For these linked signatures with the same T2, C sends T2 to each SMi and requests each SMi to prove that it doesn’t generate this T2. The details of Trace algorithm are in the Appendix. After the Trace algorithm, C executes the Verify algorithm for the remaining unlinked messages and then it makes complex statistical analysis of these data.