Oblivious Transfer
Alice has messages . Bob wants to request the -th message, without letting Alice learn anything about the value of . Alice wants to send Bob , without letting him learn anything about the other messages. This process is called “oblivious transfer”: Alice transfers a single message to Bob, but she remains oblivious as to which message she has transferred.
We’ll see two simple protocols to achieve this.
Commutative encryption
Let’s imagine that Alice and Bob have access to some encryption scheme that is commutative:
In other words, if Alice encrypts a message, and Bob applies a second-layer of encryption to the encrypted message, it doesn’t matter which order Alice and Bob decrypt the message in – they will still get the original message back.
A common metaphor for commutative encryption is a box that’s locked with two padlocks. Alice puts a message inside the box, lock it with her lock, and ship it to Bob. Bob puts his own lock back on the box and ships it back to Alice. What’s special about commutative encryption is that Bob’s lock doesn’t block Alice from unlocking her own – so Alice can remove her lock and send it back to Bob, and then Bob removes his lock and recovers the message.
Mathematically, you can get commutative encryption by working in a finite group (for example , or an elliptic curve).
Alice’s secret key is an integer ; she encrypts a message by raising it to the -th power, and she sends Bob .
Bob encrypts again with his own secret key , and he sends back to Alice.
Now Alice removes her lock by taking an -th root. The result is , which she sends back to Bob. And Bob takes another -th root, recovering .
OT using commutative encryption
Our first oblivious transfer protocol is built on the commutative encryption we just described.
Alice has messages , which we may as well assume are elements of the group . Alice chooses a secret key , encrypts each message, and sends all ciphertexts to Bob:
But crucially, Alice sends the ciphertexts in order, so Bob knows which is which.
At this point, Bob can’t read any of the messages, because he doesn’t know the keys. No problem! Bob just picks out the -th ciphertext , adds his own layer of encryption onto it, and sends the resulting doubly-encoded message back to Alice:
Alice doesn’t know Bob’s key , so she can’t learn anything about the message he encrypted – even though it originally came from her. Nonetheless she can apply her own decryption method to it. Since the encryption scheme is commutative, the result of Alice’s decryption is simply
which she sends back to Bob.
And Bob decrypts the message to learn .
OT in one step
The protocol above required one and a half rounds of communication: Alice sent two messages to Bob, and Bob sent one message back to Alice.
We can do better, using public-key cryptography.
Let’s start with a simplified protocol that is not quite secure. The idea is for Bob to send Alice keys
One of the , say , is a public key for which Bob knows the private key. The other are random garbage.
Alice then uses one key to encrypt each message, and sends back to Bob:
Now Bob uses the private key for to decrypt , and he’s done.
Is Bob happy with this protocol? Yes. Alice has no way of learning the value of , as long as she can’t distinguish a true public key from a random fake key (which is true of public-key schemes in practice).
But is Alice happy with it? Not so much. A cheating Bob could send different public keys, and Alice has no way to detect it – like we just said, Alice can’t tell random garbage from a true public key! And then Bob would be able to decrypt all messages .
But there’s a simple trick to fix it. Bob chooses some “verifiably random” value – to fix ideas, we could agree to use . Then we require that the numbers form an arithmetic progression with common difference . Bob chooses , computes a public-private key pair, and sets equal to that key. Then all the other terms are determined by the arithmetic progression requirement . (Or if the keys are elements of a group in multiplicative notation, we could write this as .)
Is this secure? If we think of the hash function as a random-number generator, then all “garbage keys” are effectively random values. So now the question is: Can Bob compute a private key for a given (randomly generated) public key? It’s a standard assumption in public-key cryptography that Bob can’t do this: there’s no algorithm that reads in a public key and spits out the corresponding private key. (Otherwise, the whole enterprise is doomed.) So Alice is guaranteed that Bob only knows how to decrypt (at most) one message.
In fact, some public-key cryptosystems (like ElGamal) have a sort of “homomorphic” property: If you know the private keys for to two different public keys and , then you can compute the private key for the public key . (In ElGamal, this is true because the private key is just a discrete logarithm.) So, if Bob could dishonestly decrypt two of Alice’s messages, he could compute the private key for the public key . But is verifiably random, and it’s very hard (we assume) for Bob to find a private key for a random public key.