The Cubic Public-Key Transformation

Subhash Kak
DOI: https://doi.org/10.48550/arXiv.cs/0602097
2006-06-10
Abstract:We propose the use of the cubic transformation for public-key applications and digital signatures. Transformations modulo a prime p or a composite n=pq, where p and q are primes, are used in such a fashion that each transformed value has only 3 roots that makes it a more efficient transformation than the squaring transformation of Rabin, which has 4 roots. Such a transformation, together with additional tag information, makes it possible to uniquely invert each transformed value. The method may be used for other exponents as well.
Cryptography and Security
What problem does this paper attempt to address?