Talk:Oblivious transfer

{{WikiProject banner shell|class=Start|

{{WikiProject Computing|importance=}}

{{WikiProject Cryptography}}

}}

Oblivious transfer

:Copied from Wikipedia:Reference desk archive/September 2004 I — Matt 01:00, 28 Nov 2004 (UTC)

Could somebody explain this concept to me? Why is it a primitive for secure communication? (BTW: There is an article oblivious transfer but it is only a stub. So maybe write your answer right there.) Thanks a lot in advance. Simon A. 09:05, 31 Aug 2004 (UTC)

1-2 oblivious transfer bug

In the explanation given, the receivers knows x0 and x1 and v so in the same way it got k_b it can get k_(1-b) and then get the value of the m_(1-b) ! This breaks the oblivious transfer concept. Can someone clear that out ? Thanks. Mohammad Al-Aggan (talk) 00:44, 11 January 2010 (UTC)

:The receiver only knows its own random number k which due to the protocol is equal to k_b. From steps 3 and 4 we have:

:

\begin{array}{lcl}

v&=&enc(k)+x_b\\

k_i&=&dec(v-x_i)

\end{array}

:Indeed k_b=dec(v-x_b)=dec(enc(k))=k but k_{1-b}=dec(enc(k)+x_b-x_{1-b}) will decrypt to rubbish that is not knowable to the receiver by virtue of the asymmetric encryption used. Limninal (talk) 11:04, 20 February 2010 (UTC)

1-2 OT Even, Goldreich, and Lempel Reference?

What is the reference for the RSA-based algorithm presented, claiming to be inspired by Even, Goldreich, and Lempel? Docfink (talk) 17:03, 27 April 2015 (UTC)

:Even, S., Goldreich, O., Lempel, A., "A Randomized Protocol for Signing Contracts", 1985, available for example at https://dl.acm.org/doi/pdf/10.1145/3812.3818 203.215.133.188 (talk) 04:15, 10 May 2022 (UTC)

1-2 OT Algorithm Assumption

Also needed is the assumption that Alice verifies that k_0 \ne k_1 in step 6, otherwise it shows that Bob has selected a k such that (x_0 + k^e) = (x_1 + k^e)~mod~N enabling him to decrypt both choices. Docfink (talk) 17:03, 27 April 2015 (UTC)

1-2 OT Concrete Example

Suggest a hands-on example to highlight the protocol:

A big-box retailer offers one of two discount codes to a consumer to be redeemed later at the register. The retailer offers a choice of one of "15% off entire order" or "$50 bonus cash" for use on a future purchase. Using the 1-2 OT protocol, the consumer commits to a choice of one of these two, sends his selection to the retailer, and the retailer issues the discount code encoded with the consumer's choice. This all happens in such a way that the retailer does not learn the consumer's preference, yet the retailer incurs the cost of only one of the promotions, not both. (We assume that the consumer wisely pays in cash at the register, to keep his preferences private.)
Docfink (talk) 17:03, 27 April 2015 (UTC)

Oblivious transfer "importance of applications"

"Further work has revealed oblivious transfer to be a fundamental and important problem in cryptography. It is considered one of the critical problems in the field, because of the importance of the applications that can be built based on it. In"

This section doesn't explain what the actual applications are (other than possibly "multiparty computing"?), why they are important. Furthermore a new sentence seems to have started and has never been finished, only "In" remains of it. — Preceding unsigned comment added by Owlstead (talkcontribs) 10:08, 23 February 2021 (UTC)

Comments moved from article

There seems to be some error. The decryption can be done only by those who has the secret key. Here the party who generates key is Alice. And it is bob who decrypts. Something wrong in the algorithm. please correct. — Preceding unsigned comment added by 2607:fea8:e920:f090:3dd6:4e22:a8c2:9100 (talk) 19:45, 17 March 2022 (UTC) --Ahecht (TALK
PAGE
) 20:03, 17 March 2022 (UTC)