At the point of inception, our new cryptographic protocol was designed with an information theoretic secure algorithm which also included indistinguishability obfuscation. During our initial design an internal function z=y4 was used. For convenience we referred to this term as ZY4 and subsequently named our protocol after the term. Given the obvious similarity ZY4 has with the word "cipher", we pronounce our protocol "sigh-four."
Enjoy crumpets and cryptography? We are hiring in Vancouver and Toronto—get in touch.