Photo by Joshua Hoehne on Unsplash

Building a More Trusted Data World: Authenticated ElGamal Encryption using Kryptology

And Just Ready for Homomorphic Encryption

--

Let’s look at the beauty of combining public-key encryption, symmetric key encryption and authenticated ciphertexts.

As an active researcher, the first thing I do when an important new research-focused software library comes along is to break it down and understand its operation. This will prove the principles and also verify the methods. And, so Kryptology — created by Coinbase — has come along and it promises a whole new privacy-preserving world, with homomorphic encryption, Shamir Secret Shares, blinded commitments and ultra-fast code. One of the key elements in the library is the usage of authenticated encryption (AE) and homomorphic encryption. This is achieved through the ElGamal encryption method using elliptic curves. So let’s give it a try.

Initially, Alice will generate a private key (x) and a public key of:

Y=x.G

and where G is the base point on the curve. She can share this public key (Y) with Bob. When Bob wants to encrypt something for Alice, he generates a random value (r) and then computes:

C1=r.G

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.