http://www.chaum.com/articles/Achieving_Electronic_Privacy.htm http://www.chaum.com/articles/Security_Wthout_Identification.htm