Oblivious Transfer
   HOME

TheInfoList



OR:

In
cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
, an oblivious transfer (OT) protocol is a type of protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred. The first form of oblivious transfer was introduced in 1981 by
Michael O. Rabin Michael Oser Rabin (; born September 1, 1931) is an Israeli mathematician, computer scientist, and recipient of the Turing Award. Biography Early life and education Rabin was born in 1931 in Breslau, Germany (today Wrocław, in Poland), th ...
. In this form, the sender sends a message to the receiver with
probability Probability is a branch of mathematics and statistics concerning events and numerical descriptions of how likely they are to occur. The probability of an event is a number between 0 and 1; the larger the probability, the more likely an e ...
1/2, while the sender remains oblivious as to whether or not the receiver received the message. Rabin's oblivious transfer scheme is based on the RSA cryptosystem. A more useful form of oblivious transfer called 1–2 oblivious transfer or "1 out of 2 oblivious transfer", was developed later by Shimon Even,
Oded Goldreich Oded Goldreich (; born 1957) is a professor of computer science at the faculty of mathematics and computer science of the Weizmann Institute of Science, Israel. His research interests lie within the theory of computation and are, specifically, ...
, and Abraham Lempel, in order to build protocols for
secure multiparty computation Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their ...
. It is generalized to "1 out of ''n'' oblivious transfer" where the user gets exactly one database element without the server getting to know which element was queried, and without the user knowing anything about the other elements that were not retrieved. The latter notion of oblivious transfer is a strengthening of
private information retrieval In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-''n'' obl ...
, in which the database is not kept private. Claude Crépeau showed that Rabin's oblivious transfer is equivalent to 1–2 oblivious transfer. Further work has revealed oblivious transfer to be a fundamental and important problem in cryptography. It is considered one of the critical problems in the field, because of the importance of the applications that can be built based on it. In particular, it is
complete Complete may refer to: Logic * Completeness (logic) * Completeness of a theory, the property of a theory that every formula in the theory's language or its negation is provable Mathematics * The completeness of the real numbers, which implies t ...
for
secure multiparty computation Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their ...
: that is, given an implementation of oblivious transfer it is possible to securely evaluate any polynomial time computable function without any additional primitive.


Rabin's oblivious transfer protocol

In Rabin's oblivious transfer protocol, the sender generates an RSA public modulus ''N''=''pq'' where ''p'' and ''q'' are large
prime number A prime number (or a prime) is a natural number greater than 1 that is not a Product (mathematics), product of two smaller natural numbers. A natural number greater than 1 that is not prime is called a composite number. For example, 5 is prime ...
s, and an exponent ''e''
relatively prime In number theory, two integers and are coprime, relatively prime or mutually prime if the only positive integer that is a divisor of both of them is 1. Consequently, any prime number that divides does not divide , and vice versa. This is equiv ...
to ''λ(N)'' = (''p'' − 1)(''q'' − 1). The sender encrypts the message ''m'' as ''m''''e'' mod ''N''. # The sender sends ''N'', ''e'', and ''m''''e'' mod ''N'' to the receiver. # The receiver picks a random ''x'' modulo ''N'' and sends ''x''2 mod ''N'' to the sender. Note that gcd(''x'',''N'') = 1 with overwhelming probability, which ensures that there are 4 square roots of ''x''2 mod ''N''. # The sender finds a square root ''y'' of ''x''2 mod ''N'' and sends ''y'' to the receiver. If the receiver finds ''y'' is neither ''x'' nor −''x'' modulo ''N'', the receiver will be able to
factor Factor (Latin, ) may refer to: Commerce * Factor (agent), a person who acts for, notably a mercantile and colonial agent * Factor (Scotland), a person or firm managing a Scottish estate * Factors of production, such a factor is a resource used ...
''N'' and therefore decrypt ''m''''e'' to recover ''m'' (see Rabin encryption for more details). However, if ''y'' is ''x'' or −''x'' mod ''N'', the receiver will have no information about ''m'' beyond the encryption of it. Since every
quadratic residue In number theory, an integer ''q'' is a quadratic residue modulo operation, modulo ''n'' if it is Congruence relation, congruent to a Square number, perfect square modulo ''n''; that is, if there exists an integer ''x'' such that :x^2\equiv q \pm ...
modulo ''N'' has four square roots, the probability that the receiver learns ''m'' is 1/2.


