In many network applications, we need to be able to authenticate the data while, at the same time, protect the anonymity or privacy of the data source - in other words, anonymity-preserving authentication (APA) is needed. APA schemes are needed in applications where the receivers (or verifiers) of data should not learn the actual identity of the data sender (or source of data), and are willing to accept tokens of authentication that are verifiably linked to an anonymous user, knowing that the sender’s identity can be revealed by a trusted third party, if disputes need to be resolved. This invention is a practical technique that can be used to provide APA in real-world network applications. Examples of such applications include identity escrow schemes, digital auctions, e-cash protocols, remote attestation of computing platforms, safety applications in vehicular networks, and a number of Internet-of-Things (IoT) applications.