Extensible false name certificate system and method

In a real case, a user obtained a root evidence from the confided entity, generated one or more fake-name certifications based on the root evidence, equipped them with anonymity common keys of fake-name certifications and sent them to many certifier. The certifier by the fake-name certifications believed that user's anonymity common keys were authenticated by the confided entity. The fake-name certification does not include the info about the user's real status. With the aid of extendable fake-name certification system, the confided entity only needs to authenticate once against the user's root common key. The user may generate a great number of fake-name common keys. Each of them equips with a different fake-name certification.