M. Abe, M. Ohkubo, and K. Suzuki, 1-out-of-n signatures from a variety of keys, Advances in Cryptology-Asiacrypt, pp.639-645, 2002.

E. Philip, M. Agre, and . Rotenberg, Technology and privacy: The new landscape, 1998.

M. Bellare, C. Namprempre, and G. Neven, Security proofs for identity-based identification and signature schemes, Journal of Cryptology, vol.22, pp.1-61, 2009.

J. Daniel and . Bernstein, International Workshop on Public Key Cryptography, pp.978-981, 2006.

E. Bertino, J. Byun, and N. Li, Privacy-Preserving Database Systems, Foundations of security analysis and design III: FOSAD 2004/2005 tutorial lectures, pp.178-206, 2005.

G. Bertoni, Keccak sponge function family main document, Submission to NIST, vol.3, p.30, 2009.

S. Buchegger, PeerSoN: P2P Social Networking -Early Experiences and Insights, Proceedings of the Second ACM Workshop on Social Network Systems Social Network Systems, pp.46-52, 2009.

N. Cao, Privacy-preserving query over encrypted graph-structured data in cloud computing, Distributed Computing Systems (ICDCS), pp.393-402, 2011.

. Datanyze, Email Hosting Market Share Report. Datanyze, 2018.

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, pp.18-9448, 1976.

E. Graham-harrison and C. Cadwalladr, Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach, The Guardian, 2018.

D. Irvine, MaidSafe Distributed File System, 2010.

O. Khan, Major Email Provider Trends in 2015: Gmail's Lead Increases. Mailchimp, 2015.

N. Lambert, Q. Ma, and D. Irvine, Safecoin: The Decentralised Network Token, Tech. rep. MaidSafe, Tech. Rep, 2015.

L. Lamport, Time, Clocks and the Ordering of Events in a Distributed System, Communications of the ACM, vol.21, issue.7, pp.558-565, 1978.

O. Lassila and R. R. Swick, Resource Description Framework (RDF): Model and Syntax. W3C Recommendation. W3C, 1997.

S. J. Lewis, On Emergent Centralization, 2018.

K. Lewkowicz, Here's What We Learned After Tracking 17 Billion Email Opens

P. Maymounkov, ;. Mazieres, F. English-;-p-druschel, A. Kaashoek, and . Rowstron, Lecture notes in Computer Science. 1st International Workshop on Peer-to-Peer Systems, Microsoft Res. Heidelberger Platz, vol.2429, pp.3-540, 2002.

S. Victor and . Miller, Use of Elliptic Curves in Cryptography, Advances in Cryptology -CRYPTO '85 Proceedings, pp.978-981, 1986.

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 2010.

, Platform for Privacy Preferences (P3P) Project. W3C Recommendation. W3C, 2014.

, /679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, 2016.

. Apr, , vol.27, 2016.

R. Rivest, A. Shamir, and Y. Tauman, How to leak a secret, Advances in Cryptology-ASIACRYPT 2001, pp.552-565, 2001.

N. Van-saberhagen, , 2013.

C. Schnorr, Efficient signature generation by smart cards, In: Journal of cryptology, vol.4, pp.161-174, 1991.

C. Schnorr, Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system, vol.4995082, 1991.

C. Soler, A Generic Data Exchange System for Friend-to-Friend Networks, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01617423

P. Todd, Stealth addresses, 2014.

C. Troncoso, Systematizing Decentralization and Privacy: Lessons from 15 years of research and deployments, Proceedings on Privacy Enhancing Technologies, vol.4, pp.404-426, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01673295

, Untraceable transactions which can contain a secure message are inevitable, 2011.