Oblivious Transfer

Functionality Description


Oblivious Transfer (OT) is a foundational two-party cryptographic functionality. It enables a sender to transfer part of their data to a receiver in such a way that:

  • The sender does not learn which part was received.
  • The receiver learns only the chosen part, and nothing about the rest.

The most common variant is 1-out-of-2 OT, denoted as $OT_{1-2}$, in which:

The sender holds two messages $m_0 , m_1 \in \{0,1\}^n$
The receiver holds a choice bit $b \in \{0,1\}$
The receiver learns $m_b$ and gains no information about $m_{1-b}$
The sender learns nothing about $b$.

This makes OT a core primitive for secure two-party computation (2PC) and multi-party computation (MPC).

Protocols


No protocols implement this functionality yet.

Classical Analogues


OT is a classical functionality. OT was first introduced by Michael Rabin in 1981 [1] as โ€œRabin OTโ€, where the sender sends a message to the receiver, who obtains it with probability 1/2, and the sender does not know whether it was received.

The 1-out-of-2 OT variant was introduced later by Even, Goldreich, and Lempel in 1985 [2] and became the standard formulation.

Classically, OT can be built using the following tools:

  • Public-key cryptography (e.g., Diffie-Hellman, RSA).
  • Assumptions like Learning With Errors (LWE) for post-quantum security.

Real-world Use Cases


OT is an important cryptographic primitive that unlocks a variety of cryptographic protocols, such as:

  • Secure Two-Party Computation (2PC): All known 2PC protocols reduce to OT.
  • Private Set Intersection (PSI) and Private Information Retrieval (PIR).
  • Zero-Knowledge Proofs: OT enables secure simulation and extraction in ZK protocols.
  • Oblivious RAM (ORAM): Used for secure memory access patterns.
  • Password-Based Authentication: OT enables password checks without revealing the password.

Properties


To state the formal properties of this functionality let the $\mathtt{Sender}(m_0, m_1)$ and the $\mathtt{Receiver}(b)$ be the parties, then an OT has the following properties:

Correctness:ย The honest receiver outputs $m_b$ with probability: $\text{Pr} [\text{Receiverย outputs} m_b] = 1$.
Receiver Privacy: The senderโ€™s view is statistically/computationally independent of the receiverโ€™s choice bit $b$.
Sender Privacy: The receiverโ€™s view reveals no information about $m_{1-b}$, beyond negligible in statistical or computational distance.

The OT is impossible to achieve both-ways security, classically or quantumly[3] in the information-theoretic way.

The security of OT can be:

  • Information-theoretic (in one direction).
  • Computational (based on standard assumptions).
  • Statistical (in bounded-storage or hybrid models).

The computational OT can be constructed based on One-Wayness or Indistinguishability:

  • Based on the hardness of inverting or distinguishing encrypted messages (e.g., ElGamal).
  • In quantum-resistant OT, based on LWE or code-based assumptions.

In the Universal Composable (UC) framework, OT is composable and serves as a universal primitive. Any general secure computation protocol can be built from OT based on the result of Kilian [5].

In the quantum world as well, OT can be constructed under different sets of assumptions.

Further Information


Quantum OT schemes:
OT protocols can be constructed using quantum communication + computational assumptions:

  • Mahadev-style classical-verifier quantum protocols.
  • LWE-based secure OT with post-quantum security.

Or alternatively in Relativistic settings [5], or the Bounded-quantum-storage model [6]

There are also quantum protocols with one-sided information-theoretic security, i.e. the Receiver is guaranteed full security; the sender has computational security (or vice versa).

Related Primitives

  • Bit Commitment and OT are inter-reducible in many settings.
  • Random OT (ROT): Variant where the senderโ€™s messages are randomly chosen.
  • OT with Abort or Fairness: OT with conditions where one party can halt the protocol but not gain unfair advantage

References


  1. Rabin, Michael O. โ€œHow to exchange secrets with oblivious transfer.โ€ย Cryptology ePrint Archiveย (2005).
  2. Even, Shimon, Oded Goldreich, and Abraham Lempel. โ€œA randomized protocol for signing contracts.โ€ย Communications of the ACMย 28, no. 6 (1985): 637-647.
  3. Lo, Hoi-Kwong. โ€œInsecurity of quantum secure computations.โ€ย Physical Review Aย 56, no. 2 (1997): 1154.
  4. Kilian, Joe. โ€œFounding crytpography on oblivious transfer.โ€ Inย Proceedings of the twentieth annual ACM symposium on Theory of computing, pp. 20-31. 1988.
  5. Kent, Adrian. โ€œLocation-oblivious data transfer with flying entangled qudits.โ€ย Physical Review Aโ€”Atomic, Molecular, and Optical Physicsย 84, no. 1 (2011): 012328.
  6. Damgรฅrd, Ivan B., Serge Fehr, Louis Salvail, and Christian Schaffner. โ€œCryptography in the bounded-quantum-storage model.โ€ย SIAM Journal on Computingย 37, no. 6 (2008): 1865-1890.

Leave a Reply

Your email address will not be published. Required fields are marked *