1–2 oblivious transfer

In a 1–2 oblivious transfer protocol, Alice the sender has two messages ''m''0 and ''m''1, and wants to ensure that the receiver only learns one. Bob, the receiver, has a bit ''b'' and wishes to receive ''m''''b'' without Alice learning ''b''. The protocol of Even, Goldreich, and Lempel (which the authors attribute partially to
Silvio Micali Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand, a proof-of-stake blockchain cryptocurrency protocol. Micali's research at the MIT Compu ...
) is general, but can be instantiated using RSA encryption as follows. # Alice has two messages, m_0, m_1 and wants to send exactly one of them to Bob. Bob does not want Alice to know which one he receives. # Alice generates an RSA key pair, comprising the modulus N, the public exponent e and the private exponent d. # She also generates two random values, x_0, x_1 and sends them to Bob along with her public modulus and exponent. # Bob picks b to be either 0 or 1, and selects x_b. # Bob generates a random value k and uses it to blind x_b by computing v = (x_b + k^e)\bmod N, which he sends to Alice. # Alice combines v with both of her random values to produce: k_0 = (v - x_0)^d\bmod N and k_1 = (v - x_1)^d\bmod N. Now k_b will be equal to k and the other will be a meaningless random value. However since Alice does not know the value of b that Bob chose, she cannot determine which of k_0 and k_1 is equal to k. # She combines the two secret messages with each of the possible keys, m'_0 = (m_0 + k_0)\bmod N and m'_1 = (m_1 + k_1)\bmod N, and sends them both to Bob. # Bob knows k, so he is able to compute m_b = (m'_b - k)\bmod N. However, since he does not know d, he cannot compute k_ = (v - x_)^d\bmod N and so cannot determine (m_)\bmod N.


1-out-of-''n'' oblivious transfer and ''k''-out-of-''n'' oblivious transfer

A 1-out-of-''n'' oblivious transfer protocol can be defined as a natural generalization of a 1-out-of-2 oblivious transfer protocol. Specifically, a sender has ''n'' messages, and the receiver has an index ''i'', and the receiver wishes to receive the ''i''-th among the sender's messages, without the sender learning ''i'', while the sender wants to ensure that the receiver receive only one of the ''n'' messages. 1-out-of-''n'' oblivious transfer is incomparable to
private information retrieval In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-''n'' obl ...
(PIR). On the one hand, 1-out-of-''n'' oblivious transfer imposes an additional privacy requirement for the database: namely, that the receiver learn at most one of the database entries. On the other hand, PIR requires communication
sublinear In linear algebra, a sublinear function (or functional as is more often used in functional analysis), also called a quasi-seminorm or a Banach functional, on a vector space X is a real-valued function with only some of the properties of a semino ...
in ''n'', whereas 1-out-of-''n'' oblivious transfer has no such requirement. However, assuming single server PIR is a sufficient assumption in order to construct 1-out-of-2 Oblivious Transfer. 1-out-of-''n'' oblivious transfer protocol with
sublinear In linear algebra, a sublinear function (or functional as is more often used in functional analysis), also called a quasi-seminorm or a Banach functional, on a vector space X is a real-valued function with only some of the properties of a semino ...
communication was first constructed (as a generalization of single-server PIR) by Eyal Kushilevitz and
Rafail Ostrovsky Rafail Ostrovsky is a distinguished professor of computer science and mathematics at University of California, Los Angeles, UCLA and a well-known researcher in algorithms and cryptography. Biography Rafail Ostrovsky received his Ph.D. from Massa ...
. More efficient constructions were proposed by
Moni Naor Moni Naor () is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science. Naor received his Ph.D. in 1989 at the University of California, Berkeley. His advisor was Manuel Blum. He works in various fields of com ...
and Benny Pinkas, William Aiello, Yuval Ishai and
Omer Reingold Omer Reingold () is an Israeli computer scientist. He is the Rajeev Motwani professor of computer science in the Computer Science Department at Stanford University and the director of thSimons Collaboration on the Theory of Algorithmic Fairness ...
, Sven Laur and Helger Lipmaa. In 2017, Kolesnikov et al., proposed an efficient 1-n oblivious transfer protocol which requires roughly 4x the cost of 1-2 oblivious transfer in amortized setting.
Brassard A brassard or armlet is an armband or piece of cloth or other material worn around the upper arm; the term typically refers to an item of uniform worn as part of military uniform or by police or other uniformed persons. Unit, role, rank b ...
, Crépeau and
Robert The name Robert is an ancient Germanic given name, from Proto-Germanic "fame" and "bright" (''Hrōþiberhtaz''). Compare Old Dutch ''Robrecht'' and Old High German ''Hrodebert'' (a compound of ''Hrōþ, Hruod'' () "fame, glory, honour, prais ...
further generalized this notion to ''k''-''n'' oblivious transfer, wherein the receiver obtains a set of ''k'' messages from the ''n'' message collection. The set of ''k'' messages may be received simultaneously ("non-adaptively"), or they may be requested consecutively, with each request based on previous messages received.


