J. Audun, I. Roslan, and B. Colin, A survey of trust and reputation systems for online service provision, Decis. Support Syst, vol.43, issue.2, pp.618-644, 2007.

J. Benaloh, Dense probabilstic encryption, Proc. of the Workshop on Selected Areas of Cryptography, pp.120-128, 1994.

D. Boneh, E. Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts, Proc. of TCC, pp.325-341, 2005.
DOI : 10.1007/978-3-540-30576-7_18

S. Chakraborty and I. Ray, TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006.
DOI : 10.1145/1133058.1133067

C. Dwork, Differential Privacy, ICALP, pp.1-12, 2006.
DOI : 10.1007/11787006_1

N. Gal-oz, T. Grinshpoun, E. Gudes, and A. Meisels, Cross-community reputation: Policies and alternatives, Proc. of International Conference on Web Based Communities (IADIS -WBC2008), 2008.

N. Gal-oz, E. Gudes, and D. Hendler, A Robust and Knot-Aware Trust-Based Reputation Model, Proceedings of the 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM'08), pp.167-182, 2008.
DOI : 10.1007/978-0-387-09428-1_11

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

URL : http://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf

O. Goldreich, Foundations of Cryptography: Basic Tools, 2000.

O. Goldreich, Foundations of Cryptography Basic Applications, 2004.

O. Goldreich, S. Goldwasser, and S. Micali, How to construct random functions, Journal of the ACM, vol.33, issue.4, pp.792-807, 1986.
DOI : 10.1145/6490.6503

URL : http://dl.acm.org/ft_gateway.cfm?id=6503&type=pdf

O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game (extended abstract), STOC87, pp.218-229, 1987.
DOI : 10.1145/28395.28420

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : https://doi.org/10.1016/0022-0000(84)90070-9

T. Grinshpoun, N. Gal-oz, A. Meisels, and E. Gudes, CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, pp.34-41, 2009.
DOI : 10.1109/WI-IAT.2009.13

E. Gudes, N. Gal-oz, and A. Grubshtein, Methods for Computing Trust and Reputation While Preserving Privacy, Proc. of DBSEC, pp.291-298, 2009.
DOI : 10.1145/359168.359176

J. , Y. Hsu, K. Lin, T. Chang, C. Ho et al., Parameter learning of personalized trust models in broker-based distributed trust management, Information Systems Frontiers, vol.8, issue.4, pp.321-333, 2006.

A. Josang and R. Ismail, The beta reputation system, proceedings of 15th Bled Electronic Commerce Conference e-Reality: Constructing the e-Economy, 2002.

L. Mui, M. Mohtashemi, and A. Halberstadt, A computational model of trust and reputation for e-businesses, Proc. of the 35th Annual Hawaii International Conference on System Sciences, p.188, 2002.

D. Naccache and J. Stern, A new public key cryptosystem based on higher residues, Proceedings of the 5th ACM conference on Computer and communications security , CCS '98, pp.59-66, 1998.
DOI : 10.1145/288090.288106

J. Nin, B. Carminati, E. Ferrari, and V. Torra, Computing Reputation for Collaborative Private Networks, 2009 33rd Annual IEEE International Computer Software and Applications Conference, pp.246-253, 2009.
DOI : 10.1109/COMPSAC.2009.40

T. Okamoto and S. Uchiyama, A new public-key cryptosystem as secure as factoring, Proc. of EUROCRYPT, pp.308-318, 1998.
DOI : 10.1007/BFb0054135

URL : http://www.di.ens.fr/~pointche/proposals/Documents/OkUc98.ps.gz

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proc. of EUROCRYPT, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

E. Pavlov, J. S. Rosenschein, and Z. Topol, Supporting Privacy in Decentralized Additive Reputation Systems, Proc. of 2nd Intl. Conf. on Trust Mgmt, pp.108-119, 2004.
DOI : 10.1007/978-3-540-24747-0_9

T. P. Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Proc. of CRYPTO, pp.129-140, 1991.
DOI : 10.1007/3-540-46766-1_9

F. Pingel and S. Steinbrecher, Multilateral Secure Cross-Community Reputation Systems for Internet Communities, proceedings of TrustBus (TrustBus '08), pp.69-78, 2008.
DOI : 10.1007/978-3-540-85735-8_8

P. Resnick and R. Zeckhauser, Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system The Economics of the Internet and E-Commerce, of Advances in Applied Microeconomics, pp.127-157, 2002.

J. Sabater and C. Sierra, Review on Computational Trust and Reputation Models, Artificial Intelligence Review, vol.18, issue.4, pp.33-60, 2005.
DOI : 10.1111/1467-9876.00159

URL : http://www.iiia.csic.es/files/pdfs/1035.pdf

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

S. Steinbrecher, Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities, Proc. of the IFIP TC-11 21st International Information Security Conference, pp.123-134, 2006.
DOI : 10.1007/0-387-33406-8_11

Z. Xiong, Y. Yang, X. Zhang, D. Yu, and L. Liu, A trustbased reputation system in peer-to-peer grid, HCI (15), pp.228-235, 2007.

B. Yu and M. Singh, Detecting deception in reputation management, Proceedings of the second international joint conference on Autonomous agents and multiagent systems , AAMAS '03, pp.73-80, 2003.
DOI : 10.1145/860575.860588

URL : http://www4.ncsu.edu/~byu/papers/p112-yu.pdf

B. Yu, M. P. Singh, and K. Sycara, Developing trust in large-scale peer-to-peer systems, Proceedings of First IEEE Symposium on Multi-Agent Security and Survivability, pp.1-10, 2004.