Efficient Traceable Oblivious Transfer and Its Applications

  • Weiwei Liu
  • Yinghui ZhangEmail author
  • Yi Mu
  • Guomin Yang
  • Yangguang Tian
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11125)


Oblivious transfer (OT) has been applied widely in privacy-sensitive systems such as on-line transactions and electronic commerce to protect users’ private information. Traceability is an interesting feature of such systems that the privacy of the dishonest users could be traced by the service provider or a trusted third party (TTP). However, previous research on OT mainly focused on designing protocols with unconditional receiver’s privacy. Thus, traditional OT schemes cannot fulfill the traceability requirements in the aforementioned applications. In this paper, we address this problem by presenting a novel traceable oblivious transfer (TOT) without involvement of any TTP. In the new system, an honest receiver is able to make a fixed number of choices with perfect receiver privacy. If the receiver misbehaves and tries to request more than a pre-fixed number of choices, then all his previous choices could be traced by the sender. We first give the formal definition and security model of TOT, then propose an efficient TOT scheme, which is proven secure under the proposed security model.


Oblivious transfer Secret sharing Privacy Traceability 



This work is supported by the National Key R&D Program of China (2017YFB0802000), the National Natural Science Foundation of China (Nos. 61772418, 61402366). Yinghui Zhang is supported by New Star Team of Xi’an University of Posts & Telecommunications (2016-02).


  1. 1.
    Aiello, B., Ishai, Y., Reingold, O.: Priced oblivious transfer: how to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119–135. Springer, Heidelberg (2001). Scholar
  2. 2.
    Ashton, K.: That internet of things? Thing (1999)Google Scholar
  3. 3.
    Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A fair protocol for signing contracts. IEEE Trans. Inf. Theory 36(1), 40–46 (1990)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004). Scholar
  5. 5.
    Brassard, G., Crépeau, C., Robert, J.-M.: All-or-nothing disclosure of secrets. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 234–238. Springer, Heidelberg (1987). Scholar
  6. 6.
    Camenisch, J., Dubovitskaya, M., Neven, G.: Oblivious transfer with access control. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, 9–13 November 2009, pp. 131–140 (2009)Google Scholar
  7. 7.
    Camenisch, J., Dubovitskaya, M., Neven, G., Zaverucha, G.M.: Oblivious transfer with hidden access control policies. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 192–209. Springer, Heidelberg (2011). Scholar
  8. 8.
    Camenisch, J., Neven, G., Shelat, A.: Simulatable adaptive oblivious transfer. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 573–590. Springer, Heidelberg (2007). Scholar
  9. 9.
    Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: IEEE Symposium on Foundations of Computer Science, p. 136 (2001)Google Scholar
  10. 10.
    Chu, C.-K., Tzeng, W.-G.: Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172–183. Springer, Heidelberg (2005). Scholar
  11. 11.
    Coull, S., Green, M., Hohenberger, S.: Controlling access to an oblivious database using stateful anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 501–520. Springer, Heidelberg (2009). Scholar
  12. 12.
    Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637–647 (1985)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Han, J., Susilo, W., Mu, Y., Au, M.H., Cao, J.: AAC-OT: accountable oblivious transfer with access control. IEEE Trans. Inf. Forensics Secur. 10(12), 2502–2514 (2015)CrossRefGoogle Scholar
  14. 14.
    Han, J., Susilo, W., Mu, Y., Yan, J.: Efficient oblivious transfers with access control. Comput. Math. Appl. 63(4), 827–837 (2012)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Kurosawa, K., Nojima, R.: Simple adaptive oblivious transfer without random oracle. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 334–346. Springer, Heidelberg (2009). Scholar
  16. 16.
    Liu, W., Mu, Y., Yang, G.: An efficient privacy-preserving e-coupon system. In: Lin, D., Yung, M., Zhou, J. (eds.) Inscrypt 2014. LNCS, vol. 8957, pp. 3–15. Springer, Cham (2015). Scholar
  17. 17.
    Liu, W., Mu, Y., Yang, G., Yu, Y.: Efficient e-coupon systems with strong user privacy. Telecommun. Syst. 64(4), 695–708 (2017)CrossRefGoogle Scholar
  18. 18.
    Ma, X., Xu, L., Zhang, F.: Oblivious transfer with timed-release receiver’s privacy. J. Syst. Softw. 84(3), 460–464 (2011)CrossRefGoogle Scholar
  19. 19.
    Mu, Y., Zhang, J., Varadharajan, V.: m out of n oblivious transfer. In: Batten, L., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 395–405. Springer, Heidelberg (2002). Scholar
  20. 20.
    Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573–590. Springer, Heidelberg (1999). Scholar
  21. 21.
    Naor, M., Pinkas, B.: Computationally secure oblivious transfer. J. Cryptol. 18(1), 1–35 (2005)MathSciNetCrossRefGoogle Scholar
  22. 22.
    Rabin, M.O.: How to exchange secrets by oblivious transfer (1981)Google Scholar
  23. 23.
    Teranishi, I., Furukawa, J., Sako, K.: k-times anonymous authentication. IEICE Trans. 92-A(1), 147–165 (2009)Google Scholar
  24. 24.
    Yao, A.C.: Protocols for secure computations (extended abstract). In: 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, 3–5 November 1982, pp. 160–164 (1982)Google Scholar
  25. 25.
    Yao, A.C.: How to generate and exchange secrets (extended abstract). In: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986, pp. 162–167 (1986)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Weiwei Liu
    • 1
    • 4
  • Yinghui Zhang
    • 2
    • 3
    Email author
  • Yi Mu
    • 4
  • Guomin Yang
    • 4
  • Yangguang Tian
    • 5
  1. 1.School of Mathematics and StatisticsNorth China University of Water Resources and Electric PowerZhengzhouChina
  2. 2.National Engineering Laboratory for Wireless SecurityXi’an University of Posts and TelecommunicationsXi’anChina
  3. 3.Westone Cryptologic Research CenterBeijingChina
  4. 4.Institute of Cybersecurity and Cryptology,School of Computing and Information TechnologyUniversity of WollongongWollongongAustralia
  5. 5.School of Information SystemsSingapore Management UniversitySingaporeSingapore

Personalised recommendations