@prefix dbo: .
@prefix dbr: .
dbr:Bingo_voting dbo:wikiPageWikiLink dbr:Commitment_scheme .
@prefix rdf: .
@prefix yago: .
dbr:Commitment_scheme rdf:type yago:Communication100033020 ,
yago:YagoPermanentlyLocatedEntity ,
yago:Rule106652242 ,
yago:Direction106786629 ,
yago:Rule105846932 ,
yago:Event100029378 ,
yago:Algorithm105847438 ,
yago:WikicatCryptographicAlgorithms ,
yago:Protocol106665108 ,
yago:Abstraction100002137 ,
yago:WikicatZero-knowledgeProtocols ,
yago:Procedure101023820 ,
yago:PsychologicalFeature100023100 ,
yago:Activity100407535 ,
yago:Message106598915 ,
yago:Act100030358 .
@prefix rdfs: .
dbr:Commitment_scheme rdfs:label "Commitment-Verfahren"@de ,
"Mise en gage"@fr ,
"Commitment scheme"@sv ,
"Esquema de compromiso"@es ,
"\u0421\u0445\u0435\u043C\u0430 \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u0430"@ru ,
"Zobowi\u0105zanie bitowe"@pl ,
"\u30D3\u30C3\u30C8\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8"@ja ,
"Commitment scheme"@en ;
rdfs:comment "En cryptologie, la mise en gage (en anglais : commitment scheme) est un processus qui permet \u00E0 une personne de \u00AB mettre en gage \u00BB une valeur (ou un \u00E9nonc\u00E9) tout en la maintenant cach\u00E9e aux autres, avec la possibilit\u00E9 de r\u00E9v\u00E9ler cette valeur plus tard en prouvant que c'est bien la valeur qui avait \u00E9t\u00E9 mise en gage. La mise en gage est con\u00E7ue de telle sorte que la personne est li\u00E9e \u00E0 la valeur mise en gage."@fr ,
"En criptograf\u00EDa, un esquema de compromiso permite comprometerse a un valor que permanecer\u00E1 oculto, con la capacidad de revelar este valor luego. El concepto de esquemas de compromiso fue formalizado en 1988 por Gilles Brassard, David Chaum, y en 1988, pero el concepto fue utilizado informalmente antes de ese a\u00F1o. La idea de los compromisos apareci\u00F3 anteriormente en las obras de Manuel Blum, , y Shamir et al. La terminolog\u00EDa parece haber sido creada por Blum."@es ,
"A commitment scheme is a cryptographic primitive that allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value later. Commitment schemes are designed so that a party cannot change the value or statement after they have committed to it: that is, commitment schemes are binding. Commitment schemes have important applications in a number of cryptographic protocols including secure coin flipping, zero-knowledge proofs, and secure computation. Interactions in a commitment scheme take place in two phases:"@en ,
"I kryptografi avses med ett commitment scheme (lojalitetssystem) att man kan \u00E5ta sig ett valt v\u00E4rde (eller valt uttalande) och samtidigt h\u00E5lla det dolt f\u00F6r andra, med m\u00F6jlighet att avsl\u00F6ja v\u00E4rdet senare. Commitment scheme \u00E4r konstruerade s\u00E5 att en part inte kan \u00E4ndra v\u00E4rdet eller uttalande efter att de har accepterat det: det betyder att commitment scheme \u00E4r bindande. Commitment scheme har viktiga till\u00E4mpningar inom ett antal kryptografiska protokoll inklusive s\u00E4ker , zero-knowledge proofs och ."@sv ,
"\u30D3\u30C3\u30C8\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u3001\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u65B9\u5F0F\u3068\u306F\u3001\u6697\u53F7\u7406\u8AD6\u306B\u304A\u3051\u308B\u30D7\u30ED\u30C8\u30B3\u30EB\u3067\u3042\u308B\u3002\u30D3\u30C3\u30C8\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u3092\u7528\u3044\u308B\u3053\u3068\u3067\u3001\u30E6\u30FC\u30B6\u30FC\u306F\u5024\u3092\u79D8\u5BC6\u88CF\u306B\u30B3\u30DF\u30C3\u30C8\u3059\u308B\u3053\u3068\u304C\u3067\u304D\u308B\u3002\u307E\u305F\u3001\u30E6\u30FC\u30B6\u30FC\u306F\u5F8C\u306B\u30B3\u30DF\u30C3\u30C8\u3055\u308C\u305F\u5024\u3092\u660E\u3089\u304B\u306B\u3059\u308B\u3053\u3068\u304C\u53EF\u80FD\u3067\u3042\u308B\u3002\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u65B9\u5F0F\u3092\u60F3\u50CF\u3059\u308B\u306B\u306F\u4EE5\u4E0B\u306E\u55A9\u3048\u304C\u6709\u52B9\u3067\u3042\u308B\u3002\u9001\u4FE1\u8005\u306F\u5024\u3092\u66F8\u3044\u305F\u7D19\u3092\u7BB1\u306B\u5165\u308C\u30AB\u30AE\u3092\u639B\u3051\u3001\u305D\u306E\u7BB1\u3092\u53D7\u4FE1\u8005\u306B\u9001\u308B\u3002\u7BB1\u306E\u4E2D\u8EAB\u306F\u53D7\u4FE1\u8005\u306B\u306F\u898B\u3048\u306A\u3044\u3057\u3001\u9001\u4FE1\u8005\u304C\u9375\u3092\u9001\u3089\u306A\u3051\u308C\u3070\u9320\u524D\u3092\u958B\u3051\u308B\u3053\u3068\u3082\u3067\u304D\u306A\u3044\u3002\u307E\u305F\u53D7\u4FE1\u8005\u304C\u7BB1\u3092\u6301\u3063\u3066\u3044\u308B\u306E\u3067\u9001\u4FE1\u8005\u304C\u7BB1\u306E\u4E2D\u8EAB\u3092\u6539\u3056\u3093\u3059\u308B\u3053\u3068\u3082\u4E0D\u53EF\u80FD\u3067\u3042\u308B\u3002\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u65B9\u5F0F\u306F\u3068\u5BC6\u63A5\u306A\u95A2\u4FC2\u3092\u6301\u3063\u3066\u3044\u308B\u3002\u3068\u304F\u306B\u30BC\u30ED\u77E5\u8B58\u8A3C\u660E\u3084\u30DE\u30EB\u30C1\u30D1\u30FC\u30C6\u30A3\u8A08\u7B97\u3001\u307E\u305F\u96FB\u5B50\u30DE\u30CD\u30FC\u3084\u96FB\u5B50\u6295\u7968 \u306B\u7528\u3044\u3089\u308C\u3066\u3044\u308B\u3002"@ja ,