Generalized oblivious transfer

''k''-''n'' Oblivious transfer is a special case of generalized oblivious transfer, which was presented by Ishai and Kushilevitz. In that setting, the sender has a set ''U'' of ''n'' messages, and the transfer constraints are specified by a collection ''A'' of permissible subsets of ''U''. The receiver may obtain any subset of the messages in ''U'' that appears in the collection ''A''. The sender should remain oblivious of the selection made by the receiver, while the receiver cannot learn the value of the messages outside the subset of messages that he chose to obtain. The collection ''A'' is monotone decreasing, in the sense that it is closed under containment (i.e., if a given subset ''B'' is in the collection ''A'', so are all of the subsets of ''B''). The solution proposed by Ishai and Kushilevitz uses the parallel invocations of 1-2 oblivious transfer while making use of a special model of private protocols. Later on, other solutions that are based on secret sharing were published – one by Bhavani Shankar, Kannan Srinathan, and C. Pandu Rangan, and another by Tamir Tassa.


Origins

In the early seventies Stephen Wiesner introduced a primitive called multiplexing in his seminal paper "Conjugate Coding", which was the starting point of
quantum cryptography Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution, which offers an information-theoretically secure soluti ...
. Unfortunately it took more than ten years to be published. Even though this primitive was equivalent to what was later called ''1–2 oblivious transfer'', Wiesner did not see its application to cryptography.


Quantum oblivious transfer

Protocols for oblivious transfer can be implemented with quantum systems. In contrast to other tasks in
quantum cryptography Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution, which offers an information-theoretically secure soluti ...
, like
quantum key distribution Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, which then can b ...
, it has been shown that quantum oblivious transfer cannot be implemented with unconditional security, i.e. the security of quantum oblivious transfer protocols cannot be guaranteed only from the laws of
quantum physics Quantum mechanics is the fundamental physical Scientific theory, theory that describes the behavior of matter and of light; its unusual characteristics typically occur at and below the scale of atoms. Reprinted, Addison-Wesley, 1989, It is ...
.


See also

*
k-anonymity ''k''-anonymity is a property possessed by certain anonymized data. The term ''k''-anonymity was first introduced by Pierangela Samarati and Latanya Sweeney in a paper published in 1998, although the concept dates to a 1986 paper by Tore Dalen ...
*
Secure multi-party computation Secure multi-party computation (also known as secure computation, multi-party computation (MPC) or privacy-preserving computation) is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their ...
*
Zero-knowledge proof In cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the verifier) that some given statement is true, without conveying to the verifier any information ...
*
Private information retrieval In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-''n'' obl ...


References

{{Reflist


External links

* Helger Lipmaa's collection of Web links on the topic Cryptographic primitives