I'm exploring a unique scenario within the RSA framework, which does not align with typical schemes and thus, lacks readily available references.
Consider a standard RSA setup but with a twist:
$$ n = pq, \\ \varphi(n) = (p-1)(q-1), \\ e \cdot d \equiv 1 \mod \lambda(n) $$
In this variant, (n) is kept secret—yes, (n) is not disclosed—while (\phi(n)) is made public. Here's what is publicly known and what remains private:
$$ \text{Public Info} = (\varphi(n), e) \\ \text{Private Info} = (n, d, \lambda(n)) $$
Question 1: Can an adversary, given the public information, efficiently breach what is commonly referred to as "the factorization assumption"? This scenario slightly deviates from the standard definition of the factorization assumption, but the concept is similar.
Question 2: Given the public information, can the adversary deduce the value of (d) that was computed using (e) and (\lambda(n))?
Thank you everyone in advance for your answers.