C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, Proceedings of the 2nd ACM conference on Electronic commerce , EC '00, 2000.
DOI : 10.1145/352871.352889

A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.33

S. Steinbrecher, Enhancing Multilateral Security in and by Reputation Systems, 2008.
DOI : 10.1016/S1389-1286(00)00029-3

J. Bethencourt, E. Shi, and D. Song, Signatures of Reputation, 2010.
DOI : 10.1007/978-3-642-14577-3_35

E. Pavlov, J. S. Rosenschein, and Z. Topol, Supporting Privacy in Decentralized Additive Reputation Systems, International Conference on Trust Management, 2004.
DOI : 10.1007/978-3-540-24747-0_9

O. Hasan, L. Brunie, and E. Bertino, Preserving privacy of feedback providers in decentralized reputation systems, Computers & Security, vol.31, issue.7, 2012.
DOI : 10.1016/j.cose.2011.12.003

URL : https://hal.archives-ouvertes.fr/hal-01352961

F. Kerschbaum, A verifiable, centralized, coercion-free reputation system, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009.
DOI : 10.1145/1655188.1655197

S. Clauß, S. Schiffner, and F. Kerschbaum, k-anonymous reputation, In: Symposium on Information, Computer and Communications SecurityASIACCS, 2013.

E. Androulaki, S. G. Choi, S. M. Bellovin, and T. Malkin, Reputation Systems for Anonymous Networks, Privacy Enhancing Technologies (PETS), 2008.
DOI : 10.1007/978-3-540-70630-4_13

R. F. Baumeister, E. Bratslavsky, C. Finkenauer, and K. D. Vohs, Bad is stronger than good, Review of General Psychology, 2001.

P. Lajoie-mazenc, E. Anceaume, G. Guette, T. Sirvent, and V. Viet-triem-tong, Extending signatures of reputation, In: Privacy and Identity. IFIP AICT, pp.421-165, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00997133

P. Resnick and R. Zeckhauser, Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. The Economics of the Internet and E-Commerce, 2002.

A. Jøsang and R. Ismail, The beta reputation system, Bled Electronic Commerce Conference, 2002.

B. Yu and M. P. Singh, Distributed Reputation Management for Electronic Commerce, Computational Intelligence, vol.18, issue.4, 2002.
DOI : 10.1111/1467-8640.00202

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, 2003.
DOI : 10.1145/775152.775242

E. Anceaume and A. Ravoaja, Incentive-Based Robust Reputation Mechanism for P2P Services, International Conference on Principles of Distributed Systems (OPODIS), 2006.
DOI : 10.1007/11945529_22

URL : https://hal.archives-ouvertes.fr/inria-00121609

O. Hasan, L. Brunie, E. Bertino, and N. Shang, A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, 2013.
DOI : 10.1109/TIFS.2013.2258914

URL : https://hal.archives-ouvertes.fr/hal-01339185

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, 2007.
DOI : 10.1016/j.dss.2005.05.019

S. Marti and H. Garcia-molina, Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, 2006.
DOI : 10.1016/j.comnet.2005.07.011

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 2010.

A. Whitby, A. Jøsang, and J. Indulska, Filtering out unfair ratings in bayesian reputation systems, In: International Workshop on Trust in Agent Societies, 2004.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, USENIX Security Symposium, 2004.

P. Feldman, A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), 1987.
DOI : 10.1109/SFCS.1987.4

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, Eurocrypt, 2008.
DOI : 10.1007/978-3-540-78967-3_24

G. Fuchsbauer and D. Pointcheval, Anonymous Proxy Signatures, Security and Cryptography for Networks (SCN), 2008.
DOI : 10.1007/978-3-540-85855-3_14

URL : https://hal.archives-ouvertes.fr/inria-00419153

M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo, Structurepreserving signatures and commitments to group elements, In: Advances in Cryptology?CRYPTO, 2010.

P. Lajoie-mazenc, E. Anceaume, G. Guette, T. Sirvent, and V. Viet-triem-tong, Efficient distributed privacy-preserving reputation mechanism handling nonmonotonic ratings, 2015.
DOI : 10.1007/978-3-319-18491-3_7

URL : https://hal.archives-ouvertes.fr/hal-01104837

O. Blazy, G. Fuchsbauer, M. Izabachène, A. Jambert, H. Sibert et al., Batch Groth???Sahai, Applied Cryptography and Network Security (ACNS), 2010.
DOI : 10.1007/978-3-642-13708-2_14

URL : https://hal.archives-ouvertes.fr/inria-00577167

D. F. Aranha, K. Karabina, P. Longa, C. H. Gebotys, and J. López, Faster Explicit Formulas for Computing Pairings over Ordinary Curves, In: Eurocrypt, 2011.
DOI : 10.1007/978-3-642-20465-4_5

J. A. Akinyele, C. Garman, I. Miers, M. W. Pagano, M. Rushanan et al., Charm: a framework for rapidly prototyping cryptosystems, Journal of Cryptographic Engineering, vol.38, issue.3, pp.111-128, 2013.
DOI : 10.1007/s13389-013-0057-3