E. Androulaki, S. G. Choi, S. M. Bellovin, and T. Malkin, Reputation Systems for Anonymous Networks, Proceedings of the 8th International Symposium on Privacy Enhancing Technologies. pp. 202?218. PETS '08, 2008.
DOI : 10.1007/978-3-540-70630-4_13

URL : http://www.cs.columbia.edu/~smb/papers/anonrep.pdf

M. Barbaro and T. Zeller-jr, A face is exposed for aol searcher no, p.4417749, 2006.

R. Bazin, A. Schaub, O. Hasan, and L. Brunie, A decentralized anonymity-preserving reputation system with constant-time score retrieval (technical report) Cryptology ePrint Archive, Report, vol.2016416, p.416, 2016.

J. Bethencourt, E. Shi, and D. Song, Signatures of Reputation, Proceedings of the 14th International Conference on Financial Cryptography and Data Security, pp.400-407, 2010.
DOI : 10.1007/978-3-642-14577-3_35

A. Boldyreva, Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme, Public Key Cryptography PKC 2003, pp.31-46, 2002.
DOI : 10.1007/3-540-36288-6_3

URL : http://www.mathmagic.cn/crypt1998-2003/papers/2567/25670031.pdf

J. Camenisch, M. Koprowski, and B. Warinschi, Efficient Blind Signatures Without Random Oracles, Security in Communication Networks, pp.134-148, 2005.
DOI : 10.1007/978-3-540-30598-9_10

J. Camenisch and M. Stadler, Proof systems for general statements about discrete logarithms, 1997.

D. Chaum, Blind Signatures for Untraceable Payments, pp.199-203, 1983.
DOI : 10.1007/978-1-4757-0602-4_18

D. Chaum, A. Fiat, and M. Naor, Untraceable Electronic Cash, Advances in Cryptology CRYPTO 88, pp.319-327, 1990.
DOI : 10.1007/0-387-34799-2_25

T. Dimitriou and A. Michalas, Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Netw, pp.53-66, 2014.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13. pp. 21?21. SSYM'04, USENIX Association, 2004.
DOI : 10.21236/ADA465464

J. R. Douceur, The Sybil Attack, Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
DOI : 10.1007/3-540-45748-8_24

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, Advances in Cryptology EUROCRYPT 2008, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

O. Hasan, L. Brunie, E. Bertino, and N. Shang, A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.949-962, 2013.
DOI : 10.1109/TIFS.2013.2258914

URL : https://hal.archives-ouvertes.fr/hal-01339185

R. Merkle, A Certified Digital Signature, Advances in Cryptology CRYPTO 89 Proceedings, pp.218-238, 1990.
DOI : 10.1007/0-387-34805-0_21

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008.
DOI : 10.1109/SP.2008.33

T. Okamoto, Efficient Blind and Partially Blind Signatures Without Random Oracles, Theory of Cryptography, pp.80-99, 2006.
DOI : 10.1007/11681878_5

URL : http://eprint.iacr.org/2006/102.pdf

E. Pavlov, J. Rosenschein, and Z. Topol, Supporting Privacy in Decentralized Additive Reputation Systems, Lecture Notes in Computer Science, vol.2995, pp.108-119, 2004.
DOI : 10.1007/978-3-540-24747-0_9

R. Petrlic, S. Lutters, and C. Sorge, Privacy-preserving reputation management, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC '14, 2014.
DOI : 10.1145/2554850.2554881

P. Resnick and R. Zeckhauser, Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system, pp.127-157
DOI : 10.1016/S0278-0984(02)11030-3

A. Schaub, R. Bazin, O. Hasan, and L. Brunie, A Trustless Privacy-Preserving Reputation System, 2016.
DOI : 10.1007/978-3-319-33630-5_27

URL : https://hal.archives-ouvertes.fr/hal-01369572