Oblivious Transfer (OT) is a foundational two-party cryptographic functionality. It enables a sender to transfer part of their data to a receiver in such a way that:
The most common variant is 1-out-of-2 OT, denoted as $OT_{1-2}$, in which:
The sender holds two messages $m_0 , m_1 \\\in \\\{0,1\\\}^n$
The receiver holds a choice bit $b \\\in \\\{0,1\\\}$
The receiver learns $m_b$ and gains no information about $m_{1-b}$
The sender learns nothing about $b$.
This makes OT a core primitive for secure two-party computation (2PC) and multi-party computation (MPC).
No protocols implement this functionality yet.
OT is a classical functionality. OT was first introduced by Michael Rabin in 1981 [1] as “Rabin OT”, where the sender sends a message to the receiver, who obtains it with probability 1/2, and the sender does not know whether it was received.
The 1-out-of-2 OT variant was introduced later by Even, Goldreich, and Lempel in 1985 [2] and became the standard formulation.
Classically, OT can be built using the following tools:
OT is an important cryptographic primitive that unlocks a variety of cryptographic protocols, such as:
To state the formal properties of this functionality let the $\\\mathtt{Sender}(m_0, m_1)$ and the $\\\mathtt{Receiver}(b)$ be the parties, then an OT has the following properties:
Correctness: The honest receiver outputs $m_b$ with probability: $\\\text{Pr} [\\\text{Receiver outputs} m_b] = 1$.
Receiver Privacy: The sender’s view is statistically/computationally independent of the receiver’s choice bit $b$.
Sender Privacy: The receiver’s view reveals no information about $m_{1-b}$, beyond negligible in statistical or computational distance.
The OT is impossible to achieve both-ways security, classically or quantumly[3] in the information-theoretic way.
The security of OT can be:
The computational OT can be constructed based on One-Wayness or Indistinguishability:
In the Universal Composable (UC) framework, OT is composable and serves as a universal primitive. Any general secure computation protocol can be built from OT based on the result of Kilian [5].
In the quantum world as well, OT can be constructed under different sets of assumptions.
Quantum OT schemes:
OT protocols can be constructed using quantum communication + computational assumptions:
Or alternatively in Relativistic settings [5], or the Bounded-quantum-storage model [6]
There are also quantum protocols with one-sided information-theoretic security, i.e. the Receiver is guaranteed full security; the sender has computational security (or vice versa).
Oblivious Transfer (OT) is a foundational two-party cryptographic functionality. It enables a sender to transfer part of their data to a receiver in such a way that:
The most common variant is 1-out-of-2 OT, denoted as $OT_{1-2}$, in which:
The sender holds two messages $m_0 , m_1 \\\in \\\{0,1\\\}^n$
The receiver holds a choice bit $b \\\in \\\{0,1\\\}$
The receiver learns $m_b$ and gains no information about $m_{1-b}$
The sender learns nothing about $b$.
This makes OT a core primitive for secure two-party computation (2PC) and multi-party computation (MPC).
OT is a classical functionality. OT was first introduced by Michael Rabin in 1981 [1] as “Rabin OT”, where the sender sends a message to the receiver, who obtains it with probability 1/2, and the sender does not know whether it was received.
The 1-out-of-2 OT variant was introduced later by Even, Goldreich, and Lempel in 1985 [2] and became the standard formulation.
Classically, OT can be built using the following tools:
OT is an important cryptographic primitive that unlocks a variety of cryptographic protocols, such as:
To state the formal properties of this functionality let the $\\\mathtt{Sender}(m_0, m_1)$ and the $\\\mathtt{Receiver}(b)$ be the parties, then an OT has the following properties:
Correctness: The honest receiver outputs $m_b$ with probability: $\\\text{Pr} [\\\text{Receiver outputs} m_b] = 1$.
Receiver Privacy: The sender’s view is statistically/computationally independent of the receiver’s choice bit $b$.
Sender Privacy: The receiver’s view reveals no information about $m_{1-b}$, beyond negligible in statistical or computational distance.
The OT is impossible to achieve both-ways security, classically or quantumly[3] in the information-theoretic way.
The security of OT can be:
The computational OT can be constructed based on One-Wayness or Indistinguishability:
In the Universal Composable (UC) framework, OT is composable and serves as a universal primitive. Any general secure computation protocol can be built from OT based on the result of Kilian [5].
In the quantum world as well, OT can be constructed under different sets of assumptions.
Quantum OT schemes:
OT protocols can be constructed using quantum communication + computational assumptions:
Or alternatively in Relativistic settings [5], or the Bounded-quantum-storage model [6]
There are also quantum protocols with one-sided information-theoretic security, i.e. the Receiver is guaranteed full security; the sender has computational security (or vice versa).
Oblivious Transfer (OT) is a foundational two-party cryptographic functionality. It enables a sender to transfer part of their data to a receiver in such a way that:
The most common variant is 1-out-of-2 OT, denoted as $OT_{1-2}$, in which:
The sender holds two messages $m_0 , m_1 in {0,1}^n$
The receiver holds a choice bit $b in {0,1}$
The receiver learns $m_b$ and gains no information about $m_{1-b}$
The sender learns nothing about $b$.
This makes OT a core primitive for secure two-party computation (2PC) and multi-party computation (MPC).
No protocols implement this functionality yet.
OT is a classical functionality. OT was first introduced by Michael Rabin in 1981 [1] as “Rabin OT”, where the sender sends a message to the receiver, who obtains it with probability 1/2, and the sender does not know whether it was received.
The 1-out-of-2 OT variant was introduced later by Even, Goldreich, and Lempel in 1985 [2] and became the standard formulation.
Classically, OT can be built using the following tools:
OT is an important cryptographic primitive that unlocks a variety of cryptographic protocols, such as:
To state the formal properties of this functionality let the $mathtt{Sender}(m_0, m_1)$ and the $mathtt{Receiver}(b)$ be the parties, then an OT has the following properties:
Correctness: The honest receiver outputs $m_b$ with probability: $text{Pr} [text{Receiver outputs} m_b] = 1$.
Receiver Privacy: The sender’s view is statistically/computationally independent of the receiver’s choice bit $b$.
Sender Privacy: The receiver’s view reveals no information about $m_{1-b}$, beyond negligible in statistical or computational distance.
The OT is impossible to achieve both-ways security, classically or quantumly[3] in the information-theoretic way.
The security of OT can be:
The computational OT can be constructed based on One-Wayness or Indistinguishability:
In the Universal Composable (UC) framework, OT is composable and serves as a universal primitive. Any general secure computation protocol can be built from OT based on the result of Kilian [5].
In the quantum world as well, OT can be constructed under different sets of assumptions.
Quantum OT schemes:
OT protocols can be constructed using quantum communication + computational assumptions:
Or alternatively in Relativistic settings [5], or the Bounded-quantum-storage model [6]
There are also quantum protocols with one-sided information-theoretic security, i.e. the Receiver is guaranteed full security; the sender has computational security (or vice versa).