Next Article in Journal
The Human Voice as a Digital Health Solution Leveraging Artificial Intelligence
Previous Article in Journal
Infra-3DRC-FusionNet: Deep Fusion of Roadside Mounted RGB Mono Camera and Three-Dimensional Automotive Radar for Traffic User Detection
Previous Article in Special Issue
Achieving High Efficiency and High Throughput in Erasure Code-Based Distributed Storage for Blockchain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography

1
Guangzhou Institute of Software, Guangzhou 510006, China
2
School of Computer Science and Engineering, Beihang University, Beijing 100191, China
3
School of Software Engineer, South China University of Technology, Guangzhou 511458, China
4
Guangzhou Zhongke Yide Technology Co., Ltd., Guangzhou 511458, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2025, 25(11), 3423; https://doi.org/10.3390/s25113423
Submission received: 28 March 2025 / Revised: 7 May 2025 / Accepted: 20 May 2025 / Published: 29 May 2025

Abstract

:
To address the growing threat of quantum computing to classical cryptographic primitives, this study introduces NTRU-MCF, a novel lattice-based signature scheme that integrates multidimensional lattice structures with fractional-order chaotic systems. By extending the NTRU framework to multidimensional polynomial rings, NTRU-MCF exponentially expands the private key search space, achieving a key space size 2 256 for dimensions m 2 and rendering brute-force attacks infeasible. By incorporating fractional-order chaotic masks generated via a hyperchaotic Lü system, the scheme introduces nonlinear randomness and robust resistance to physical attacks. Fractional-order chaotic masks, generated via a hyperchaotic Lü system validated through NIST SP 800-22 randomness tests, replace conventional pseudorandom number generators (PRNGs). The sensitivity to initial conditions ensures cryptographic unpredictability, while the use of a fractional-order L hyperchaotic system—instead of conventional pseudorandom number generators (PRNGs)—leverages multiple Lyapunov exponents and initial value sensitivity to embed physically unclonable properties into key generation, effectively mitigating side-channel analysis. Theoretical analysis shows that NTRU-MCF’s security reduces to the Ring Learning with Errors (RLWE) problem, offering superior quantum resistance compared to existing NTRU variants. While its computational and storage complexity suits high-security applications like military and financial systems, it is less suitable for resource-constrained devices. NTRU-MCF provides robust quantum resistance and side-channel defense, advancing PQC for classical computing environments.

