Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,342,531 papers from all fields of science
Search
Sign In
Create Free Account
Commitment scheme
Known as:
Cryptographic precommitment
, Cryptographic commitment
, Committed identity
Expand
In cryptography, a commitment scheme allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Alice and Bob
Bingo voting
Claw-free permutation
Concrete security
Expand
Broader (2)
Public-key cryptography
Secret sharing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
A Face Based Fuzzy Vault Scheme for Secure Online Authentication
Lifang Wu
,
Songlong Yuan
Second International Symposium on Data, Privacy…
2010
Corpus ID: 22892157
Biometric template protection is becoming a hot research recently. Fuzzy vault is a key binding biometric cryptosystem scheme. It…
Expand
2009
2009
Strategic human resources management is irrelevant when it comes to highly skilled professionals in the Canadian new economy
Stéphanie Chasserio
,
M. Legault
2009
Corpus ID: 154772269
The goal of this paper is to explain the commitment behaviour of highly skilled professionals in Canadian business-to-business…
Expand
Review
2008
Review
2008
INFORMAL INSURANCE ARRANGEMENTS IN VILLAGE ECONOMIES
Ethan Ligon
,
Jonathan P. Thomas
,
T. Worrall
2008
Corpus ID: 55796703
This paper studies efficient insurance arrangements in village economies when there is complete information but limited…
Expand
Highly Cited
2007
Highly Cited
2007
Universally composable zero-knowledge arguments and commitments from signature cards
D. Hofheinz
,
J. Müller-Quade
,
Dominique Unruh
2007
Corpus ID: 10084925
htmlabstractIn the Universal Composability framework many cryptographic tasks cannot be built from scratch. Additional \helping…
Expand
2006
2006
A Probabilistic Notion of Correspondence and the Epipolar Constraint
Justin Domke
,
Y. Aloimonos
3D Data Processing Visualization and Transmission
2006
Corpus ID: 804079
We present a probabilistic framework for correspondence and egomotion. First, we suggest computing probability distributions of…
Expand
2005
2005
Mitigating information exposure to cheaters in real-time strategy games
Chris Chambers
,
W. Feng
,
Wu-chi Feng
,
D. Saha
International Workshop on Network and Operating…
2005
Corpus ID: 7873680
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is…
Expand
Highly Cited
1999
Highly Cited
1999
A transmission-constrained unit commitment method in power system scheduling
C. Tseng
,
S. Oren
,
Carol S. Cheng
,
Chao-an Li
,
A. Svoboda
,
Raymond B. Johnson
Decision Support Systems
1999
Corpus ID: 14754704
1999
1999
Sketch interpretation in design communication
M. Stacey
,
C. Eckert
,
J. Mcfadzean
1999
Corpus ID: 61430472
Designers need to communicate their ideas to others. But these ideas can be fluid, vague, provisional, and involve a mixture of…
Expand
Highly Cited
1999
Highly Cited
1999
Short-term generation asset valuation
C. Tseng
,
G. Barz
Proceedings of the 32nd Annual Hawaii…
1999
Corpus ID: 17579779
We present a method for valuing a power plant over a short term period using Monte Carlo simulation. The power plant valuation…
Expand
Review
1990
Review
1990
A computational model for organizations of cooperating intelligent agents
A. H. Bond
Conference on Organizational Computing Systems
1990
Corpus ID: 3037777
A computational model is developed, which captures properties of relationship and organization in sets of distributed intelligent…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE