Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,295 papers from all fields of science
Search
Sign In
Create Free Account
Commitment scheme
Known as:
Cryptographic precommitment
, Cryptographic commitment
, Committed identity
Expand
In cryptography, a commitment scheme allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Alice and Bob
Bingo voting
Claw-free permutation
Concrete security
Expand
Broader (2)
Public-key cryptography
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
A Face Based Fuzzy Vault Scheme for Secure Online Authentication
Lifang Wu
,
Songlong Yuan
Second International Symposium on Data, Privacy…
2010
Corpus ID: 22892157
Biometric template protection is becoming a hot research recently. Fuzzy vault is a key binding biometric cryptosystem scheme. It…
Expand
Review
2008
Review
2008
INFORMAL INSURANCE ARRANGEMENTS IN VILLAGE ECONOMIES
Ethan Ligon
,
Jonathan P. Thomas
,
T. Worrall
2008
Corpus ID: 55796703
This paper studies efficient insurance arrangements in village economies when there is complete information but limited…
Expand
2008
2008
The problem of credible commitment in reconstruction*
Christopher J. Coyne
,
Peter J. Boettke
Journal of Institutional Economics
2008
Corpus ID: 53994077
Abstract Reconstruction involves military occupation with the aim of rebuilding and reforming both formal and informal…
Expand
Highly Cited
2007
Highly Cited
2007
Universally composable zero-knowledge arguments and commitments from signature cards
D. Hofheinz
,
J. Müller-Quade
,
Dominique Unruh
2007
Corpus ID: 10084925
htmlabstractIn the Universal Composability framework many cryptographic tasks cannot be built from scratch. Additional \helping…
Expand
2006
2006
A Probabilistic Notion of Correspondence and the Epipolar Constraint
Justin Domke
,
Y. Aloimonos
3D Data Processing Visualization and Transmission
2006
Corpus ID: 804079
We present a probabilistic framework for correspondence and egomotion. First, we suggest computing probability distributions of…
Expand
2005
2005
Commitments and Speech Acts
R. Harnish
Philosophica
2005
Corpus ID: 18592809
The utterance of a se ntence in a context is not sufficient for the performance of a speech act. Theories of speech acts can be o…
Expand
Highly Cited
2000
Highly Cited
2000
Time-bound negotiation framework for electronic commerce agents
K. J. Lee
,
Y. Chang
,
J. Lee
Decision Support Systems
2000
Corpus ID: 5354322
Highly Cited
1999
Highly Cited
1999
A transmission-constrained unit commitment method in power system scheduling
C. Tseng
,
S. Oren
,
Carol S. Cheng
,
Chao-an Li
,
A. Svoboda
,
Raymond B. Johnson
Decision Support Systems
1999
Corpus ID: 14754704
Highly Cited
1999
Highly Cited
1999
Short-term generation asset valuation
C. Tseng
,
G. Barz
Proceedings of the 32nd Annual Hawaii…
1999
Corpus ID: 17579779
We present a method for valuing a power plant over a short term period using Monte Carlo simulation. The power plant valuation…
Expand
Review
1990
Review
1990
A computational model for organizations of cooperating intelligent agents
A. H. Bond
Conference on Organizational Computing Systems
1990
Corpus ID: 3037777
A computational model is developed, which captures properties of relationship and organization in sets of distributed intelligent…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE