Oblivious Transfer

Oblivious transfer (OT) is a protocol used in cryptography between parties who do not trust each other. It is an attempt to prevent cheating by maintaining security while creating a secret encryption key. Oblivious transfer means that one party passes multiple messages to another without knowing which message is then accepted. For example, if Alice and Bob use the all-or-nothing oblivious transfer protocol, Alice will send a message to Bob through an established communication channel but will not know whether Bob received that message.

Another popular oblivious transfer protocol is the one-out-of-two (or 1-2) protocol. In this procedure, Alice sends two messages to Bob, who can only read one. She does not know which. Bob will receive one message, and from there he and Alice will complete different algorithms to establish a secure channel: he will receive a private key. When Alice sends encrypted messages, Bob will be able to decrypt the correct message using the key that they created.

Researchers have applied quantum cryptography principles to oblivious transfer because oblivious transfer as a cryptographic primitive has been susceptible to attacks from quantum computers. However, researchers have shown that even quantum OT is not unconditionally secure. Lo’s no-go theorem, for example, showed that quantum encryption cannot unconditionally secure an oblivious transfer on its own. However, OT is a helpful technique for creating a transmission channel between two mistrustful parties.






Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Embedded Analytics

Embedded analytics brings self-service business intelligence to everyday application users.

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their workforce operations. They provide a central platform for human resources professionals...

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...