. . . "The method of claim 8 wherein the multiplier is bR mod N, wherein R is the recryptor's public key, N is a modulus of R, and b is a random number that is less than N." .