{"id":"https://openalex.org/W4310902199","doi":"https://doi.org/10.1109/itw54588.2022.9965877","title":"Commitment over Unreliable Noisy Channels: When Awareness Meets Control","display_name":"Commitment over Unreliable Noisy Channels: When Awareness Meets Control","publication_year":2022,"publication_date":"2022-11-01","ids":{"openalex":"https://openalex.org/W4310902199","doi":"https://doi.org/10.1109/itw54588.2022.9965877"},"language":"en","primary_location":{"id":"doi:10.1109/itw54588.2022.9965877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965877","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036182658","display_name":"Amitalok J. Budkuley","orcid":"https://orcid.org/0000-0001-6658-2996"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amitalok J. Budkuley","raw_affiliation_strings":["IIT Kharagpur"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088268893","display_name":"Pranav Joshi","orcid":"https://orcid.org/0000-0002-4502-6680"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pranav Joshi","raw_affiliation_strings":["Independent Researcher"],"affiliations":[{"raw_affiliation_string":"Independent Researcher","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058582993","display_name":"Manideep Mamindlapally","orcid":"https://orcid.org/0000-0002-8157-3972"},"institutions":[{"id":"https://openalex.org/I145894827","display_name":"Indian Institute of Technology Kharagpur","ror":"https://ror.org/03w5sq511","country_code":"IN","type":"education","lineage":["https://openalex.org/I145894827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manideep Mamindlapally","raw_affiliation_strings":["IIT Kharagpur"],"affiliations":[{"raw_affiliation_string":"IIT Kharagpur","institution_ids":["https://openalex.org/I145894827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076720893","display_name":"Anuj Kumar Yadav","orcid":"https://orcid.org/0000-0001-7763-3787"},"institutions":[{"id":"https://openalex.org/I132153292","display_name":"Indian Institute of Technology Patna","ror":"https://ror.org/01ft5vz71","country_code":"IN","type":"education","lineage":["https://openalex.org/I132153292"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Anuj Kumar Yadav","raw_affiliation_strings":["IIT Patna"],"affiliations":[{"raw_affiliation_string":"IIT Patna","institution_ids":["https://openalex.org/I132153292"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036182658"],"corresponding_institution_ids":["https://openalex.org/I145894827"],"apc_list":null,"apc_paid":null,"fwci":0.2078,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.42840983,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"732","last_page":"737"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6668093204498291},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6393062472343445},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6365514993667603},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6239201426506042},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.6211933493614197},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5435215830802917},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5432575345039368},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5247538089752197},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.4612291157245636},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36184757947921753},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3096170127391815},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2013375461101532},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.152099609375},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1400183141231537},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10299310088157654}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6668093204498291},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6393062472343445},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6365514993667603},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6239201426506042},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.6211933493614197},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5435215830802917},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5432575345039368},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5247538089752197},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.4612291157245636},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36184757947921753},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3096170127391815},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2013375461101532},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.152099609375},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1400183141231537},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10299310088157654}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw54588.2022.9965877","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965877","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W949353694","https://openalex.org/W1560855680","https://openalex.org/W1572606260","https://openalex.org/W1710959251","https://openalex.org/W1964990628","https://openalex.org/W2017662155","https://openalex.org/W2020316223","https://openalex.org/W2052207834","https://openalex.org/W2060474153","https://openalex.org/W2073086835","https://openalex.org/W2127072370","https://openalex.org/W2138129780","https://openalex.org/W2146813141","https://openalex.org/W2157164384","https://openalex.org/W2169660454","https://openalex.org/W2397857137","https://openalex.org/W2500934823","https://openalex.org/W3000465536","https://openalex.org/W3198566385","https://openalex.org/W3199201822","https://openalex.org/W3213626769","https://openalex.org/W3216388963","https://openalex.org/W4300840296"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W87530933","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W1988007309","https://openalex.org/W154233216"],"abstract_inverted_index":{"We":[0,160],"study":[1],"commitments":[2],"over":[3,19],"unreliable":[4,64],"compound":[5,13,87,112,224],"noisy":[6,44,65,157],"channels,":[7],"where":[8,172],"parties":[9,117,174,218],"may":[10,118,175,177],"know":[11],"the":[12,26,104,154,165,188,203,207,211,223],"channel":[14,88,131,147],"state":[15,148],"but":[16],"lack":[17],"control":[18,149,222],"that":[20,95,219],"state.":[21,225],"Commitment":[22],"is":[23,48,81,136,187],"one":[24],"of":[25,85,94,111,129,184,195],"common":[27],"building":[28],"blocks":[29],"for":[30,55,152],"many":[31],"cryptographic":[32,59],"protocols":[33],"which":[34],"realize":[35],"multi-party":[36],"computational":[37],"functionalities":[38],"in":[39],"a":[40,52,86,123,191],"secure":[41,58],"manner.":[42],"A":[43],"channel,":[45],"among":[46],"others,":[47],"widely":[49],"acknowledged":[50],"as":[51,150,214],"promising":[53],"resource":[54],"realizing":[56],"information-theoretically":[57],"primitives,":[60],"including":[61],"commitment.":[62],"However,":[63],"channels":[66,115,158],"with":[67],"poorly":[68],"or":[69,108,138],"imprecisely":[70],"characterized":[71],"statistical":[72],"behaviour":[73],"can":[74,205,220],"severely":[75],"degrade":[76,206],"commitment":[77,106,109,166,208],"guarantees.":[78],"Our":[79],"focus":[80],"unreliability":[82],"on":[83,97,164],"account":[84],"state,":[89],"albeit":[90],"under":[91,168,215],"public":[92],"awareness":[93],"state.Building":[96],"prior":[98],"work,":[99],"we":[100],"seek":[101],"to":[102,210],"characterize":[103],"optimal":[105],"throughput":[107,209],"capacity":[110,167],"binary":[113],"symmetric":[114],"when":[116,198],"be":[119,179],"state-aware.":[120,180],"State-awareness":[121],"implies":[122],"passive":[124],"and":[125,145,200],"publicly":[126],"known":[127],"capability":[128,194],"precise":[130],"knowledge":[132],"(whether":[133],"said":[134],"party":[135],"honest":[137],"dishonest);":[139],"however,":[140],"state-awareness":[141,196],"precludes":[142],"any":[143],"active":[144],"private":[146],"in,":[151],"instance,":[153],"classic":[155],"unfair":[156],"(UNCs).":[159],"present":[161],"new":[162],"results":[163],"all":[169],"possible":[170],"configurations":[171],"individual":[173],"(or":[176],"not)":[178],"An":[181],"important":[182],"takeaway":[183],"our":[185],"work":[186],"following:":[189],"even":[190],"fairly":[192],"weak":[193],"(albeit":[197],"asymmetric":[199],"only":[201],"at":[202],"committer-side)":[204],"same":[212],"extent":[213],"strongly":[216],"capable":[217],"privately":[221]},"counts_by_year":[{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
