Skip to main content

What Is the Cryptographic Primitive Used to Create the “Commitment” in These Schemes?

The most common cryptographic primitive used to create the "commitment" in commit-reveal schemes is a cryptographic hash function , such as SHA-256 or Keccak-256. The commitment is typically a hash of the actual order details (price, amount, asset) concatenated with a secret random number (a "salt" or "nonce").

This hash is computationally infeasible to reverse, hiding the order details, but any change to the original order or the salt will result in a completely different hash, ensuring the user cannot change their mind later.

What Is the Difference between SHA-256 and a Simpler Hash Function like CRC Used in Other Data Integrity Checks?
What Is a ‘Hidden Limit Order’ and Is It Compatible with Stop-Limit Functionality?
How Does the ‘Proof-of-Work’ Consensus Mechanism Relate to SHA-256?
What Is the Concept of a ‘Pre-Commitment’ and How Does It Differ from the ‘Commitment’ Step?