International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 15 May 2014

John Almeida
ePrint Report ePrint Report
The present public key encryption in this paper involves the use of two values and they are the shadows values of a base value, and the base value is derived from the two shadows values. Whenever two integer values (first shadow value and second shadow value) are multiplied producing a product value and the value of one is subtracted from the product value a first base value is derived and it is the first base value of the two shadows values. The derived first base value may be divided by any divisor that it may be divided with which produces a positive integer quotient result and zero for the remainder. All values that are used in the division and the quotient result are bases values for the chosen shadow value-pair. Then one of the base values is chosen along with the two chosen shadows values and they comprise a triplet values that represent the public key to encrypt a message and the private key to decrypt the encrypted message.

Expand

Additional news items may be found on the IACR news page.