"\u0412 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0438, \u0441\u0445\u0435\u043C\u0430 \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432 \u0438\u043B\u0438 \u0431\u0438\u0442\u043E\u0432\u0430\u044F \u0441\u0445\u0435\u043C\u0430 \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432 (\u0430\u043D\u0433\u043B. Commitment scheme) \u2014 \u044D\u0442\u043E \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043A\u0438\u0439 \u043F\u0440\u0438\u043C\u0438\u0442\u0438\u0432, \u043A\u043E\u0442\u043E\u0440\u044B\u0439 \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u0435\u0442 \u0437\u0430\u0444\u0438\u043A\u0441\u0438\u0440\u043E\u0432\u0430\u0442\u044C \u043A\u0430\u043A\u043E\u0435-\u043B\u0438\u0431\u043E \u0432\u044B\u0431\u0440\u0430\u043D\u043D\u043E\u0435 \u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435 (\u0432\u044B\u0431\u0440\u0430\u043D\u043D\u043E\u0435 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043D\u0438\u0435, \u0431\u0438\u0442 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438), \u0441\u043E\u0445\u0440\u0430\u043D\u044F\u044F \u0435\u0433\u043E \u0441\u043A\u0440\u044B\u0442\u044B\u043C \u0434\u043B\u044F \u0434\u0440\u0443\u0433\u0438\u0445, \u0441 \u0432\u043E\u0437\u043C\u043E\u0436\u043D\u043E\u0441\u0442\u044C\u044E \u043F\u043E\u0437\u0436\u0435 \u0440\u0430\u0441\u043A\u0440\u044B\u0442\u044C \u0437\u0430\u0444\u0438\u043A\u0441\u0438\u0440\u043E\u0432\u0430\u043D\u043D\u043E\u0435 \u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435. \u0421\u0445\u0435\u043C\u044B \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432 \u0440\u0430\u0437\u0440\u0430\u0431\u043E\u0442\u0430\u043D\u044B \u0442\u0430\u043A\u0438\u043C \u043E\u0431\u0440\u0430\u0437\u043E\u043C, \u0447\u0442\u043E \u0441\u0442\u043E\u0440\u043E\u043D\u0430 \u043D\u0435 \u043C\u043E\u0436\u0435\u0442 \u0438\u0437\u043C\u0435\u043D\u0438\u0442\u044C \u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435 \u0438\u043B\u0438 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043D\u0438\u0435 \u043F\u043E\u0441\u043B\u0435 \u043E\u0442\u043F\u0440\u0430\u0432\u043A\u0438, \u0442\u043E \u0435\u0441\u0442\u044C \u0441\u0445\u0435\u043C\u044B \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432 \u0440\u0435\u0430\u043B\u0438\u0437\u0443\u044E\u0442 \u0441\u0432\u044F\u0437\u044B\u0432\u0430\u043D\u0438\u0435 \u0434\u0430\u043D\u043D\u044B\u0445. \u0421\u0445\u0435\u043C\u044B \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u0430 \u043D\u0430\u0445\u043E\u0434\u044F\u0442 \u043F\u0440\u0438\u043C\u0435\u043D\u0435\u043D\u0438\u0435 \u0432 \u0440\u044F\u0434\u0435 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043A\u0438\u0445 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u043E\u0432, \u0432\u043A\u043B\u044E\u0447\u0430\u044F \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0435 \u043F\u043E\u0434\u0431\u0440\u0430\u0441\u044B\u0432\u0430\u043D\u0438\u0435 \u043C\u043E\u043D\u0435\u0442\u044B, \u0434\u043E\u043A\u0430\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u043E \u0441 \u043D\u0443\u043B\u0435\u0432\u044B\u043C \u0440\u0430\u0437\u0433\u043B\u0430\u0448\u0435\u043D\u0438\u0435\u043C, \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u043A\u043E\u043D\u0444\u0438\u0434\u0435\u043D\u0446\u0438\u0430\u043B\u044C\u043D\u043E\u0433\u043E \u0432\u044B\u0447\u0438\u0441\u043B\u0435\u043D\u0438\u044F \u0438 \u0434\u0440."@ru ,
"Ein Commitment-Verfahren ist ein kryptographisches Zwei-Parteien-Protokoll, das es einer Partei erm\u00F6glicht, sich gegen\u00FCber der anderen Partei auf einen Wert festzulegen, ohne etwas \u00FCber diesen Wert zu verraten. Sp\u00E4ter kann dieser Wert dann aufgedeckt werden.Ein Commitment-Verfahren kann damit verglichen werden, einen Zettel mit dem Wert in eine verschlossene Kiste zu legen und dem Empf\u00E4nger die Kiste zu geben. Ohne den Schl\u00FCssel kann der Empf\u00E4nger nichts \u00FCber den Wert auf dem Zettel erfahren. Der Sender kann den Wert nicht mehr ver\u00E4ndern, da sich die Kiste nicht mehr in seinem Besitz befindet. Zum Aufdecken schickt der Sender dem Empf\u00E4nger den Schl\u00FCssel zu der Kiste.Commitment-Verfahren sind wichtige Primitive, die beispielsweise in oder Zero-Knowledge-Protokollen angewendet werden."@de ,
"Zobowi\u0105zanie bitowe \u2013 operacja kryptograficzna, w kt\u00F3rej: \n* zobowi\u0105zuj\u0105cy decyduje si\u0119 na jak\u0105\u015B warto\u015B\u0107 jednego lub wi\u0119kszej liczby bit\u00F3w \u2013 co\u015B co b\u0119dzie chcia\u0142 p\u00F3\u017Aniej udowodni\u0107 \n* zobowi\u0105zuj\u0105cy ujawnia pewn\u0105 warto\u015B\u0107 czyli swoje zobowi\u0105zanie bitowe \n* na podstawie nikt nie powinien m\u00F3c dowiedzie\u0107 si\u0119, jakie by\u0142o z prawdopodobie\u0144stwem istotnie r\u00F3\u017Cnym od 0 \n* kiedy przyjdzie na to pora, zobowi\u0105zuj\u0105cy ujawnia oraz dow\u00F3d tego, \u017Ce rzeczywi\u015Bcie zobowi\u0105zywa\u0142o go do Zobowi\u0105zania bitowe najpro\u015Bciej zaimplementowa\u0107 za pomoc\u0105 funkcji haszuj\u0105cej:"@pl .
