LINEture Cryptosystem
- LINEture is a post-quantum digital signature scheme based on binary matrix algebra and secret-shared factorable permutations for compact key and signature generation.
- It utilizes a layered construction with message hashing, randomized session keys, and zero-knowledge protocols to ensure secure and efficient identity verification.
- The scheme achieves practical efficiency with significantly smaller keys and signatures compared to conventional NIST candidates, although its non-standard design calls for further cryptanalysis.
The LINEture cryptosystem is a digital signature scheme characterized by compact keys and signatures, utilizing matrix algebra over the field and novel security mechanisms based on brute-force intractability. Unlike conventional cryptography predicated on computationally hard problems, LINEture achieves post-quantum security through algebraic indeterminacy, secret-shared factorable permutations, randomized session keys, and zero-knowledge authentication protocols (Khalimov et al., 11 Jan 2026, Kotukh et al., 6 Jan 2026).
1. Algebraic Foundation and Core Construction
LINEture operates on vectors and matrices over the binary field , with the principal objects being -bit words and permutation matrices of size . Message signatures are constructed by associating each -bit word to an element of an elementary abelian $2$-group. A public factorable permutation is given as:
where are blocks encoding basis-vectors. The internal factorization of is concealed via a sequence of six secret homomorphic matrix transformations: basis permutation, block shuffle, add-vector, polynomial multiplication, non-singular matrix multiplication, and matrix addition. The resulting matrix’s factorization remains infeasible to recover except by brute-force, creating the cryptosystem’s fundamental hardness (Khalimov et al., 11 Jan 2026).
The shared secret for signature generation and verification is encoded as a stack of permutation matrices , synthesized homomorphically by combining a public key matrix with a session-key matrix :
(Eq. 1).
The indeterminacy of recovering from (except for known secret parameters) reduces adversarial attacks to brute-force search over secret matrix blocks.
2. Key Generation Process
Key generation proceeds as follows:
- Master Key Construction:
- Select a random non-singular matrix and form the private block matrix :
Public Substitution Blocks:
- For each , generate matrices , , , and of prescribed dimensions.
- Assemble block matrices to form .
- Key Publishing:
- The public key is , while master key components , , , are retained privately (Khalimov et al., 11 Jan 2026).
3. Signature Generation Algorithm
Signature generation leverages message-dependent randomization and session keys as follows:
- Message Hashing:
- Hash the message to obtain , viewed as words of bits.
- Session Key Construction and Nonces:
- Generate random nonces and an identity-proof nonce , then compute and .
- Derive each from as per prespecified rules with scalar transformations .
- Shared-Secret Computation:
- Calculate for two choices of to enable a zero-knowledge proof of secret knowledge.
- Verify for identity proof.
- Inverse Substitution:
- Compute , achieved by block-diagonal inversion into independent inverses.
- Signature Formation:
- Output (Khalimov et al., 11 Jan 2026).
4. Signature Verification Algorithm
Verification uses only public data and the received signature:
- Hash Re-Evaluation:
- Recompute from nonces and message.
- Session Key Reconstruction:
- Derive for exactly as performed by the signer.
- Identity Proof Validation:
- For any , confirm ; this demonstrates knowledge of the private decomposition.
- Message Hash Reconstruction:
- Compute for the reconstructed shared-secret .
- Acceptance Condition:
- Accept the signature if and only if (Khalimov et al., 11 Jan 2026).
5. Security Properties and Parameter Influence
Security relies on algebraic indeterminacy created by the incomplete definition of the matrix inversion underlying session keys. The adversarial effort to recover the secret matrix is bounded by brute-force complexity , with denoting word size and the number of matrix subblocks. Collision resistance in substitution and hash-forgery is bounded by and respectively. The effective security is the minimum of these quantities; parameter recommendations for 128/192/256-bit classical security levels are prescribed explicitly:
- 128-bit security: , , ,
- 192-bit security: , , ,
- 256-bit security: , , (Khalimov et al., 11 Jan 2026)
A deeper parameter analysis reveals a dualistic role for the vector dimension . While originally considered to affect only signature length, also establishes a "verification barrier" of bits in the context of zero-knowledge identity proof. For , the security contribution from this barrier dominates, enforcing a parameter selection rule for maximal cryptographic efficiency (Kotukh et al., 6 Jan 2026).
6. Performance, Practicality, and Comparative Evaluation
Key and signature sizes are notably compact. For typical NIST Level 1 parameters (, , ):
- Public key: 1536 bytes
- Signature (with ): 144 bytes
- All signature and verification operations reduce to binary-matrix multiplication and inversion ( bit operations), compatible with a few thousand machine cycles for practical values (Khalimov et al., 11 Jan 2026).
A comparative summary versus other NIST-PQC candidates is shown below:
| Scheme | Security (bits) | PubKey size | Sig size |
|---|---|---|---|
| LINEture (8,16,3) | 128 | ~50 B | ~100 B |
| CRYSTALS-Dilithium-II | 128 | ~1300 B | ~2420 B |
| Falcon-512 | 128 | ~897 B | ~666 B |
| SPHINCS+ | 128 | ~32 B | ~8000 B |
This suggests LINEture offers key and signature sizes substantially smaller than lattice-based or hash-based alternatives, but its algebraic structure is distinct from NIST standards and lacks a tight reduction proof. The trade-off is between unconventional algebraic design and practical compactness (Kotukh et al., 6 Jan 2026).
7. Context, Implications, and Limitations
LINEture advances a non-standard approach to post-quantum digital signatures, with security based on secret-shared permutations and brute-force resistance rather than assumed computational hardness. The scheme's security and efficiency directly reflect choice of , with parameter tuning ensuring classical security thresholds. The absence of a tight reduction and limited public cryptanalysis to date mark open directions for further investigation and scrutiny. A plausible implication is that ongoing community cryptanalysis and standardized benchmark comparisons will be essential for establishing long-term confidence in the scheme's resilience and practicality (Khalimov et al., 11 Jan 2026, Kotukh et al., 6 Jan 2026).