Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,832,650 papers from all fields of science
Search
Sign In
Create Free Account
Commitment scheme
Known as:
Cryptographic precommitment
, Cryptographic commitment
, Committed identity
Expand
In cryptography, a commitment scheme allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Alice and Bob
Bingo voting
Claw-free permutation
Concrete security
Expand
Broader (2)
Public-key cryptography
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Praxis development in relation to gang conflicts in Copenhagen, Denmark
Line Lerche Mørck
,
Khaled Hussain
,
Camilla Møller-Andersen
,
Tülay Özüpek
,
Anne-Mette Palm
,
Ida Hedegaard Vorbeck
2013
Corpus ID: 143275119
The primary question addressed in this article is how to understand and produce praxis development in the complex and contentious…
Expand
2010
2010
A Face Based Fuzzy Vault Scheme for Secure Online Authentication
Lifang Wu
,
Songlong Yuan
Second International Symposium on Data, Privacy…
2010
Corpus ID: 22892157
Biometric template protection is becoming a hot research recently. Fuzzy vault is a key binding biometric cryptosystem scheme. It…
Expand
Review
2008
Review
2008
INFORMAL INSURANCE ARRANGEMENTS IN VILLAGE ECONOMIES
Ethan Ligon
,
Jonathan P. Thomas
,
T. Worrall
2008
Corpus ID: 55796703
This paper studies efficient insurance arrangements in village economies when there is complete information but limited…
Expand
2006
2006
A Probabilistic Notion of Correspondence and the Epipolar Constraint
Justin Domke
,
Y. Aloimonos
3D Data Processing Visualization and Transmission
2006
Corpus ID: 804079
We present a probabilistic framework for correspondence and egomotion. First, we suggest computing probability distributions of…
Expand
2005
2005
Adult Education in Nigeria: The Consequence of Neglect and Agenda for Action.
Reginald Nnazor
2005
Corpus ID: 154631357
In spite of the rich variety of natural resources in Nigeria, the country is still very much underdeveloped. Within and outside…
Expand
2004
2004
Smokescreens and State Responsibility: Using Human Rights Strategies To Promote Global Tobacco Control
M. Crow
2004
Corpus ID: 151642582
IV. USING INTERNATIONAL HUMAN RIGHTS INSTITUTIONS To FIGHT BIG TOBACCO ....................... 225 A. Revitalizing Reporting…
Expand
2003
2003
Bénéfices perçus de la fidélisation et qualité relationnelle: une application exploratoire au secteur du transport aérien
P. Volle
,
A. Mimouni
2003
Corpus ID: 145232543
We first propose a typology of loyal customers based upon a set of perceived benefits derived from the participation to a loyalty…
Expand
Highly Cited
1999
Highly Cited
1999
A transmission-constrained unit commitment method in power system scheduling
C. Tseng
,
S. Oren
,
Carol S. Cheng
,
Chao-an Li
,
A. Svoboda
,
Raymond B. Johnson
Decision Support Systems
1999
Corpus ID: 14754704
1999
1999
Unconditionally secure quantum coin tossing
D. Mayers
,
L. Salvail
,
Yoshie Chiba-Kohno
1999
Corpus ID: 118854318
In coin tossing two remote participants want to share a uniformly distributed random bit. At the least in the quantum version…
Expand
Review
1990
Review
1990
A computational model for organizations of cooperating intelligent agents
A. H. Bond
Conference on Organizational Computing Systems
1990
Corpus ID: 3037777
A computational model is developed, which captures properties of relationship and organization in sets of distributed intelligent…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE