…[14] presented a protocol that also protects the buyer's privacy. Several buyer-seller protocol variants have been constructed since then, including the protocols proposed in [1], [2], [5], [6], [8], [9], [12], [13], [15], [16], [17], [21], and subsequent analyses appear in [10], [11], [20], [24], [5,4,23].…”