Behind the curtain: Oblivious Transfer
Lyubomir Filipov @FilipovG

Who am I
Lyubomir Filipov
Team Lead
Enthusiast

Oblivious transfer
cryptographic primitive
1-out-of-2 OT: Alice chooses as input two bits b0 and b1. Bob chooses a selection bit c and gets as output the bit bc.
Bananas in Pyjamas

Oblivious transfer

Alice should not learn c
Bob should not learn b1-c
Alice

Bob

Oblivious transfer

Only one item is returned to Bob.
Alice won't know what Bob has in his mind!
Oblivious transfer

Biometric data
personal data resulting from specific technical processing relating to the physical, physiological or behavioural characteristics of a natural person, which allow or confirm the unique identification of that natural person.
Biometric data

Fingerprint scanning

Iris recognition

Biometric data
Not 100% perfect
Every scan will return different results

Data representation


Hamming distance

Privacy-preserving biometric identification


- Anonymous Biometric access Control
- Biometric Anonymous Credentials
- Secure Biometric Database Intersection

Biometric identification

SHADE protocol

SHADE protocol

SHADE protocol




SHADE protocol

X | Y | X XOR Y |
---|---|---|
0 | 0 | 0 |
1 | 0 | 1 |
0 | 1 | 1 |
1 | 1 | 0 |

SHADE protocol

SHADE protocol


SHADE protocol

SHADE protocol


SHADE protocol

Where it could be applied
- Dating app where you only want to receive messages from one user.
- IoT devices that send sensitive data.
But, wait

To be aware of
- All this comes as extra traffic
- It could not be extended easily
Questions?

Behind the curtain: Oblivious Transfer
By Lyubomir Filipov
Behind the curtain: Oblivious Transfer
- 1,502