Anonymous and distributed access control to remote services
With two different methods (centralized and distributed) to obtain credentials in front of the authority with responsibility. This invention is set of new distributed access protocol, that, with reduced communication between partners, allows to anonymously control the access to resources or web services. The system can be naturally incorporated in a number of different scenarios like blockchain, electronic vote protocol or management website access among other applications. Anonymous identification is an important topic within cryptographic protocol application that has not been sufficiently developed. Current identification considers password generation (in centralized or distributed systems), key interchange systems, web identification, or anonymous credentials. In any case, these systems consider a central authority who knows the user identity (distributed systems), which can also be known by the servers (key interchange system). In some other protocols, users identity can be dependent on third entities with the ability of exchange users information. In addition, when anonymity is requested, protocols usually have high computational complexity. The protocols in this invention are capable of providing solutions to current limitations, offering an alternative which allows to hide the user identity when accessed to the resource, i. e. when the privacy conflict appears. The system is backed by perfect secrecy, mathematic property that assures the access /log in systems is secure even in post-quantum scenario.