“…In distributed computing environments, it is necessary to maintain the user anonymity (Lee and Chang, 2000;Wu and Hsu, 2004;Yang et al, 2004;Kumar and Rajendra, 2006;Gao et al, 2009;Wang et al, 2009;Wang and Hu, 2010;Liu and Huang, 2010;Sun et al, 2010;Tseng and Wu, 2010;Xiong et al, 2010;Ren et al, 2010). That is, only the server can identify the user, while no other entity can determine any information concerning the user's identity.…”