@prefix dcterms: .
@prefix dbc: .
dbr:Commitment_scheme dcterms:subject dbc:Cryptographic_primitives ,
dbc:Public-key_cryptography ,
dbc:Secret_sharing ,
dbc:Zero-knowledge_protocols ;
dbo:abstract "\u30D3\u30C3\u30C8\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u3001\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u65B9\u5F0F\u3068\u306F\u3001\u6697\u53F7\u7406\u8AD6\u306B\u304A\u3051\u308B\u30D7\u30ED\u30C8\u30B3\u30EB\u3067\u3042\u308B\u3002\u30D3\u30C3\u30C8\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u3092\u7528\u3044\u308B\u3053\u3068\u3067\u3001\u30E6\u30FC\u30B6\u30FC\u306F\u5024\u3092\u79D8\u5BC6\u88CF\u306B\u30B3\u30DF\u30C3\u30C8\u3059\u308B\u3053\u3068\u304C\u3067\u304D\u308B\u3002\u307E\u305F\u3001\u30E6\u30FC\u30B6\u30FC\u306F\u5F8C\u306B\u30B3\u30DF\u30C3\u30C8\u3055\u308C\u305F\u5024\u3092\u660E\u3089\u304B\u306B\u3059\u308B\u3053\u3068\u304C\u53EF\u80FD\u3067\u3042\u308B\u3002\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u65B9\u5F0F\u3092\u60F3\u50CF\u3059\u308B\u306B\u306F\u4EE5\u4E0B\u306E\u55A9\u3048\u304C\u6709\u52B9\u3067\u3042\u308B\u3002\u9001\u4FE1\u8005\u306F\u5024\u3092\u66F8\u3044\u305F\u7D19\u3092\u7BB1\u306B\u5165\u308C\u30AB\u30AE\u3092\u639B\u3051\u3001\u305D\u306E\u7BB1\u3092\u53D7\u4FE1\u8005\u306B\u9001\u308B\u3002\u7BB1\u306E\u4E2D\u8EAB\u306F\u53D7\u4FE1\u8005\u306B\u306F\u898B\u3048\u306A\u3044\u3057\u3001\u9001\u4FE1\u8005\u304C\u9375\u3092\u9001\u3089\u306A\u3051\u308C\u3070\u9320\u524D\u3092\u958B\u3051\u308B\u3053\u3068\u3082\u3067\u304D\u306A\u3044\u3002\u307E\u305F\u53D7\u4FE1\u8005\u304C\u7BB1\u3092\u6301\u3063\u3066\u3044\u308B\u306E\u3067\u9001\u4FE1\u8005\u304C\u7BB1\u306E\u4E2D\u8EAB\u3092\u6539\u3056\u3093\u3059\u308B\u3053\u3068\u3082\u4E0D\u53EF\u80FD\u3067\u3042\u308B\u3002\u30B3\u30DF\u30C3\u30C8\u30E1\u30F3\u30C8\u65B9\u5F0F\u306F\u3068\u5BC6\u63A5\u306A\u95A2\u4FC2\u3092\u6301\u3063\u3066\u3044\u308B\u3002\u3068\u304F\u306B\u30BC\u30ED\u77E5\u8B58\u8A3C\u660E\u3084\u30DE\u30EB\u30C1\u30D1\u30FC\u30C6\u30A3\u8A08\u7B97\u3001\u307E\u305F\u96FB\u5B50\u30DE\u30CD\u30FC\u3084\u96FB\u5B50\u6295\u7968 \u306B\u7528\u3044\u3089\u308C\u3066\u3044\u308B\u3002"@ja ,
"I kryptografi avses med ett commitment scheme (lojalitetssystem) att man kan \u00E5ta sig ett valt v\u00E4rde (eller valt uttalande) och samtidigt h\u00E5lla det dolt f\u00F6r andra, med m\u00F6jlighet att avsl\u00F6ja v\u00E4rdet senare. Commitment scheme \u00E4r konstruerade s\u00E5 att en part inte kan \u00E4ndra v\u00E4rdet eller uttalande efter att de har accepterat det: det betyder att commitment scheme \u00E4r bindande. Commitment scheme har viktiga till\u00E4mpningar inom ett antal kryptografiska protokoll inklusive s\u00E4ker , zero-knowledge proofs och ."@sv ,
"En cryptologie, la mise en gage (en anglais : commitment scheme) est un processus qui permet \u00E0 une personne de \u00AB mettre en gage \u00BB une valeur (ou un \u00E9nonc\u00E9) tout en la maintenant cach\u00E9e aux autres, avec la possibilit\u00E9 de r\u00E9v\u00E9ler cette valeur plus tard en prouvant que c'est bien la valeur qui avait \u00E9t\u00E9 mise en gage. La mise en gage est con\u00E7ue de telle sorte que la personne est li\u00E9e \u00E0 la valeur mise en gage. En pratique, la mise en gage se fait en calculant une valeur de mise en gage \u00E0 partir de la valeur que l'on veut cacher et en communiquant cette valeur de mise en gage \u00E0 un destinataire. Par la suite, lorsque la valeur originellement cach\u00E9e sera communiqu\u00E9e au destinataire, celui-ci pourra v\u00E9rifier que la valeur qui lui a \u00E9t\u00E9 r\u00E9v\u00E9l\u00E9e est bien la valeur qui a servi \u00E0 calculer la valeur de mise en gage. Plus formellement, la mise en gage transforme une valeur en une paire de telle fa\u00E7on que 1) ne r\u00E9v\u00E8le aucune information sur , mais que, 2) ensembles, et permettent de r\u00E9v\u00E9ler , et que 3) il est impossible de trouver tel que r\u00E9v\u00E8le . Les mises en gage ont des applications importantes dans un certain nombre de protocoles cryptographiques, y compris le jeu de pile ou face s\u00E9curis\u00E9, les preuves \u00E0 divulgation nulle de connaissance, les signatures num\u00E9riques et les calculs s\u00E9curis\u00E9s \u00E0 plusieurs participants. Le concept de mise en gage a \u00E9t\u00E9 formalis\u00E9 par Gilles Brassard, David Chaum et Claude Cr\u00E9peau en 1988, mais le concept avait \u00E9t\u00E9 utilis\u00E9 sans \u00EAtre trait\u00E9 formellement avant cela. La notion de mise en gage est mentionn\u00E9e dans les travaux de Manuel Blum, Shimon Even et Shamir et coll.. Le terme anglais commitment scheme semble avoir \u00E9t\u00E9 cr\u00E9\u00E9 par Blum."@fr ,
