TY - BOOK AU - Paillier, P. PY - 1999 DA - 1999// TI - Public-key cryptosystems based on composite degree residuosity classes. Advances in cryptology, EUROCRYPT 99 PB - Springer Berlin Heidelberg CY - pp 223–238 ID - Paillier1999 ER - TY - BOOK AU - Pavlov, E. AU - Rosenschein, J. S. AU - Topol, Z. PY - 2004 DA - 2004// TI - Supporting privacy in decentralized additive reputation systems UR - https://doi.org/10.1007/978-3-540-24747-0_9 DO - 10.1007/978-3-540-24747-0_9 ID - Pavlov2004 ER - TY - CHAP AU - Gudes, E. AU - Gal-Oz, N. PY - 2009 DA - 2009// BT - A grubshtein: methods for computing trust and reputation while preserving privacy ID - Gudes2009 ER - TY - CHAP AU - Cramer, R. AU - Damgard, I. B. AU - Buus Nielsen, J. PY - 2001 DA - 2001// TI - Multiparty computation from threshold homomorphic encryption BT - EUROCRYPT ‘01: proceedings of the international conference on the theory and application of cryptographic techniques PB - Springer CY - Berlin Heidelberg ID - Cramer2001 ER - TY - JOUR AU - Franklin, M. AU - Haber, S. PY - 1996 DA - 1996// TI - Joint encryption and message-efficient secure computation JO - J Cryptology VL - 9 UR - https://doi.org/10.1007/s001459900013 DO - 10.1007/s001459900013 ID - Franklin1996 ER - TY - CHAP AU - Romero-Tris, C. AU - Castella-Roca, J. AU - Viejo, A. PY - 2012 DA - 2012// BT - Multi-party private web search with untrusted partners UR - https://doi.org/10.1007/978-3-642-31909-9_15 DO - 10.1007/978-3-642-31909-9_15 ID - Romero-Tris2012 ER - TY - CHAP AU - Damgard, I. AU - Faust, S. AU - Hazay, C. ED - Cramer, R. PY - 2012 DA - 2012// TI - Secure two-party computation with low communication BT - TCC 2012, LNCS 7194 ID - Damgard2012 ER - TY - CHAP AU - Dolev, S. AU - Gilboa, N. AU - Kopeetsky, M. PY - 2010 DA - 2010// TI - Computing trust privately in the presence of curious and malicious users BT - Proceedings of the international symposium on stochastic models in reliability engineering, life sciences and operations management PB - Sami Shamoon College of Engineering CY - Beer-Sheva, Israel ID - Dolev2010 ER - TY - CHAP AU - Dolev, S. AU - Gilboa, N. AU - Kopeetsky, M. PY - 2010 DA - 2010// TI - Computing multi-party trust privately in O(n) time units sending one (possibly large) message at a time BT - Proceedings of 25-th Symposium On Applied Computing (SAC 2010) PB - Sierre CY - Switzerland UR - https://doi.org/10.1145/1774088.1774401 DO - 10.1145/1774088.1774401 ID - Dolev2010 ER - TY - CHAP AU - Asharov, G. AU - Jain, A. AU - Tromer, E. AU - Vaikuntanathan, N. AU - Wichs, D. PY - 2012 DA - 2012// TI - Multiparty computation with low communication, computation and interaction via threshold FHE BT - Proceedings of the EUROCRYPT 2012 UR - https://doi.org/10.1007/978-3-642-29011-4_29 DO - 10.1007/978-3-642-29011-4_29 ID - Asharov2012 ER - TY - CHAP AU - Beerliova-Trubmiova, Z. AU - Hirt, M. PY - 2008 DA - 2008// TI - Perfectly-secure mpc with linear communication complexity BT - TCC2008, LNCS 4948 ID - Beerliova-Trubmiova2008 ER - TY - CHAP AU - Dimitriou, T. AU - Michalas, A. PY - 2012 DA - 2012// TI - Multi-party trust computation in decentralized environment BT - Proceedings of the 5-th, IFIP international conference on New Technologies, Mobility and Security (NTMS 2012) PB - Istanbul CY - Turkey ID - Dimitriou2012 ER - TY - CHAP AU - Dimitriou, T. AU - Michalas, A. PY - 2013 DA - 2013// BT - Multi-party trust computation in decentralized environments in the presence of malicious adversaries ID - Dimitriou2013 ER - TY - JOUR AU - Bachrach, Y. AU - Parnes, A. AU - Procaccia, A. D. AU - Rosenschein, J. S. PY - 2009 DA - 2009// TI - Gossip-based aggregation of trust in decentralized reputation systems JO - Autonomous Agents, Multi-Agent Syst VL - 19 UR - https://doi.org/10.1007/s10458-008-9073-6 DO - 10.1007/s10458-008-9073-6 ID - Bachrach2009 ER - TY - CHAP AU - Huynh, T. D. AU - Jennings, N. R. AU - Shadbolt, N. R. PY - 2004 DA - 2004// TI - An integrated trust and reputation model for open multi-agent systems BT - Proceedings of 16th European Conference on Artificial Intelligence PB - Spain CY - pp 18-22 ID - Huynh2004 ER - TY - BOOK AU - Kinateder, M. AU - Rothermel, K. PY - 2003 DA - 2003// TI - Architecture and algorithms for a distributed reputation system. Trust, Management ID - Kinateder2003 ER - TY - CHAP AU - Mui, L. AU - Mohtashemi, M. AU - Halberstadt, A. PY - 2002 DA - 2002// BT - A