{"id":"https://openalex.org/W2048137721","doi":"https://doi.org/10.1109/tifs.2014.2335113","title":"(Im)possibility of Deterministic Commitment Over a Discrete Memoryless Channel","display_name":"(Im)possibility of Deterministic Commitment Over a Discrete Memoryless Channel","publication_year":2014,"publication_date":"2014-07-02","ids":{"openalex":"https://openalex.org/W2048137721","doi":"https://doi.org/10.1109/tifs.2014.2335113","mag":"2048137721"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2335113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2335113","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084928289","display_name":"Shaoquan Jiang","orcid":"https://orcid.org/0000-0001-8114-0782"},"institutions":[{"id":"https://openalex.org/I3130456415","display_name":"Mianyang Normal University","ror":"https://ror.org/02rka3n91","country_code":"CN","type":"education","lineage":["https://openalex.org/I3130456415"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shaoquan Jiang","raw_affiliation_strings":["Institute of Information Security, Mianyang Normal University, Mianyang, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Security, Mianyang Normal University, Mianyang, China","institution_ids":["https://openalex.org/I3130456415"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5084928289"],"corresponding_institution_ids":["https://openalex.org/I3130456415"],"apc_list":null,"apc_paid":null,"fwci":0.4187,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67866996,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"9","issue":"9","first_page":"1406","last_page":"1415"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4662168622016907},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3982912302017212},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.35054534673690796},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21393460035324097}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4662168622016907},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3982912302017212},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.35054534673690796},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21393460035324097}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2014.2335113","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2335113","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W182801106","https://openalex.org/W1500163133","https://openalex.org/W1549664537","https://openalex.org/W1589034595","https://openalex.org/W1601218083","https://openalex.org/W1964990628","https://openalex.org/W1983765476","https://openalex.org/W2011112377","https://openalex.org/W2012045293","https://openalex.org/W2020316223","https://openalex.org/W2027471022","https://openalex.org/W2043769961","https://openalex.org/W2089592270","https://openalex.org/W2099111195","https://openalex.org/W2101776874","https://openalex.org/W2103012681","https://openalex.org/W2104883478","https://openalex.org/W2106035593","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2143574736","https://openalex.org/W2143745050","https://openalex.org/W2144007657","https://openalex.org/W2153465692","https://openalex.org/W2157164384","https://openalex.org/W2159247478","https://openalex.org/W2166706457","https://openalex.org/W2211831180","https://openalex.org/W2254512934","https://openalex.org/W2478708596","https://openalex.org/W2597388719","https://openalex.org/W3123299285","https://openalex.org/W4233413206","https://openalex.org/W4302366875","https://openalex.org/W6607508979","https://openalex.org/W6630122207","https://openalex.org/W6635298198","https://openalex.org/W6635830018","https://openalex.org/W6683033566"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"In":[0],"this":[1,220],"paper,":[2],"we":[3,70,172,250],"study":[4],"the":[5,116,126,243,247],"commitment":[6,224,248],"over":[7],"a":[8,19,22,42,72,75,150,181,184,197,222],"discrete":[9],"memoryless":[10],"channel":[11,129],"W":[12,119,155],":":[13],"X":[14,122],"\u2192":[15],"Y,":[16],"where":[17,113,291],"both":[18],"sender":[20],"and":[21,49,64,123,147,206,279,301],"receiver":[23],"are":[24,173],"deterministic.":[25],"We":[26,131,226],"call":[27],"it":[28,40],"(\u03b4":[29,232],"<sub":[30,35,46,53,88,93,107,135,139,161,165,203,213,233,238,273,281,296],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[31,36,47,54,82,89,94,108,136,140,162,166,191,204,214,234,239,274,282,287,297],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">h</sub>":[32,48,90,205,240,275],",":[33,236],"\u03b4":[34,45,52,87,106,202,212,237,272,280],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">b</sub>":[37,55,109,215,235,283],")-secure":[38],"if":[39,146,149],"has":[41],"hiding":[43,200],"error":[44,51,201,211],"binding":[50,210],".":[56,216],"For":[57,242],"any":[58,65,86,263],"c":[59,195],"\u2208":[60,67],"(0,":[61,68],"log":[62],"|X|)":[63],"\u03c3":[66],"c),":[69],"propose":[71],"framework":[73,177],"for":[74,193,219,231,262],"message":[76,182],"domain":[77,185],"of":[78,118,128,186,246],"size":[79,187],"2":[80,189,285],"<sup":[81,190,286],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n(c-\u03c3)</sup>":[83],"such":[84],"that":[85,133,158,175,252],">":[91,303],"min":[92,138,164],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">PX:H(X)=c</sub>":[95,141,167],"(I(X;":[96,142,168],"Y)/H(X)":[97],"-":[98],"c)":[99],"with":[100,120,196],"an":[101,207],"exponentially":[102,208],"(in":[103],"n)":[104],"small":[105,194,209,223],"can":[110,178],"be":[111],"achieved,":[112],"Y":[114],"is":[115,125,221,260,289],"output":[117],"input":[121],"n":[124],"number":[127],"uses.":[130],"show":[132,251],"lim":[134,160,294],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">c\u21920</sub>":[137,163],"Y)/H(X))":[143,169],"=":[144,170,255,269,284,293],"0":[145],"only":[148],"very":[151],"weak":[152],"condition":[153],"on":[154],"holds.":[156],"Note":[157],"when":[159,253,267],"0,":[171],"guaranteed":[174],"our":[176],"commit":[179],"to":[180],"from":[183],"approximately":[188],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">nc</sup>":[192],"nearly":[198],"zero":[199],"The":[217],"price":[218],"rate.":[225],"obtain":[227],"some":[228],"impossibility":[229],"results":[230],").":[241],"space":[244],"M":[245],"input,":[249],"|M|":[254,268],"O(1),":[256],"then":[257,271],"(z,":[258],"o(1))-security":[259],"impossible":[261,290],"z":[264],"<;":[265,276],"1;":[266],"\u03c9(1),":[270],"min{\u03b1/\u03b3,":[277],"1}":[278],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">-n\u03b1</sup>":[288],"\u03b3":[292],"sup":[295],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n\u2192\u221e</sub>":[298],"(log":[299],"|M|/n)":[300],"\u03b1":[302],"0.":[304]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
