Abstract
Oblivious transfer is a fundamental problem in cryptography where it is required that a sender transfers one of potentially many pieces of information to a receiver and at the same time remains oblivious as to which piece has been transferred. There exist many oblivious transfer protocols in the literature; however, most of them lack efficiency needed in practical situations. To fill this gap, we employ the notion of asymmetric homomorphic encryption and propose a generic construction to build simple and efficient oblivious transfer protocols. We then instantiate our construction with some well-known homomorphic encryption schemes such as RSA, Paillier and NTRU to obtain concrete oblivious transfer protocols. We further prove that our generic construction is secure in the universal composable framework.




Similar content being viewed by others
References
Asharov G, Lindell Y, Schneider T, Zohner M (2017) More efficient oblivious transfer extensions. J Cryptol 30(3):805–858
Barreto PS, David B, Dowsley R, Morozov K, Nascimento AC (2017) A framework for efficient adaptively secure composable oblivious transfer in the ROM. arXiv preprint arXiv:1710.08256
Brassard G, Crépeau C, Robert JM (1986) All-or-nothing disclosure of secrets. In: Conference on the Theory and Application of Cryptographic Techniques. Springer, pp 234–238
Chou T, Orlandi C (2015) The simplest protocol for oblivious transfer. In: International Conference on Cryptology and Information Security in Latin America. Springer, pp 40–58
Chou Y, Tsai I, Ko C, Kuo S, Chen I (2006) Quantum Oblivious Transfer and Fair Digital Transactions. In: 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC’06), pp 121–128
Chu CK, Tzeng WG (2005) Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In: International Workshop on Public Key Cryptography. Springer, pp 172–183
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654
Döttling N, Garg S, Hajiabadi M, Masny D, Wichs D (2020) Two-round oblivious transfer from CDH or LPN. Adv Cryptol - EUROCRYPT 2020:768–797
Even S, Goldreich O, Lempel A (1985) A randomized protocol for signing contracts. Commun ACM 28(6):637–647
Fan CI, Huang SY, Artan W (2013) Design and implementation of privacy preserving billing protocol for smart grid. J Supercomput 66(2):841–862
Garg S, Srinivasan A (2018) Two-round multiparty secure computation from minimal assumptions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, pp 468–499
Goyal V, Jain A, Jin Z, Malavolta G (2020) Statistical zaps and new oblivious transfer protocols. In: Canteaut A, Ishai Y (eds) Adv Cryptol - EUROCRYPT 2020. Springer International Publishing, Cham, pp 668–699
Hauck E, Loss J (2017) Efficient and universally composable protocols for oblivious transfer from the CDH assumption. IACR Cryptol ePrint Archive 2017:1011
Hazay C, Scholl P, Soria-Vazquez E (2020) Low cost constant round MPC combining BMR and oblivious transfer. J Cryptol 33:1732–1786
Jannati H, Bahrak B (2017) An oblivious transfer protocol based on elgamal encryption for preserving location privacy. Wireless Personal Commun 97(2):3113–3123
Jiang H, Xu Q, Liu C et al. (2018) Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0713-7
Katz J, Lindell Y (2007) Introd Modern Cryptograp. Chapman and Hall/CRC Press, Florida
Keller M, Orsini E, Scholl P (2016) MASCOT: faster malicious arithmetic secure computation with oblivious transfer. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 830–842
Kundu N, Debnath SK, Mishra D (2020) 1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography. Sādhanā 45(1):1–12
Lai YF, Galbraith SD, de Saint Guilhem CD (2020) Compact, efficient and UC-secure isogeny-based oblivious transfer. IACR Cryptol ePrint Arch 2020:1012
Li T, Ren W, Xiang Y, Zheng X, Zhu T, Choo KKR, Srivastava G (2021) FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts. Infor Sci 544:469–484
Li Z, Ma C, Zhao M, Choi C (2019) Efficient oblivious transfer construction via multiple bits dual-mode cryptosystem for secure selection in the cloud. J Chinese Inst Eng 42(1):97–106
Liu M, Hu Y (2019) Universally composable oblivious transfer from ideal lattice. Front Comput Sci 13:879–906
Miyaji A, Rahman MS (2012) Privacy-preserving set operations in the presence of rational parties. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops, pp 869–874
Mu Y, Zhang J, Varadharajan V (2002) m out of n oblivious transfer. In: Australasian Conference on Information Security and Privacy. Springer, pp 395–405
Naor M, Pinkas B (1999) Oblivious transfer with adaptive queries. In: Annual International Cryptology Conference. Springer, pp 573–590
Nargis I (2017) Efficient oblivious transfer from lossy threshold homomorphic encryption. In: International Conference on Cryptology in Africa. Springer, pp 165–183
Peikert C, Vaikuntanathan V, Waters B (2008) A framework for efficient and composable oblivious transfer. In: Annual International Cryptology Conference. Springer, pp 554–571
Quach W (2020) UC-secure OT from LWE, Revisited. In: Galdi C, Kolesnikov V (eds) Security and cryptography for networks. Springer International Publishing, Berlin, pp 192–211
Rabin MO (1981) How to exchange secrets by oblivious transfer. Technical report TR-81, Aiken Computation Laboratory, Harvard
Sen J (2013) Homomorphic encryption - theory and application. Theory and practice of cryptography and network security protocols and technologies. INTECH Publishers, Croatia, pp 1–32
Staneková L, Stanek M (2005) Fast contract signing with batch oblivious transfer. In: Dittmann J, Katzenbeisser S, Uhl A (eds) Commun Multim Secur. Springer, Berlin Heidelberg, pp 1–10
Tassa T (2011) Generalized oblivious transfer by secret sharing. Des Codes Cryptogr 58(1):11–21
Yang YG, Sun SJ, Pan QX, Xu P (2015) Reductions between private information retrieval and oblivious transfer at the quantum level. Optik 126(21):3206–3209
Zhang J, Wang Y (2005) Two provably secure k-out-of-n oblivious transfer schemes. Appl Math Comput 169(2):1211–1220
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Esmaeilzade, S., Pakniat, N. & Eslami, Z. A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes. J Supercomput 78, 72–92 (2022). https://doi.org/10.1007/s11227-021-03826-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-03826-0