[1]Hasan O, Brunie L, Bertino E. Preserving privacy of feedback providers in decentralized reputation systems[J]. Computers & Security, 2012, 31(7): 816826. [2]Hasan O, Brunie L, Bertino E. A decentralized privacy preserving reputation protocol for the malicious adversarial model[R]. RRLIRIS2012008, France: University of Lyon, 2012. [3]Dimitriou T, Michalas A. MultiParty trust computation in decentralized environments[C]//5th IFIP International Conference on New Technologies, Mobility and Security(NTMS). Istanbul: IEEE, 2012. [4]Michael T Goodrich, Florian Kerschbaum. Privacyenhanced reputationfeedback methods to reduce feedback extortion in online auctions [C]∥CODASPY’11 Proceedings of the First ACM Conference on Data and Application Security and Privacy. San Antonio: ACM, 2011: 273282. [5]Schiffner S, Sebastian Clauβ, Sandra Steinbrecher. Privacy, liveliness and fairness for reputation[C]∥ Ivana Cˇerná,Tibor Gyimóthy. InSOFSEM. Berlin: Springer Verlag, 2011: 506519. [6]Martucci L A, Ries SMühlhuser M. Sybilfree pseudonyms, privacy and trust: Identity management in the internet of services [J]. Journal of Information Processing, 2011, 19(1): 115. [7]Jan Camenisch, Anna Lysyanskaya. A signature scheme with efficient protocols [C]∥ Stelvio Cimato, Clemente Galdi, Giuseppe Persiano. Security in Communication Networks ’02. Berlin: Springer Verlag, 2002: 268289. [8]Fujisaki E, Okamoto T. Statistical zero knowledge protocols to prove modular polynomial relations [C]∥ Walter Fumy .Advances in Cryptology—CRYPTO’97. Berlin: Springer Verlag, 1997: 1630. [9]Pedersen T P. Noninteractive and informationtheoretic secure verifiable secret sharing[C]∥In Joan Feigenbaum.Advances in Cryptology—CRYPTO’91. Berlin : Springer Verlag, 1992:129140. [10]Camenisch J, Damgard I. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes[C]∥Tatsuaki Okamoto .In ASIACRYPT.Berlin: Springer Verlag, 2000: 331345. [11]Camenisch J, Stadler M. Efficient group signature schemes for large groups[C]∥ Walter Fumy .Advances in Cryptology—CRYPTO’97.Berlin: Springer Verlag, 1997: 410424. [12]Amos Fiat, Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems[C]∥Andrew M Odlyzko. In Advances in Cryptology—CRYPTO ’86. Berlin:Springer Verlag, 1986: 186194. [13]Withby A, Jsang A, Indulska J. Filtering out unfair ratings in Bayesian reputation systems[J]. The Icfain Journal of Management Research, 2005,4(2):4864. |