J. Camenisch and A. Mityagin, Mix-Network with Stronger Security, In: Privacy Enhancing Technologies, vol.22, issue.11, pp.128-146, 2005.
DOI : 10.1007/978-3-540-24638-1_18

G. Danezis, C. Díaz, E. Käsper, and C. Troncoso, The Wisdom of Crowds: Attacks and Optimal Constructions, In: ESORICS, vol.7, issue.4, pp.406-423, 2009.
DOI : 10.1145/1042031.1042032

T. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, CRYPTO '91: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, pp.129-140, 1992.
DOI : 10.1007/3-540-46766-1_9

I. Damgard, T. Pedersen, and B. Pfitzmann, Statistical Secrecy and Multi-Bit Commitments, BRICS Report Series, vol.3, issue.45, 1996.
DOI : 10.7146/brics.v3i45.20047

R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, CRYPTO '98: Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology, pp.13-25, 1998.
DOI : 10.1007/BFb0055717

N. Asokan, E. V. Herreweghen, and M. Steiner, Towards a framework for handling disputes in payment systems, 1998.

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, EUROCRYPT '01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pp.93-118, 2001.
DOI : 10.1007/3-540-44987-6_7

S. Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000.

K. Irwin and T. Yu, An identifiability-based access control model for privacy protection in open systems, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, pp.43-43, 2004.
DOI : 10.1145/1029179.1029194