Skip to main content

Oblivious Transfer

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 1292 Accesses

Definition

Oblivious transfer (OT) is a two-party protocol between a sender and a receiver, by which the sender transfers some information to the receiver, the sender remaining oblivious, however, to what information the receiver actually obtains.

Theory

The most basic form of oblivious transfer, as introduced by Rabin [4], is a protocol achieving the following functionality. The sender uses one bit b as its private input to the protocol; the receiver does not provide any private input to the protocol. At the completion of the protocol, the receiver gets either the bit b or an undefined value \(\infty \). Both cases occur with probability 50%, and the receiver knows whether it gets b or \(\infty \). However, the sender does not know whether bit b was transferred successfully or not.

Despite its somewhat strange functionality, OT turns out to be sufficiently powerful to construct a secure multiparty computation for anycomputable function, as follows from the completeness result proved...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Bellare M, Micali S (1989) Non-interactive oblivious transfer and application. In: Brassand G (ed) Advances in cryptology ā€“ Cryptoā€™89. Lecture notes in computer science, vol 435. Springer, Berlin

    Google ScholarĀ 

  2. CrĆ©peau C (1987) Equivalence between two flavours of oblivious transfer. In: Pomerance C (ed) Advances in cryptology ā€“ CRYPTOā€™87. Lecture notes in computer science, vol 293. Springer, Berlin, pp 350ā€“354

    Google ScholarĀ 

  3. Kilian J (1988) Basing crpytography on oblivious transfer. In: Proceedings of 20th symposium on theory of computing (STOCā€™88). ACM Press, New York, pp 20ā€“31

    Google ScholarĀ 

  4. Rabin M (1981) How to exchange secrets by oblivious transfer. Technical Memo TR-81, Aiken Computation Laboratory, Harvard University

    Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Schoenmakers, B. (2011). Oblivious Transfer. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_9

Download citation

Publish with us

Policies and ethics