computational model of trust and reputation UR - https://doi.org/10.1109/HICSS.2002.994181 DO - 10.1109/HICSS.2002.994181 ID - Mui2002 ER - TY - JOUR AU - Xiong, L. AU - Liu, L. PY - 2004 DA - 2004// TI - PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities JO - IEEE Trans. Knowl Data, Eng VL - 16 UR - https://doi.org/10.1109/TKDE.2004.1318566 DO - 10.1109/TKDE.2004.1318566 ID - Xiong2004 ER - TY - JOUR AU - Dolev, D. AU - Lynch, N. A. AU - Pinter, S. S. AU - Stark, E. W. AU - Weihl, W. E. PY - 1986 DA - 1986// TI - Reaching approximate agreement in the presence of faults JO - J ACM VL - 33 UR - https://doi.org/10.1145/5925.5931 DO - 10.1145/5925.5931 ID - Dolev1986 ER - TY - BOOK AU - Pedersen, T. P. PY - 1991 DA - 1991// TI - Non-interactive and information theoretic secure verifiable secret sharing. Advances in Cryptology CRYPTO 91, PB - Springer Berlin Heidelberg CY - pp 129-140 ID - Pedersen1991 ER - TY - JOUR AU - Shamir, A. PY - 1979 DA - 1979// TI - How to share a secret JO - Commun ACM VL - 11 UR - https://doi.org/10.1145/359168.359176 DO - 10.1145/359168.359176 ID - Shamir1979 ER - TY - JOUR AU - Hasan, O. AU - Brunie, L. AU - Bertino, E. AU - Shang, N. PY - 2013 DA - 2013// TI - A decentralized privacy preserving reputation protocol for the malicious adversarial model JO - Inf Forensics Secur J VL - 8 UR - https://doi.org/10.1109/TIFS.2013.2262891 DO - 10.1109/TIFS.2013.2262891 ID - Hasan2013 ER - TY - JOUR AU - Dolev, S. AU - Ostrovsky, R. PY - 2000 DA - 2000// TI - Xor-trees for efficient anonymous multicast and reception JO - ACM Trans Inf Syst Secur VL - 3 UR - https://doi.org/10.1145/354876.354877 DO - 10.1145/354876.354877 ID - Dolev2000 ER - TY - BOOK AU - Goldreich, O. PY - 2000 DA - 2000// TI - Foundations of cryptography: volume 1, basic tools PB - Cambridge University Press CY - New York ID - Goldreich2000 ER - TY - CHAP AU - Naccache, D. AU - Stern, J. PY - 1998 DA - 1998// BT - A new public key cryptosystem based on higher residues UR - https://doi.org/10.1145/288090.288106 DO - 10.1145/288090.288106 ID - Naccache1998 ER - TY - JOUR AU - Goldwasser, S. AU - Micali, S. PY - 2004 DA - 2004// TI - Probabilistic encryption JO - J Comput Sci Contr Syst VL - 28 ID - Goldwasser2004 ER - TY - CHAP AU - Okamoto, T. AU - Uchiyama, S. PY - 1998 DA - 1998// TI - A new public-key cryptosystem as secure as factoring BT - EUROCRYPT 1998 ID - Okamoto1998 ER - TY - CHAP AU - Benaloh, J. PY - 1994 DA - 1994// TI - Dense probabilistic encryption BT - Proceedings of the workshop on selected areas of cryptography. Kingston, pp 120–128 ID - Benaloh1994 ER - TY - BOOK AU - Boneh, D. AU - Goh, E. -. J. AU - Nissim, K. PY - 2005 DA - 2005// TI - Evaluating 2-DNF formulas on ciphertexts UR - https://doi.org/10.1007/978-3-540-30576-7_18 DO - 10.1007/978-3-540-30576-7_18 ID - Boneh2005 ER - TY - CHAP AU - Gentry, C. PY - 2009 DA - 2009// TI - Fully homomorphic encryption using ideal lattices BT - Proceedings of the forty-first annual ACM symposium on Theory of computing STOC PB - ACM CY - New York, NY, USA ID - Gentry2009 ER - TY - JOUR AU - Beimel, A. AU - Dolev, S. PY - 2003 DA - 2003// TI - Buses for anonymous message delivery JO - J Cryptology VL - 16 UR - https://doi.org/10.1007/s00145-002-0128-6 DO - 10.1007/s00145-002-0128-6 ID - Beimel2003 ER - TY - BOOK AU - Goldreich, O. PY - 2004 DA - 2004// TI - Foundations of cryptography: volume 2, basic applications PB - Cambridge University Press CY - New York UR - https://doi.org/10.1017/CBO9780511721656 DO - 10.1017/CBO9780511721656 ID - Goldreich2004 ER - TY - STD TI - Pohlig SC, Hellman ME, (1978): An improved algorithm for computing logarithms in GF(p) and its cryptographic significance. IEEE Trans. Inf. Theory 24(1):106–110. ID - ref33 ER - TY - CHAP AU - El Gamal, T. PY - 1985 DA - 1985// TI - A public key cryptosystem and a signature scheme based on discrete logarithms BT - Proceedings of CRYPTO 84 on Advances in cryptology PB - Springer-Verlag New York, Inc CY - New York, NY, USA ID - El Gamal1985 ER - TY - CHAP AU - Boneh, D. PY - 1998 DA - 1998// TI - The decision Diffie-Hellman problem BT - Proceedings of Algorithmic Number Theory, Third International Symposium, ANTS-III UR - https://doi.org/10.1007/BFb0054851 DO - 10.1007/BFb0054851 ID - Boneh1998 ER - TY - CHAP AU - Benaloh, J. PY - 1987 DA - 1987// TI - Verifiable secret-ballot elections BT - Ph.D. thesis ID - Benaloh1987 ER -