In traditional PKC, there are two mechanisms for generating and distributing the public keys throughout the system: Generated by a trust center (TC), which would then distribute them remotely over a secure channel to the users in the system or generated locally by the sender for every recipient. In Identity Based Encryption, an encryption key is created via an arbitrary string such as an email address or a telephone number. The Encryption key is constructed using the identity of the recipient and the public key of a trust center (TC). The entire security of the IBE schema relies on the security of the this public key, if a different key is introduced (e.g. spoofed, man-in-the-middle attack) the security of IBE is entirely compromised. Additionally for both PKC and IBE, a secure channel between a user and the public key is required for transmitting the private key on the joining the system, as one can imagine, this introduces an entire new set of challenges and complexities to the system.

CLAE is an asymmetric encryption schema that provides ultra security and the simplicity to share the secret keys with anyone, anywhere.

CLAE adds authentication to IBE, greatly simplifying the authentication process, and adds a level of agility to the entire system no other encryption schema can match. Public-keys can be locally generated using the identity strings, eliminating the need for the complexities of managing the public keys, hence certificate-less encryption. The sender can choose the TC to which the recipient has to identify itself, before any message is encrypted. If this TC does not meet the senders identification criteria, for any reason, the sender can choose another TC on the fly, without the end-user even being aware. This adds a level of security and agility to the system, unmatched by other encryption methodologies.

"CLAE achieves in a single cryptographic function all the ultimate functionalities that one can expect from a modern encryption mechanism. It supports authentication at no extra cost, and the certificate-less feature makes it easy to integrate in pre-existing applications. CLAE is basically what secure applications need, regardless of whether people are even aware that such technology exists and is available."

Pascal Paillier

Authentication of the sender is integrated into the deciphering process (the sender's identity can be checked locally using the private-key received from the trusted authority). Remember CLAE can protect and exchange the keys for any standard our clients decide to use. CLAE is an asymmetric encryption algorithm which enables our clients to use recognized symmetric encryption standards in conjunction with our asymmetric CLAE. This does away with digital certificates and greatly simplifies key management, is simpler to setup, maintain, and is computationally more efficient. CLAE is an asymmetric encryption algorithm which provides a level of security and simplicity beyond what any other encryption schema can offer.

"It seems quite obvious that CIPs cryptographic solution (CLAE) is built to meet the highest level of requirements in terms of security, efficiency, simplicity, and ease-of management. This was never possible in any other cryptographic solution. CIP is changing the industry of crypto-based security solutions, eliminating the need for many additional supporting certificatebased security components, and setting a higher standard level for any future coming security solution."

Hilal Houssain
Think of CLAE as a secret exchange protocol that can securely exchange any secret between two entities.