A. Amirbekyan and V. Estivill-castro, A new efficient privacy-preserving scalar product protocol, AusDM, pp.209-214, 2007.

N. Batir, Sharp bounds for the psi function and harmonic numbers, Mathematical inequalities and applications, 2011.
DOI : 10.7153/mia-14-77

M. Ben-or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic faulttolerant distributed computation, STOC'88, 1988.

J. Benaloh, Dense probabilistic encryption, SAC'94, 1994.

R. Bendlin, I. Damgård, C. Orlandi, and S. Zakarias, Semi-homomorphic Encryption and Multiparty Computation, EUROCRYPT'11, 2011.
DOI : 10.1007/978-3-642-20465-4_11

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

D. Chaum, J. Evertse, J. Van-de-graaf, and R. Peralta, Demonstrating Possession of a Discrete Logarithm Without Revealing it, CRYPTO'86, 1986.
DOI : 10.1007/3-540-47721-7_14

I. Damgård, V. Pastro, N. Smart, and S. Zakarias, Multiparty Computation from Somewhat Homomorphic Encryption, CRYPTO'12, 2012.
DOI : 10.1007/978-3-642-32009-5_38

S. Delaune, An undecidability result for AGh, Theoretical Computer Science, vol.368, issue.1-2, 2006.
DOI : 10.1016/j.tcs.2006.08.018

S. Dolev, N. Gilboa, and M. Kopeetsky, Computing multi-party trust privately, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, 2010.
DOI : 10.1145/1774088.1774401

W. Du and M. J. Atallah, Privacy-preserving cooperative statistical analysis, ACSAC '01, pp.102-110, 2001.

W. Du and Z. Zhan, A practical approach to solve Secure Multi-party Computation problems, Proceedings of the 2002 workshop on New security paradigms , NSPW '02, 2002.
DOI : 10.1145/844102.844125

J. Dumas and H. Hossayni, Matrix powers algorithm for trust evaluation in PKI architectures, STM'12, ESORICS 2012, 2012.

S. N. Foley, W. M. Adams, O. Sullivan, and B. , Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System, STM'2010, 2010.
DOI : 10.1007/978-3-642-22444-7_7

L. Fousse, P. Lafourcade, A. , and M. , Benaloh???s Dense Probabilistic Encryption Revisited, AFRICACRYPT'11, 2011.
DOI : 10.1007/978-3-642-13190-5_2

B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, On Private Scalar Product Computation for Privacy-Preserving Data Mining, ICISC'04, 2005.
DOI : 10.1007/11496618_9

R. V. Guha, R. Kumar, P. Raghavan, and A. Tomkins, Propagation of trust and distrust, Proceedings of the 13th conference on World Wide Web , WWW '04, 2004.
DOI : 10.1145/988672.988727

J. Huang and D. M. Nicol, A formal-semanticsbased calculus of trust, IEEE Internet Computing, 2010.

A. Jøsang, Probabilistic logic under uncertainty, 2007.

P. Lafourcade and M. Puys, Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties, FPS'15, 2015.
DOI : 10.1007/978-3-319-30303-1_9

URL : https://hal.archives-ouvertes.fr/hal-01306395

Y. Lindell, Secure computation for privacy preserving data mining, Encyclopedia of Data Warehousing and Mining, 2009.

A. Michalas, T. Dimitriou, T. Giannetsos, N. Komninos, P. et al., Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes, Wireless Personal Communications, vol.24, issue.1, pp.66559-575, 2012.
DOI : 10.1007/s11277-012-0734-z

P. Mohassel, Efficient and secure delegation of linear algebra, 2011.

L. H. Ozarow and A. D. Wyner, Wire-Tap Channel II, EUROCRYPT'84, 1984.
DOI : 10.1002/j.1538-7305.1984.tb00072.x

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EURO- CRYPT'99, 1999.
DOI : 10.1007/3-540-48910-X_16

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, p.22, 1979.
DOI : 10.1145/359168.359176

I. Wang, C. Shen, T. Hsu, C. Liao, D. Wang et al., Towards Empirical Aspects of Secure Scalar Product, 2008 International Conference on Information Security and Assurance (isa 2008), 2008.
DOI : 10.1109/ISA.2008.78

A. C. Yao, Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), 1982.
DOI : 10.1109/SFCS.1982.38