Atila Abdulkadiroglu and Tayfun Sönmez. Random serial dictatorship and the core from random endowments in house allocation problems. Econometrica, 66(3):689–701, 1998.
 Yeon-Koo Che and Fuhito Kojima. Asymptotic equivalence of probabilistic serial and random priority mechanisms. Econometrica, 78(5):1625–1672, 2010.
 Noam Nisan and Amir Ronen. Algorithmic mechanism design. In Proceedings of the thirty-first annual ACM symposium on Theory of computing, pages 129–140. ACM, 1999.
 Kenneth J Arrow, Amartya Sen, and Kotaro Suzumura. Handbook of social choice and welfare, volume 2. Elsevier, 2010.
 Felix Brandt, Vincent Conitzer, Ulle Endriss, Ariel D Procaccia, and Jérôme Lang. Handbook of computational social choice. Cambridge University Press, 2016.
 Atila Abdulkadiroglu and Tayfun Sönmez.School choice: A mechanism design approach. The American Economic Review, 93(3):729–747, 2003.
 Rafik Makhloufi, Grégory Bonnet, Guillaume Doyen, and Dominique Gaïti. Decentralized aggregation protocols in peer-to-peer networks: a survey. In IEEE International Workshop on Modelling Autonomic Communications Environments,
pages 111–116. Springer, 2009.
 JA Alvarez Bermejo, MA Lodroman, and JA Lopez-Ramos. A decentralized protocol for mobile control access. The Journal of Supercomputing,70(2):709–720, 2014.
 Airlie Chapman, Eric Schoof, and Mehran Mesbahi.Semi-autonomous networks: theory and decentralized protocols. In Robotics and Automation(ICRA), 2010 IEEE International Conference on, pages 1958–1963. IEEE, 2010.
 Manuel Blum. Coin flipping by telephone a protocol for solving impossible problems. ACM SIGACT News, 15(1):23–27, 1983.
 Tal Rabin and Michael Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proceedings of the twenty-first annual ACM symposium on Theory of computing, pages 73–85. ACM, 1989.
 Richard Cleve. Limits on the security of coin flips when half the processors are faulty. In Proceedings of the eighteenth annual ACM symposium on Theory of computing, pages 364–369.ACM, 1986.
 Biao He and Yu Wei. Electronic sortition. In The 2009 International Symposium on Intelligent Information Systems and Applications (IISA 2009),page 203, 2009.
 Stéphane Grumbach and Robert Riemann. Distributed random process for a large-scale peer to peer lottery. In IFIP International Conference on Distributed Applications and Interoperable Systems, pages 34–48. Springer, 2017.
 Arjen K Lenstra and Benjamin Wesolowski. A random zoo: sloth, unicorn, and trx. IACR Cryptology ePrint Archive, - -:366, 2015.
 David M Goldschlag and Stuart G Stubblebine. Publicly verifiable lotteries: Applications of delaying functions. In International Conference on Financial Cryptography, pages 214–226. Springer,1998.
 Sherman SM Chow, Lucas CK Hui, Siu-Ming Yiu, and KP Chow. An e-lottery scheme using verifiable random function. In International Conference on Computational Science and its Applications, pages 651–660. Springer, 2005.
 Silvio Micali, Michael Rabin, and Salil Vadhan. Verifiable random functions. In Foundations of Computer Science, 1999. 40th Annual Symposium on, pages 120–130. IEEE, 1999.