"En criptograf\u00EDa, un esquema de compromiso permite comprometerse a un valor que permanecer\u00E1 oculto, con la capacidad de revelar este valor luego. El concepto de esquemas de compromiso fue formalizado en 1988 por Gilles Brassard, David Chaum, y en 1988, pero el concepto fue utilizado informalmente antes de ese a\u00F1o. La idea de los compromisos apareci\u00F3 anteriormente en las obras de Manuel Blum, , y Shamir et al. La terminolog\u00EDa parece haber sido creada por Blum."@es ,
"Ein Commitment-Verfahren ist ein kryptographisches Zwei-Parteien-Protokoll, das es einer Partei erm\u00F6glicht, sich gegen\u00FCber der anderen Partei auf einen Wert festzulegen, ohne etwas \u00FCber diesen Wert zu verraten. Sp\u00E4ter kann dieser Wert dann aufgedeckt werden.Ein Commitment-Verfahren kann damit verglichen werden, einen Zettel mit dem Wert in eine verschlossene Kiste zu legen und dem Empf\u00E4nger die Kiste zu geben. Ohne den Schl\u00FCssel kann der Empf\u00E4nger nichts \u00FCber den Wert auf dem Zettel erfahren. Der Sender kann den Wert nicht mehr ver\u00E4ndern, da sich die Kiste nicht mehr in seinem Besitz befindet. Zum Aufdecken schickt der Sender dem Empf\u00E4nger den Schl\u00FCssel zu der Kiste.Commitment-Verfahren sind wichtige Primitive, die beispielsweise in oder Zero-Knowledge-Protokollen angewendet werden. Eine klassische Anwendung f\u00FCr ein Commitment ist der M\u00FCnzwurf via Telefon. Alice und Bob wollen eine M\u00FCnze werfen, aber weil die beiden sich \u00FCber die Telefonverbindung nicht sehen k\u00F6nnen und sich gegenseitig nicht vertrauen wollen, funktioniert das \u00FCbliche Protokoll \u201Eeiner sagt an, der andere wirft\u201C nicht. Eine m\u00F6gliche L\u00F6sung w\u00E4re, dass Alice ihre Wahl einem vertrauensw\u00FCrdigen Dritten mitteilt, der dann, nachdem Bob das Ergebnis mitgeteilt hat, den Gewinner bestimmt. Mit einem Bit-Commitment l\u00E4sst sich das Problem ohne dritte Partei l\u00F6sen, indem Alice ein Commitment auf ihre Wahl an Bob schickt. Bob kann aus dem Commitment nichts \u00FCber Alices Wahl lernen, aber Alice ist nun festgelegt und kann ihre Wahl nicht nachtr\u00E4glich \u00E4ndern. Nun wirft Bob die M\u00FCnze und teilt Alice das Ergebnis mit, woraufhin Alice das Commitment \u00F6ffnet. Damit kennen beide den Gewinner. Eine Realisierung ist zum Beispiel \u00FCber kryptographische Hashfunktionen m\u00F6glich."@de ,
"Zobowi\u0105zanie bitowe \u2013 operacja kryptograficzna, w kt\u00F3rej: \n* zobowi\u0105zuj\u0105cy decyduje si\u0119 na jak\u0105\u015B warto\u015B\u0107 jednego lub wi\u0119kszej liczby bit\u00F3w \u2013 co\u015B co b\u0119dzie chcia\u0142 p\u00F3\u017Aniej udowodni\u0107 \n* zobowi\u0105zuj\u0105cy ujawnia pewn\u0105 warto\u015B\u0107 czyli swoje zobowi\u0105zanie bitowe \n* na podstawie nikt nie powinien m\u00F3c dowiedzie\u0107 si\u0119, jakie by\u0142o z prawdopodobie\u0144stwem istotnie r\u00F3\u017Cnym od 0 \n* kiedy przyjdzie na to pora, zobowi\u0105zuj\u0105cy ujawnia oraz dow\u00F3d tego, \u017Ce rzeczywi\u015Bcie zobowi\u0105zywa\u0142o go do Zobowi\u0105zania bitowe najpro\u015Bciej zaimplementowa\u0107 za pomoc\u0105 funkcji haszuj\u0105cej: \n* zobowi\u0105zuj\u0105cy losuje oblicza i udost\u0119pnia innym warto\u015B\u0107 \n* je\u015Bli funkcja jest trudna do odwr\u00F3cenia (odporno\u015B\u0107 na przeciwobraz, w tym ka\u017Cdy bit przeciwobrazu musi by\u0107 odporny), nikt nie odczyta na podstawie \n* w odpowiednim momencie zobowi\u0105zuj\u0105cy ujawnia warto\u015B\u0107 w ten spos\u00F3b ka\u017Cdy mo\u017Ce samodzielnie obliczy\u0107 i sprawdzi\u0107, czy zobowi\u0105zuj\u0105cy m\u00F3wi\u0142 prawd\u0119 \n* jednak je\u015Bli zobowi\u0105zuj\u0105cy potrafi\u0142by wybra\u0107 takie liczby, \u017Ce dla to potrafi\u0142by generowa\u0107 kolizje funkcji haszuj\u0105cej. Je\u015Bli wi\u0119c funkcja jest odporna na kolizje, nie mo\u017Cna z\u0142ama\u0107 zobowi\u0105zania. Istniej\u0105 te\u017C inne systemy zobowi\u0105za\u0144 bitowych, te oparte na funkcjach haszuj\u0105cych s\u0105 jednak najcz\u0119\u015Bciej stosowane."@pl ,
