The Nix language is also a fully interpreted language without any kind of just-in-time compilation, so it’s not all that well suited for computationally intensive tasks.
Before we get into the weeds of building anonymous credentials, it’s worth considering the obvious solution. What we want is simple: every user’s credential should be indistinguishable when “shown” to the resource. The obvious question is: why doesn’t the the issuer give a copy of the exact same exact credential to each user? In principle this solves all of the privacy problems, since every user’s “show” will literally be identical. (In fact, this is more or less the digital analog of the physical wristband approach.)
,这一点在PDF资料中也有详细论述
Варвара Кошечкина (редактор отдела оперативной информации)。关于这个话题,服务器推荐提供了深入分析
人 民 网 版 权 所 有 ,未 经 书 面 授 权 禁 止 使 用