“…That is, under the assumption that each user is already associated with a public key of some standard signature scheme, a user can form a group Regional Personal No Trusted Statistics Enquiry Third Party Billing Protocols (e.g. [32,3,12,38,11,21]) × × Settlement/profiling Protocols (e.g. [15,26,42]) × Service Provider Protocols (e.g.…”