"A commitment scheme is a cryptographic primitive that allows one to commit to a chosen value (or chosen statement) while keeping it hidden to others, with the ability to reveal the committed value later. Commitment schemes are designed so that a party cannot change the value or statement after they have committed to it: that is, commitment schemes are binding. Commitment schemes have important applications in a number of cryptographic protocols including secure coin flipping, zero-knowledge proofs, and secure computation. A way to visualize a commitment scheme is to think of a sender as putting a message in a locked box, and giving the box to a receiver. The message in the box is hidden from the receiver, who cannot open the lock themselves. Since the receiver has the box, the message inside cannot be changed\u2014merely revealed if the sender chooses to give them the key at some later time. Interactions in a commitment scheme take place in two phases: 1. \n* the commit phase during which a value is chosen and committed to 2. \n* the reveal phase during which the value is revealed by the sender, then the receiver verifies its authenticity In the above metaphor, the commit phase is the sender putting the message in the box, and locking it. The reveal phase is the sender giving the key to the receiver, who uses it to open the box and verify its contents. The locked box is the commitment, and the key is the proof. In simple protocols, the commit phase consists of a single message from the sender to the receiver. This message is called the commitment. It is essential that the specific value chosen cannot be known by the receiver at that time (this is called the hiding property). A simple reveal phase would consist of a single message, the opening, from the sender to the receiver, followed by a check performed by the receiver. The value chosen during the commit phase must be the only one that the sender can compute and that validates during the reveal phase (this is called the binding property). The concept of commitment schemes was perhaps first formalized by Gilles Brassard, David Chaum, and Claude Crepeau in 1988, as part of various Zero-Knowledge protocols for NP, based on various types of commitment schemes (see also:). But the concept was used prior to that without being treated formally. The notion of commitments appeared earliest in works by Manuel Blum, Shimon Even, and Shamir et al. The terminology seems to have been originated by Blum, although commitment schemes can be interchangeably called bit commitment schemes\u2014sometimes reserved for the special case where the committed value is a bit. Earlier to that, commitment via one-way hash functions was considered, e.g., as part of, say, Lamport signature, the original one-time one-bit signature scheme."@en ,
"\u0412 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0438, \u0441\u0445\u0435\u043C\u0430 \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432 \u0438\u043B\u0438 \u0431\u0438\u0442\u043E\u0432\u0430\u044F \u0441\u0445\u0435\u043C\u0430 \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432 (\u0430\u043D\u0433\u043B. Commitment scheme) \u2014 \u044D\u0442\u043E \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043A\u0438\u0439 \u043F\u0440\u0438\u043C\u0438\u0442\u0438\u0432, \u043A\u043E\u0442\u043E\u0440\u044B\u0439 \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u0435\u0442 \u0437\u0430\u0444\u0438\u043A\u0441\u0438\u0440\u043E\u0432\u0430\u0442\u044C \u043A\u0430\u043A\u043E\u0435-\u043B\u0438\u0431\u043E \u0432\u044B\u0431\u0440\u0430\u043D\u043D\u043E\u0435 \u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435 (\u0432\u044B\u0431\u0440\u0430\u043D\u043D\u043E\u0435 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043D\u0438\u0435, \u0431\u0438\u0442 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438), \u0441\u043E\u0445\u0440\u0430\u043D\u044F\u044F \u0435\u0433\u043E \u0441\u043A\u0440\u044B\u0442\u044B\u043C \u0434\u043B\u044F \u0434\u0440\u0443\u0433\u0438\u0445, \u0441 \u0432\u043E\u0437\u043C\u043E\u0436\u043D\u043E\u0441\u0442\u044C\u044E \u043F\u043E\u0437\u0436\u0435 \u0440\u0430\u0441\u043A\u0440\u044B\u0442\u044C \u0437\u0430\u0444\u0438\u043A\u0441\u0438\u0440\u043E\u0432\u0430\u043D\u043D\u043E\u0435 \u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435. \u0421\u0445\u0435\u043C\u044B \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432 \u0440\u0430\u0437\u0440\u0430\u0431\u043E\u0442\u0430\u043D\u044B \u0442\u0430\u043A\u0438\u043C \u043E\u0431\u0440\u0430\u0437\u043E\u043C, \u0447\u0442\u043E \u0441\u0442\u043E\u0440\u043E\u043D\u0430 \u043D\u0435 \u043C\u043E\u0436\u0435\u0442 \u0438\u0437\u043C\u0435\u043D\u0438\u0442\u044C \u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435 \u0438\u043B\u0438 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043D\u0438\u0435 \u043F\u043E\u0441\u043B\u0435 \u043E\u0442\u043F\u0440\u0430\u0432\u043A\u0438, \u0442\u043E \u0435\u0441\u0442\u044C \u0441\u0445\u0435\u043C\u044B \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432 \u0440\u0435\u0430\u043B\u0438\u0437\u0443\u044E\u0442 \u0441\u0432\u044F\u0437\u044B\u0432\u0430\u043D\u0438\u0435 \u0434\u0430\u043D\u043D\u044B\u0445. \u0421\u0445\u0435\u043C\u044B \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u0430 \u043D\u0430\u0445\u043E\u0434\u044F\u0442 \u043F\u0440\u0438\u043C\u0435\u043D\u0435\u043D\u0438\u0435 \u0432 \u0440\u044F\u0434\u0435 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043A\u0438\u0445 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u043E\u0432, \u0432\u043A\u043B\u044E\u0447\u0430\u044F \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u043E\u0435 \u043F\u043E\u0434\u0431\u0440\u0430\u0441\u044B\u0432\u0430\u043D\u0438\u0435 \u043C\u043E\u043D\u0435\u0442\u044B, \u0434\u043E\u043A\u0430\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u043E \u0441 \u043D\u0443\u043B\u0435\u0432\u044B\u043C \u0440\u0430\u0437\u0433\u043B\u0430\u0448\u0435\u043D\u0438\u0435\u043C, \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u043A\u043E\u043D\u0444\u0438\u0434\u0435\u043D\u0446\u0438\u0430\u043B\u044C\u043D\u043E\u0433\u043E \u0432\u044B\u0447\u0438\u0441\u043B\u0435\u043D\u0438\u044F \u0438 \u0434\u0440. \u0427\u0442\u043E\u0431\u044B \u043F\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u044C \u043C\u0435\u0445\u0430\u043D\u0438\u0437\u043C \u0440\u0430\u0431\u043E\u0442\u044B \u0441\u0445\u0435\u043C\u044B, \u0440\u0430\u0441\u0441\u043C\u043E\u0442\u0440\u0438\u043C \u043E\u0442\u043F\u0440\u0430\u0432\u0438\u0442\u0435\u043B\u044F, \u043F\u043E\u043C\u0435\u0449\u0430\u044E\u0449\u0435\u0433\u043E \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0435 \u0432 \u0437\u0430\u043A\u0440\u044B\u0442\u044B\u0439 \u043D\u0430 \u0437\u0430\u043C\u043E\u043A \u044F\u0449\u0438\u043A \u0438 \u043F\u0435\u0440\u0435\u0434\u0430\u044E\u0449\u0435\u0433\u043E \u043A\u043E\u0440\u043E\u0431\u043A\u0443 \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044E. \u0421\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0435 \u0441\u043A\u0440\u044B\u0442\u043E \u043E\u0442 \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044F, \u043A\u043E\u0442\u043E\u0440\u044B\u0439 \u043D\u0435 \u043C\u043E\u0436\u0435\u0442 \u0441\u0430\u043C\u043E\u0441\u0442\u043E\u044F\u0442\u0435\u043B\u044C\u043D\u043E \u043E\u0442\u043A\u0440\u044B\u0442\u044C \u0437\u0430\u043C\u043E\u043A. \u0421 \u0442\u043E\u0433\u043E \u043C\u043E\u043C\u0435\u043D\u0442\u0430, \u043A\u043E\u0433\u0434\u0430 \u043A\u043E\u0440\u043E\u0431\u043A\u0430 \u0441 \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0435\u043C \u043E\u043A\u0430\u0437\u0430\u043B\u0430\u0441\u044C \u0443 \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044F, \u0441\u043E\u0434\u0435\u0440\u0436\u0438\u043C\u043E\u0435 \u043A\u043E\u0440\u043E\u0431\u043A\u0438 \u043D\u0435 \u043C\u043E\u0436\u0435\u0442 \u0431\u044B\u0442\u044C \u0438\u0437\u043C\u0435\u043D\u0435\u043D\u043E \u043E\u0442\u043F\u0440\u0430\u0432\u0438\u0442\u0435\u043B\u0435\u043C \u2014 \u043A\u043E\u0440\u043E\u0431\u043A\u0430 \u043F\u0440\u043E\u0441\u0442\u043E \u043E\u0442\u043A\u0440\u044B\u0432\u0430\u0435\u0442\u0441\u044F, \u0435\u0441\u043B\u0438 \u043F\u043E\u0437\u0434\u043D\u0435\u0435 \u043E\u0442\u043F\u0440\u0430\u0432\u0438\u0442\u0435\u043B\u044C \u0440\u0435\u0448\u0438\u0442 \u043F\u0435\u0440\u0435\u0434\u0430\u0442\u044C \u043A\u043B\u044E\u0447 \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044E. \u0412\u0437\u0430\u0438\u043C\u043E\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u0434\u0432\u0443\u0445 \u0441\u0442\u043E\u0440\u043E\u043D \u0432 \u0441\u0445\u0435\u043C\u0435 \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u0430 \u043F\u0440\u043E\u0438\u0441\u0445\u043E\u0434\u0438\u0442 \u0432 \u0434\u0432\u0430 \u044D\u0442\u0430\u043F\u0430: \n* \u0444\u0430\u0437\u0430 \u043F\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u00ABCommit\u00BB \u2014 \u043F\u043E\u0441\u044B\u043B\u043A\u0443 \u0437\u0430\u043A\u0440\u044B\u0442\u043E\u0439 \u043D\u0430 \u043A\u043B\u044E\u0447 \u043A\u043E\u0440\u043E\u0431\u043A\u0438 \u043E\u0442 \u043E\u0442\u043F\u0440\u0430\u0432\u0438\u0442\u0435\u043B\u044F \u043A \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044E (\u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u043E), \n* \u0444\u0430\u0437\u0430 \u0440\u0430\u0441\u043A\u0440\u044B\u0442\u0438\u044F \u00ABReveal\u00BB \u2014 \u0431\u043E\u043B\u0435\u0435 \u043F\u043E\u0437\u0434\u043D\u044F\u044F \u043E\u0442\u043F\u0440\u0430\u0432\u043A\u0430 \u043A\u043B\u044E\u0447\u0430 \u043E\u0442 \u043A\u043E\u0440\u043E\u0431\u043A\u0438 \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044E \u0438 \u043F\u0440\u043E\u0432\u0435\u0440\u043A\u0430 \u0441\u043E\u0434\u0435\u0440\u0436\u0438\u043C\u043E\u0433\u043E (\u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435). \u0412 \u043F\u0440\u043E\u0441\u0442\u044B\u0445 \u0441\u0445\u0435\u043C\u0430\u0445 \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u0430 \u0444\u0430\u0437\u0430 \u043F\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0441\u043E\u0441\u0442\u043E\u0438\u0442 \u0438\u0437 \u043E\u0442\u043F\u0440\u0430\u0432\u043A\u0438 \u043E\u0434\u043D\u043E\u0433\u043E \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F \u043E\u0442 \u043E\u0442\u043F\u0440\u0430\u0432\u0438\u0442\u0435\u043B\u044F \u043A \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044E. \u042D\u0442\u043E \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u0435 \u043D\u0430\u0437\u044B\u0432\u0430\u0435\u0442\u0441\u044F \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u043E\u043C. \u0412\u0430\u0436\u043D\u043E, \u0447\u0442\u043E\u0431\u044B \u043A\u043E\u043D\u043A\u0440\u0435\u0442\u043D\u043E\u0435 \u0432\u044B\u0431\u0440\u0430\u043D\u043D\u043E\u0435 \u0437\u043D\u0430\u0447\u0435\u043D\u0438\u0435 \u043D\u0435 \u043C\u043E\u0433\u043B\u043E \u0431\u044B\u0442\u044C \u0438\u0437\u0432\u0435\u0441\u0442\u043D\u043E \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044E \u0432 \u044D\u0442\u043E\u0439 \u0444\u0430\u0437\u0435 (\u044D\u0442\u043E \u043D\u0430\u0437\u044B\u0432\u0430\u0435\u0442\u0441\u044F \u0441\u043A\u0440\u044B\u0432\u0430\u044E\u0449\u0438\u043C \u0441\u0432\u043E\u0439\u0441\u0442\u0432\u043E\u043C). \u0424\u0430\u0437\u0430 \u043F\u0440\u043E\u0441\u0442\u043E\u0433\u043E \u0440\u0430\u0441\u043A\u0440\u044B\u0442\u0438\u044F \u0431\u0443\u0434\u0435\u0442 \u0441\u043E\u0441\u0442\u043E\u044F\u0442\u044C \u0438\u0437 \u043E\u0442\u043F\u0440\u0430\u0432\u043B\u0435\u043D\u0438\u044F \u043E\u0434\u043D\u043E\u0433\u043E \u0441\u043E\u043E\u0431\u0449\u0435\u043D\u0438\u044F \u043E\u0442 \u043E\u0442\u043F\u0440\u0430\u0432\u0438\u0442\u0435\u043B\u044F \u043A \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044E, \u0437\u0430 \u043A\u043E\u0442\u043E\u0440\u044B\u043C \u0441\u043B\u0435\u0434\u0443\u0435\u0442 \u043F\u0440\u043E\u0432\u0435\u0440\u043A\u0430 \u043E\u0431\u044F\u0437\u0430\u0442\u0435\u043B\u044C\u0441\u0442\u0432\u0430, \u0432\u044B\u043F\u043E\u043B\u043D\u044F\u0435\u043C\u0430\u044F \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u0435\u043C. \u0417\u043D\u0430\u0447\u0435\u043D\u0438\u0435, \u0432\u044B\u0431\u0440\u0430\u043D\u043D\u043E\u0435 \u043D\u0430 \u044D\u0442\u0430\u043F\u0435 \u043F\u0435\u0440\u0435\u0434\u0430\u0447\u0438, \u0434\u043E\u043B\u0436\u043D\u043E \u0431\u044B\u0442\u044C \u0435\u0434\u0438\u043D\u0441\u0442\u0432\u0435\u043D\u043D\u044B\u043C, \u043A\u043E\u0442\u043E\u0440\u043E\u0435 \u043E\u0442\u043F\u0440\u0430\u0432\u0438\u0442\u0435\u043B\u044C \u043C\u043E\u0436\u0435\u0442 \u0432\u044B\u0447\u0438\u0441\u043B\u0438\u0442\u044C \u0438 \u043A\u043E\u0442\u043E\u0440\u043E\u0435 \u043F\u0440\u043E\u0432\u0435\u0440\u044F\u0435\u0442\u0441\u044F \u043D\u0430 \u044D\u0442\u0430\u043F\u0435 \u0440\u0430\u0441\u043A\u0440\u044B\u0442\u0438\u044F (\u044D\u0442\u043E \u043D\u0430\u0437\u044B\u0432\u0430\u0435\u0442\u0441\u044F \u0441\u0432\u043E\u0439\u0441\u0442\u0432\u043E\u043C \u0441\u0432\u044F\u0437\u044B\u0432\u0430\u043D\u0438\u044F)."@ru ;
dbo:wikiPageWikiLink dbr:Tate_pairing ,
dbr:Secret_sharing ,
dbr:Physical_unclonable_function ,
dbr:Web_of_trust ,
dbr:Zerocoin ,
dbr:Cryptographic_primitive ,
dbr:Rational_function ,
dbr:Shimon_Even ,
dbr:Statistically_close ,
dbr:Quantum_key_distribution ,
dbr:Pairing-based_cryptography ,
dbr:Concrete_security ,
dbr:Special_relativity ,
dbr:Oblivious_transfer ,
,
dbr:Verifiable_secret_sharing ,
dbr:Secure_multiparty_computation ,
dbr:Lagrange_interpolation ,
dbr:Discrete_logarithm_problem ,
,
,
dbr:Exclusive_disjunction ,
dbr:Bilinear_map ,
dbr:IND-CPA ,
dbr:Merkle_tree ,
dbr:Gilles_Brassard ,
dbr:Probability_theory ,
dbr:Random_oracle ,
dbr:Key_signing_party ,
dbr:Factor_theorem ,
dbr:Computationally_indistinguishable ,
,
dbr:Pairing ,
dbr:Hard-core_predicate ,
dbr:Cryptographic_hash_function ,
dbr:Cryptographically_secure_pseudorandom_number_generator ,
dbr:Elliptic-curve_cryptography ,
dbr:Coin_flipping ,
