Bob Investigates Wendy and Needs to Ask Alice
1-to-N Oblivious Transfer
Published in
5 min readOct 23, 2022
Preface
I was asked by someone about how I got into cryptography, and the answer was rather easy for me. It all happened in 2009 when my Ph.D. student (Zibi Kwecka) outlined a method of using commutative encryption for oblivious transfer [1]: