Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,665,001 papers from all fields of science
Search
Sign In
Create Free Account
Commitment scheme
Known as:
Cryptographic precommitment
, Cryptographic commitment
, Committed identity
Expand
In cryptography, a commitment scheme allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Alice and Bob
Bingo voting
Claw-free permutation
Concrete security
Expand
Broader (2)
Public-key cryptography
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication
Marcela S. Melara
,
Aaron Blankstein
,
Joseph Bonneau
,
M. Freedman
,
E. Felten
IACR Cryptology ePrint Archive
2014
Corpus ID: 4474218
Recent revelations about government surveillance have significantly increased the demand for end-to-end secure communications…
Expand
2012
2012
The relationship between the occupational stress, organizational commitment, and job satisfaction with organizational citizenship behavior
Azizi Yahaya
,
N. Yahaya
,
Halimah Ma'alip
,
J. Ramli
,
M.M. Kamal
2012
Corpus ID: 145366008
The Organizational Citizenship Behavior (OCB) is an important variable in to study of organization management. It’s a part to…
Expand
2010
2010
A Face Based Fuzzy Vault Scheme for Secure Online Authentication
Lifang Wu
,
Songlong Yuan
Second International Symposium on Data, Privacy…
2010
Corpus ID: 22892157
Biometric template protection is becoming a hot research recently. Fuzzy vault is a key binding biometric cryptosystem scheme. It…
Expand
2010
2010
Values and Commitment : A Test of Schwartz ’ s Human Values Theory Among Arab Teachers in Israel
Áron
,
Ohen
2010
Corpus ID: 27055933
This study examines the relationship between individual-level values, using Schwartz’s theory, and organizational and…
Expand
2010
2010
A FUZZY COMMITMENT SCHEME WITH MCELIECE'S CIPHER
D. B. Ojha
,
A. Sharma
2010
Corpus ID: 14681004
In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The eciency and security of…
Expand
Review
2009
Review
2009
Diversifying the Community College CEO Pipeline.
A. Perrakis
,
D. Campbell
,
Mary Antonaros
2009
Corpus ID: 38191451
The authors examine the current community college presidential pipeline and offer possible explanations for poor CEO…
Expand
2007
2007
AN INVESTIGATION OF THE DETERMINANTS OF TURNOVER INTENTION AMONG DRIVERS
K. Arkoubi
2007
Corpus ID: 53132038
Drivers’ turnover remains a major challenge in the trucking industry in the US. It is harshly affecting companies’ performance…
Expand
1999
1999
Unconditionally secure quantum coin tossing
D. Mayers
,
L. Salvail
,
Yoshie Chiba-Kohno
1999
Corpus ID: 118854318
In coin tossing two remote participants want to share a uniformly distributed random bit. At the least in the quantum version…
Expand
1998
1998
Updating Shortest Paths
S. Edelkamp
European Conference on Artificial Intelligence
1998
Corpus ID: 6611752
Stefan Edelkamp 1 Abstract. Moving target search is a state space approach for nding non-stationary goals. The plot is given by a…
Expand
Review
1982
Review
1982
Computer Literacy for Teachers
C. Martin
,
R. Heller
1982
Corpus ID: 142483682
With federal support decreasing, the funding responsibility for training teach ers falls primarily on state and local levels, and…
Expand