Global Information Lookup Global Information

Oblivious transfer information


In cryptography, an oblivious transfer (OT) protocol is a type of protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred.

The first form of oblivious transfer was introduced in 1981 by Michael O. Rabin.[1] In this form, the sender sends a message to the receiver with probability 1/2, while the sender remains oblivious as to whether or not the receiver received the message. Rabin's oblivious transfer scheme is based on the RSA cryptosystem. A more useful form of oblivious transfer called 1–2 oblivious transfer or "1 out of 2 oblivious transfer", was developed later by Shimon Even, Oded Goldreich, and Abraham Lempel,[2] in order to build protocols for secure multiparty computation. It is generalized to "1 out of n oblivious transfer" where the user gets exactly one database element without the server getting to know which element was queried, and without the user knowing anything about the other elements that were not retrieved. The latter notion of oblivious transfer is a strengthening of private information retrieval, in which the database is not kept private.

Claude Crépeau showed that Rabin's oblivious transfer is equivalent to 1–2 oblivious transfer.[3]

Further work has revealed oblivious transfer to be a fundamental and important problem in cryptography. It is considered one of the critical problems in the field, because of the importance of the applications that can be built based on it. In particular, it is complete for secure multiparty computation: that is, given an implementation of oblivious transfer it is possible to securely evaluate any polynomial time computable function without any additional primitive.[4]

  1. ^ Michael O. Rabin. "How to exchange secrets with oblivious transfer." Technical Report TR-81, Aiken Computation Laboratory, Harvard University, 1981. Scanned handwriting + typed version on eprint.iacr.org archive. Typed version available on Dousti's homepage.
  2. ^ S. Even, O. Goldreich, and A. Lempel, "A Randomized Protocol for Signing Contracts", Communications of the ACM, Volume 28, Issue 6, pg. 637–647, 1985.
  3. ^ Claude Crépeau. "Equivalence between two flavours of oblivious transfer". In Advances in Cryptology – CRYPTO '87, volume 293 of Lecture Notes in Computer Science, pages 350–354. Springer, 1988
  4. ^ Joe Kilian. "Founding Cryptography on Oblivious Transfer", Proceedings, 20th Annual ACM Symposium on the Theory of Computation (STOC), 1988. Paper at ACM portal (subscription required)

and 22 Related for: Oblivious transfer information

Request time (Page generated in 0.8207 seconds.)

Oblivious transfer

Last Update:

In cryptography, an oblivious transfer (OT) protocol is a type of protocol in which a sender transfers one of potentially many pieces of information to...

Word Count : 1967

Garbled circuit

Last Update:

garbled circuit protocol, we make use of oblivious transfer. In the oblivious transfer, a string is transferred between a sender and a receiver in the following...

Word Count : 2915

Quantum cryptography

Last Update:

unconditionally secure protocol for performing so-called oblivious transfer. Oblivious transfer, on the other hand, had been shown by Kilian to allow implementation...

Word Count : 8931

Private information retrieval

Last Update:

revealing which item is retrieved. PIR is a weaker version of 1-out-of-n oblivious transfer, where it is also required that the user should not get information...

Word Count : 2207

Oblivious pseudorandom function

Last Update:

An oblivious pseudorandom function (OPRF) is a cryptographic function, similar to a keyed-hash function, but with the distinction that in an OPRF two...

Word Count : 3333

Relativistic quantum cryptography

Last Update:

unconditionally secure quantum bit commitment was impossible. Lo showed that oblivious transfer and a broad class of secure computations were also impossible to achieve...

Word Count : 2654

OT

Last Update:

Occupational therapy Occupational therapist Oxytocin, a mammalian hormone Oblivious transfer, a type of cryptography protocol Operational Technology, hardware/software...

Word Count : 398

Alice and Bob

Last Update:

NetworkWorld. Rabin, Michael O. (1981). How to exchange secrets with oblivious transfer. Aiken Computation Lab, Harvard University. Technical Report TR-81...

Word Count : 2023

International Association for Cryptologic Research

Last Update:

IACR." Claude Crépeau 2013 "For pioneering work on the foundation of oblivious transfer, two- and multiparty protocols, information-theoretic security, and...

Word Count : 1420

Mental poker

Last Update:

a coin over a distance, Yao's Millionaires' Problem, and Rabin's oblivious transfer. The problem can be described thus: "How can one allow only authorized...

Word Count : 2399

Silvio Micali

Last Update:

public-key cryptosystems, pseudorandom functions, digital signatures, oblivious transfer, secure multiparty computation, and is one of the co-inventors of...

Word Count : 624

Stephen Wiesner

Last Update:

key distribution), quantum multiplexing (the earliest example of oblivious transfer) and superdense coding (the first and most basic example of entanglement-assisted...

Word Count : 472

Cryptographic hash function

Last Update:

Moni; Reingold, Omer; Rosen, Alon (2005). "On Robust Combiners for Oblivious Transfer and Other Primitives". Advances in Cryptology – EUROCRYPT 2005. Lecture...

Word Count : 6228

Commitment scheme

Last Update:

potential cryptographic applications including commitment schemes. Oblivious transfer Accumulator (cryptography) Key signing party Web of trust Zerocoin...

Word Count : 7699

Conjugate coding

Last Update:

developed to the world of public-key cryptography in the 1980s as Oblivious Transfer, first by Michael Rabin and then by Shimon Even. It is used in the...

Word Count : 282

Indistinguishability obfuscation

Last Update:

encryption Secret sharing for any monotone NP language Semi-honest oblivious transfer Deniable encryption (both sender-deniable and fully-deniable) Multiparty...

Word Count : 2086

Abraham Lempel

Last Update:

1977.1055714. S2CID 9267632. Timeline of algorithms Data compression Oblivious transfer מת פרופ' אברהם למפל – האיש ששינה את מדעי המחשב (in Hebrew) "IEEE Transactions...

Word Count : 409

Shimon Even

Last Update:

Graph Algorithms, Computer Science Press, 1979. ISBN 0-7167-8044-5. Oblivious transfer Memorial page Bibliography on DBLP Prof. Even's "genealogy" (PDF)...

Word Count : 96

Amit Sahai

Last Update:

Ishai; Manoj Prabhakaran; Amit Sahai (2008). "Founding Cryptography on Oblivious Transfer – Efficiently". Advances in Cryptology – CRYPTO 2008. Lecture Notes...

Word Count : 1154

Quadratic residue

Last Update:

constructing cryptographic schemes such as the Rabin cryptosystem and the oblivious transfer. The quadratic residuosity problem is the basis for the Goldwasser-Micali...

Word Count : 5557

Domain Name System

Last Update:

2022-01-21. "Oblivious DNS Deployed by Cloudflare and Apple". 9 December 2020. Retrieved 27 July 2022. Pauly, Tommy (2 September 2021). "Oblivious DNS Over...

Word Count : 9109

Oblivious data structure

Last Update:

In computer science, an oblivious data structure is a data structure that gives no information about the sequence or pattern of the operations that have...

Word Count : 1344

PDF Search Engine © AllGlobal.net