dbr:Quantum_cryptography ,
dbr:Bit ,
,
dbr:Quantum_physics ,
dbr:Digital_signature ,
dbr:Discrete_logarithm ,
dbr:Manuel_Blum ,
dbr:Negligible_function ,
dbr:David_Chaum ,
dbc:Cryptographic_primitives ,
dbr:Cryptographic_protocol ,
dbr:Secure_computation ,
dbr:Semantically_secure ,
dbr:Universal_composability ,
dbr:Lamport_signature ,
dbr:Zero-knowledge_proof ,
dbr:One-way_function ,
dbr:Goldreich-Levin_theorem ,
dbc:Secret_sharing ,
dbr:Claude_Crepeau ,
dbr:Probability_ensemble ,
dbc:Zero-knowledge_protocols ,
dbr:Asymptotic_analysis ,
dbr:Elliptic_curve ,
dbr:Mathematical_function ,
dbr:Adi_Shamir ,
dbr:Schmidt_decomposition ,
dbc:Public-key_cryptography ,
.
@prefix dbp: .
@prefix dbt: .
dbr:Commitment_scheme dbp:wikiPageUsesTemplate dbt:Reflist ,
dbt:Short_description ,
dbt:Prime ,
dbt:Hidden ,
dbt:More_citations_needed ;
dbo:wikiPageRevisionID 1116366903 ;
dbo:wikiPageExternalLink ,
,
.
@prefix xsd: .
dbr:Commitment_scheme dbo:wikiPageLength "46414"^^xsd:nonNegativeInteger ;
dbo:wikiPageID 439489 .
@prefix owl: .
@prefix dbpedia-de: .
dbr:Commitment_scheme owl:sameAs dbpedia-de:Commitment-Verfahren ,
,
dbr:Commitment_scheme ,
.
@prefix dbpedia-simple: .
dbr:Commitment_scheme owl:sameAs dbpedia-simple:Commitment_scheme .
@prefix dbpedia-sv: .
dbr:Commitment_scheme owl:sameAs dbpedia-sv:Commitment_scheme .
@prefix dbpedia-es: .
dbr:Commitment_scheme owl:sameAs dbpedia-es:Esquema_de_compromiso ,
.
@prefix dbpedia-fr: .
dbr:Commitment_scheme owl:sameAs dbpedia-fr:Mise_en_gage .
@prefix ns16: .
dbr:Commitment_scheme owl:sameAs ns16:BFMg ,
.
@prefix wikidata: .
dbr:Commitment_scheme owl:sameAs wikidata:Q1115684 .
@prefix yago-res: .
dbr:Commitment_scheme owl:sameAs yago-res:Commitment_scheme ,
.
@prefix prov: .
dbr:Commitment_scheme prov:wasDerivedFrom .
@prefix foaf: .
@prefix wikipedia-en: .
dbr:Commitment_scheme foaf:isPrimaryTopicOf wikipedia-en:Commitment_scheme .
dbr:Scantegrity dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Quantum_cryptography dbo:wikiPageWikiLink dbr:Commitment_scheme .
wikipedia-en:Commitment_scheme foaf:primaryTopic dbr:Commitment_scheme .
dbr:Punchscan dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Zero-knowledge_proof dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Claw-free_permutation dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Mental_poker dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Outline_of_cryptography dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Index_of_cryptography_articles dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Non-interactive_zero-knowledge_proof dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:One-way_function dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Manuel_Blum dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbp:knownFor dbr:Commitment_scheme ;
dbo:knownFor dbr:Commitment_scheme .
dbr:Cryptographic_hash_function dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:MobileCoin dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Cryptographic_primitive dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Subliminal_channel dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Science_and_technology_in_Venezuela dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Rings_of_Saturn dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:David_Chaum dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Commitment dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageDisambiguates dbr:Commitment_scheme .
dbr:Quantum_digital_signature dbo:wikiPageWikiLink dbr:Commitment_scheme .
dbr:Gilles_Brassard dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:knownFor dbr:Commitment_scheme .
dbr:Bit_commitment_scheme dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageRedirects dbr:Commitment_scheme .
dbr:Hash_precommitment dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageRedirects dbr:Commitment_scheme .
dbr:Hash_precommitments dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageRedirects dbr:Commitment_scheme .
dbr:Pedersen_commitment dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageRedirects dbr:Commitment_scheme .
dbr:Committed_identity dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageRedirects dbr:Commitment_scheme .
dbr:Bit_commitment dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageRedirects dbr:Commitment_scheme .
dbr:Cryptographic_commitment dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageRedirects dbr:Commitment_scheme .
dbr:Cryptographic_precommitment dbo:wikiPageWikiLink dbr:Commitment_scheme ;
dbo:wikiPageRedirects dbr:Commitment_scheme .