We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Commitment-based negotiation semantics for accountability in multi-agent systems

    Negotiation is a key form of interaction in multi-agent systems. Negotiation enables agents to come to a mutual agreement about a goal or plan of...

    Phillip Sloan, Nirav Ajmeri in Annals of Mathematics and Artificial Intelligence
    Article Open access 08 July 2023
  2. Non-interactive Commitment from Non-transitive Group Actions

    Group actions are becoming a viable option for post-quantum cryptography assumptions. Indeed, in recent years some works have shown how to construct...
    Giuseppe D’Alconzo, Andrea Flamini, Andrea Gangemi in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  3. Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice

    Vector commitments (VC) and their variants attract a lot of attention due to their wide range of usage in applications such as blockchain and...
    Hongxiao Wang, Siu-Ming Yiu, ... Zoe L. Jiang in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  4. Dew: A Transparent Constant-Sized Polynomial Commitment Scheme

    We construct a polynomial commitment scheme with constant (i.e., independent of the degree) sized evaluation proofs and logarithmic (in the degree)...
    Arasu Arun, Chaya Ganesh, ... Sriram Sridhar in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  5. Modification of the Brief Measure of Technology Commitment for People with Aphasia

    People with aphasia (PWA), an acquired communication disorder, benefit from speech and language therapy (SLT). SLT can be conducted as telepractice,...
    Bianca Spelter, Sabine Corsten, ... Juliane Leinweber in Universal Access in Human-Computer Interaction
    Conference paper 2023
  6. Mirrored Commitment: Fixing “Randomized Partial Checking” and Applications

    Randomized Partial Checking (RPC) [16] was proposed by Jakobsson, Juels, and Rivest and attracted attention as an efficient method of verifying the...
    Paweł Lorek, Moti Yung, Filip Zagórski in Applied Cryptography and Network Security
    Conference paper 2024
  7. An efficient atomic cross-chain commitment resisting fork fraud

    Fuqi **, Wenquan Li, ... Qingzhong Li in Frontiers of Computer Science
    Article 15 February 2023
  8. Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties

    Blockchain plays an important role in distributed file systems, such as cryptocurrency. One of the important building blocks of blockchain is the...
    Hideaki Miyaji, Atsuko Miyaji in Cryptology and Network Security
    Conference paper 2023
  9. A Fair Blockchain Transaction Based on Commitment

    Aiming at the problems of the correctness of transaction information and the fairness between participants, a FBT (fair blockchain transaction)...
    Yu **xia, Mu Ruijie, ... Wang **aojun in Advances in Artificial Intelligence and Security
    Conference paper 2022
  10. Two-Round n-out-of-n and Multi-Signatures and Trapdoor Commitment from Lattices

    Although they have been studied for a long time, distributed signature protocols have garnered renewed interest in recent years in view of novel...

    Ivan Damgård, Claudio Orlandi, ... Mehdi Tibouchi in Journal of Cryptology
    Article 13 April 2022
  11. Decentralized Blockchain Transaction Scheme Based on Digital Commitment

    As a framework based on data transaction between blocks, blockchain has a high degree of transparency and decentralization. Zhang et al. proposed a...
    Yang Li, Hongyu Wan, ... **uli Wang in Blockchain and Trustworthy Systems
    Conference paper 2022
  12. MixCT: Mixing Confidential Transactions from Homomorphic Commitment

    Mixing protocols serve as a promising solution to the unlinkability in blockchains. They work by hiding one transaction among a set of transactions...
    Jiajun Du, Zhonghui Ge, ... Dawu Gu in Computer Security – ESORICS 2022
    Conference paper 2022
  13. Cheating Sensitive Security Quantum Bit Commitment with Security Distance Function

    Quantum bit commitment (QBC) aims to provide a secure commitment between two mutually suspicious parties. This paper presents a new quantum bit...
    Weicong Huang, Qisheng Guang, ... Lijun Chen in Digital Forensics and Cyber Crime
    Conference paper 2022
  14. SP \(^2\) IN: Leveraging Fuzzy Commitment and LDPC Sum-Product Decoder for Key Generation from Face

    Biometric authentication, with its unique and convenient features, is gaining popularity as a secure access control method for diverse systems and...
    Yafei Liu, Ying Zhou, ... Zhe ** in Biometric Recognition
    Conference paper 2023
  15. The Effect of High Commitment Management Requirements in Achieving Strategic Entrepreneurship Through the Perceived Organizational Support in Iraqi Ministry of Health

    This study aimed at identifying the effect of the requirements of the administration of high commitment and its dimensions (normative commitment,...
    Chapter 2023
  16. On Security of Fuzzy Commitment Scheme for Biometric Authentication

    Biometric security is a prominent research area with growing privacy and security concerns related to biometric data, generally known as biometric...
    Donghoon Chang, Surabhi Garg, ... Sweta Mishra in Information Security and Privacy
    Conference paper 2022
  17. Putting the Online Phase on a Diet: Covert Security from Short MACs

    An important research direction in secure multi-party computation (MPC) is to improve the efficiency of the protocol. One idea that has recently...
    Sebastian Faust, Carmit Hazay, ... Benjamin Schlosser in Topics in Cryptology – CT-RSA 2023
    Conference paper 2023
  18. Somewhere Statistically Binding Commitment Schemes with Applications

    We define a new primitive that we call a somewhere statistically binding (SSB) commitment scheme, which is a generalization of dual-mode commitments...
    Prastudy Fauzi, Helger Lipmaa, ... Janno Siim in Financial Cryptography and Data Security
    Conference paper 2021
  19. A Sub-linear Lattice-Based Submatrix Commitment Scheme

    Subvector commitment is a recently proposed cryptographic primitive that provides the underlying cryptographic tool to design many interesting...
    Conference paper 2021
  20. Revealing the existence of the ontological commitment in fish schools

    The heap paradox is an enduring problem in complex systems, and it has many variations. One variation of the heap paradox considers how many parts of...

    Takayuki Niizato, Kotaro Sakamoto, ... Toshiki Fukushima in Artificial Life and Robotics
    Article 13 October 2020
Did you find what you were looking for? Share feedback.