M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, and M. Ohkubo, Structure-preserving signatures and commitments to group elements, Advances in Cryptology?CRYPTO, pp.209-236, 2010.

J. A. Akinyele, C. Garman, I. Miers, M. W. Pagano, M. Rushanan et al., Charm: a framework for rapidly prototyping cryptosystems, Journal of Cryptographic Engineering, vol.38, issue.3, pp.111-128, 2013.
DOI : 10.1007/s13389-013-0057-3

E. Anceaume and A. Ravoaja, Incentive-Based Robust Reputation Mechanism for P2P Services, International Conference on Principles of Distributed Systems (OPODIS), pp.305-319, 2006.
DOI : 10.1007/11945529_22

URL : https://hal.archives-ouvertes.fr/inria-00121609

E. Androulaki, S. G. Choi, S. M. Bellovin, and T. Malkin, Reputation Systems for Anonymous Networks, Privacy Enhancing Technologies, pp.202-218, 2008.
DOI : 10.1007/978-3-540-70630-4_13

D. F. Aranha, K. Karabina, P. Longa, C. H. Gebotys, and J. López, Faster Explicit Formulas for Computing Pairings over Ordinary Curves, Eurocrypt, pp.48-68, 2011.
DOI : 10.1007/978-3-642-20465-4_5

R. F. Baumeister, E. Bratslavsky, C. Finkenauer, and K. D. Vohs, Bad is stronger than good., Review of General Psychology, vol.5, issue.4, pp.323-370, 2001.
DOI : 10.1037/1089-2680.5.4.323

J. Bethencourt, E. Shi, and D. Song, Signatures of Reputation, Financial Cryptography and Data Security, pp.400-407, 2010.
DOI : 10.1007/978-3-642-14577-3_35

O. Blazy, G. Fuchsbauer, M. Izabachène, A. Jambert, H. Sibert et al., Batch Groth???Sahai, Applied Cryptography and Network Security (ACNS), 2010.
DOI : 10.1007/978-3-642-13708-2_14

URL : https://hal.archives-ouvertes.fr/inria-00577167

N. Borisov, Computational Puzzles as Sybil Defenses, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06), pp.171-176, 2006.
DOI : 10.1109/P2P.2006.10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.95.1170

J. Camenisch and M. Stadler, Efficient group signature schemes for large groups (extended abstract), Advances in Cryptology?CRYPTO, pp.410-424, 1997.

S. Clauß, S. Schiffner, and F. Kerschbaum, k-anonymous reputation, ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp.359-368, 2013.

C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, Proceedings of the 2nd ACM conference on Electronic commerce , EC '00, pp.150-157, 2000.
DOI : 10.1145/352871.352889

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The secondgeneration onion router, USENIX Security Symposium, pp.303-320, 2004.

P. Feldman, A practical scheme for non-interactive verifiable secret sharing, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987), pp.427-437, 1987.
DOI : 10.1109/SFCS.1987.4

G. Fuchsbauer, D. Pointcheval, R. Ostrovsky, R. D. Prisco, and I. Visconti, Anonymous Proxy Signatures, Security and Cryptography for Networks, pp.201-217, 2008.
DOI : 10.1007/978-3-540-85855-3_14

URL : https://hal.archives-ouvertes.fr/inria-00419153

J. Groth and A. Sahai, Efficient Non-interactive Proof Systems for Bilinear Groups, Eurocrypt, pp.415-432, 2008.
DOI : 10.1007/978-3-540-78967-3_24

E. Hamilton, M. Kriens, H. Karapand?i´ckarapand?i´c, K. Yaici, M. Main et al., Report on trust and reputation models, European Network and Information Security Agency (ENISA), 2011.

O. Hasan, L. Brunie, and E. Bertino, Preserving privacy of feedback providers in decentralized reputation systems, Computers & Security, vol.31, issue.7, pp.31816-826, 2012.
DOI : 10.1016/j.cose.2011.12.003

URL : https://hal.archives-ouvertes.fr/hal-01352961

O. Hasan, L. Brunie, E. Bertino, and N. Shang, A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.949-962, 2013.
DOI : 10.1109/TIFS.2013.2258914

URL : https://hal.archives-ouvertes.fr/hal-01339185

A. Jøsang and R. Ismail, The beta reputation system, Bled Electronic Commerce Conference, 2002.

A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003.
DOI : 10.1145/775152.775242

F. Kerschbaum, A verifiable, centralized, coercion-free reputation system, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.61-70, 2009.
DOI : 10.1145/1655188.1655197

T. Mahler and T. Olsen, Reputation systems and data protection law, eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, pp.180-187, 2004.

S. Marti and H. Garcia-molina, Taxonomy of trust: Categorizing P2P reputation systems, Computer Networks, vol.50, issue.4, pp.472-484, 2006.
DOI : 10.1016/j.comnet.2005.07.011

A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008.
DOI : 10.1109/SP.2008.33

E. Pavlov, J. S. Rosenschein, and Z. Topol, Supporting Privacy in Decentralized Additive Reputation Systems, Trust Management, pp.108-119, 2004.
DOI : 10.1007/978-3-540-24747-0_9

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability , pseudonymity, and identity management

P. Resnick and R. Zeckhauser, Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. The Economics of the Internet and E-Commerce, pp.127-157, 2002.

S. Steinbrecher, Enhancing multilateral security in and by reputation systems The Future of Identity in the Information Society, pp.135-150, 2008.

A. Whitby, A. Jøsang, and J. Indulska, Filtering out unfair ratings in bayesian reputation systems, Proceedings of the 7th International Workshop on Trust in Agent Societies, 2004.

B. Yu and M. P. Singh, Distributed Reputation Management for Electronic Commerce, Computational Intelligence, vol.18, issue.4, pp.535-549, 2002.
DOI : 10.1111/1467-8640.00202