Verifiable Random Functions from Identity-Based Key Encapsulation

  • Authors:
  • Michel Abdalla;Dario Catalano;Dario Fiore

  • Affiliations:
  • CNRS---LIENS, Ecole Normale Supérieure, Paris, France;Dipartimento di Matematica e Informatica, Università di Catania, Italy;Dipartimento di Matematica e Informatica, Università di Catania, Italy

  • Venue:
  • EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a methodology to construct verifiable random functions from a class of identity based key encapsulation mechanisms (IB-KEM) that we call VRF suitable. Informally, an IB-KEM is VRF suitable if it provides what we call unique decryption (i.e. given a ciphertext C produced with respect to an identity ${\it{ID}}$, all the secret keys corresponding to identity ${\it{ID}}'$, decrypt to the same value, even if ${\it{ID}}\neq {\it{ID}}'$) and it satisfies an additional property that we call pseudorandom decapsulation. In a nutshell, pseudorandom decapsulation means that if one decrypts a ciphertext C , produced with respect to an identity ${\it{ID}}$, using the decryption key corresponding to any other identity ${\it{ID}}'$ the resulting value looks random to a polynomially bounded observer. Interestingly, we show that most known IB-KEMs already achieve pseudorandom decapsulation. Our construction is of interest both from a theoretical and a practical perspective. Indeed, apart from establishing a connection between two seemingly unrelated primitives, our methodology is direct in the sense that, in contrast to most previous constructions, it avoids the inefficient Goldreich-Levin hardcore bit transformation.