Public-key cryptography
Anonymity
Digital signature
Telecommunications data retention
Proxy re-encryption
Mix network
Tor
Cryptography
Group signature
Blind signature