1. Introduction

The rapid advancement of quantum computing poses a critical threat to classical public-key cryptosystems such as RSA and ECC. Shor’s algorithm [1], which solves integer factorization and discrete logarithm problems in polynomial time, has propelled post-quantum cryptography (PQC) to the forefront of cryptographic research. Among PQC candidates, lattice-based cryptography stands out due to its robustness against quantum attacks, relying on hard problems such as the Shortest Vector Problem (SVP) and Learning with Errors (LWE) [2]. Since Ajtai’s seminal work [3] established the link between lattice cryptography and worst-case complexity theory, lattice-based signature schemes have evolved through two primary paradigms. In the Hash-and-Sign paradigm, the GPV framework [4] introduced trapdoor preimage sampling for constructions based on the Small Integer Solution (SIS) problem. Subsequent optimizations include Alwen and Peikert’s Gaussian sampling [5], Micciancio and Peikert’s matrix trapdoor generation algorithm (MP12) [6], and the Ducas–Lyubashevsky–Prest scheme [7], which reduced trapdoor size by 40 % through ring algebraic structures and improved signature generation efficiency to 10 3 signatures per second [8].
Post-quantum cryptography (PQC) encompasses classical cryptographic schemes designed to resist attacks from both classical and quantum computers. Unlike quantum cryptography, which leverages quantum mechanical principles (e.g., quantum key distribution), PQC relies on mathematical problems—such as those in lattice-based cryptography—that are conjectured to be intractable even for quantum algorithms. Lattice-based schemes, including NTRU-MCF, operate entirely on classical computers, using problems like the Shortest Vector Problem (SVP) and Ring Learning with Errors (RLWE) to achieve security against quantum threats, such as Shor’s algorithm for factoring and discrete logarithms. This classical foundation ensures compatibility with existing computing infrastructure while addressing the growing threat of quantum computing. In the Fiat-Shamir paradigm, Lyubashevsky’s trapdoor-free construction [9] eliminated precomputation overhead but required rejection sampling. Notably, standardized schemes like Dilithium [10] and Falcon [11] have demonstrated superior performance in NIST evaluations. For instance, Falcon achieves public key sizes <1 KB and signature lengths <0.5 KB on general computing platforms through specialized NTRU lattice constructions [12]. Despite these advancements, existing lattice-based schemes remain vulnerable to quantum-assisted SVP solvers such as the Kannan-Helfrich algorithm [13] and face challenges in providing integrated defenses against physical attacks like side-channel analysis. Recent studies [14,15] indicate that increasing lattice dimensions exponentially amplifies SVP complexity, offering a promising avenue for enhanced quantum resistance.
However, current schemes often sacrifice computational efficiency and lack integrated designs that balance quantum resistance with robust physical attack defense. Furthermore, while the proliferation of IoT and real-time systems motivates the need for advanced cryptographic solutions, we note that the complexity and storage overhead of multidimensional lattice schemes such as NTRU-MCF are fundamentally unsuitable for severely resource-constrained or real-time embedded devices. Instead, our approach aims at high-assurance environments, such as critical infrastructure and defense, where security requirements outweigh resource limitations. In contrast, standardized schemes like Falcon and Dilithium, which offer compact key and signature sizes and high efficiency, remain preferable for mass-market and IoT deployment.
To address these limitations, this paper proposes NTRU-MCF, a novel post-quantum signature scheme combining multidimensional lattice structures and fractional-order chaotic systems, tailored for scenarios prioritizing maximum security over resource efficiency. By extending NTRU lattices to multidimensional polynomial rings, NTRU-MCF exponentially increases the private key search space, making brute-force attacks computationally infeasible and significantly elevating the complexity of lattice-based attacks, offering an estimated quantum resistance exceeding 2 256 for dimensions m 2 . This multidimensional extension directly enhances resistance to quantum SVP algorithms, where complexity grows superlinearly with dimension. Simultaneously, the integration of fractional-order chaotic systems, specifically leveraging the non-periodic dynamics and extreme sensitivity to initial conditions of hyperchaotic Lü systems, introduces strong nonlinear randomness. The cryptographic randomness of these chaotic sequences is validated through NIST SP 800-22 tests, ensuring their suitability for secure key generation and masking.
The main contributions of this paper are summarized as follows.
  • Multidimensional lattice extension: The one-dimensional NTRU lattice is extended to multidimensional polynomial rings, R = Z [ x 1 , . . . , x m ] / ( x 1 N 1 1 , . . . , x m N m 1 ) , leveraging the exponentially increasing complexity of solving SVP in high-dimensional lattices ( m 2 ) to provide enhanced resistance against both classical and quantum attacks. For m 2 , the key space size is theoretically 2 256 .
  • Chaos-enhanced randomness and side-channel security: Fractional-order logistic maps and Lü hyperchaotic systems are integrated into key generation and encryption mask generation. Their non-periodic dynamics and extreme initial condition sensitivity generate highly unpredictable sparse polynomial coefficients and masks, effectively replacing PRNGs to eliminate deterministic patterns and providing a strong defense against side-channel analysis.
  • Comprehensive security and performance analysis: The scheme’s security is formally shown to be reducible to the RLWE problem, demonstrating superior quantum resistance, an expanded key space, and enhanced side-channel defense compared to existing NTRU variants. Performance and storage efficiency are analyzed through theoretical complexity bounds, highlighting the trade-offs inherent in achieving higher security levels.
The remainder of this paper is organized as follows: Section 2 reviews related work; Section 3 formalizes the security model and assumptions; Section 4 details the multidimensional lattice construction, chaotic mask generation, and protocol workflow of NTRU-MCF; Section 5 provides security proofs based on lattice reduction attacks and quantum complexity theory; Section 6 evaluates performance and storage efficiency through theoretical analysis; and Section 7 concludes the paper and outlines future research directions.

2. Related Works

The NTRU cryptosystem, proposed by Hoffstein et al. in 1996 [12], relies on the SVP and Closest Vector Problem (CVP) in lattices. Early NTRU-based signature schemes, such as NSS [16], faced vulnerabilities to statistical attacks [17] and signature forgery [18]. Improved variants like NTRUSign (2003) [19] achieved secure signatures through parameter optimization but remained constrained by key size and computational efficiency [20]. The GPV framework [21] pioneered trapdoor sampling techniques for lattice signatures [22]. Subsequent advancements include Alwen and Peikert’s Gaussian sampling optimizations [23], MP12’s small random matrices [24], and Chen et al.’s approximate trapdoor generation algorithm [25], which reduced trapdoor dimensions by  50% under equivalent security levels [26]. The current leading schemes, Dilithium [10] and Falcon [11], prioritize practicality: Falcon generates >1000 signatures per second on standard hardware with compact keys. While highly efficient, these schemes primarily focus on provable security against mathematical attacks and often lack explicit, integrated mechanisms to counteract physical attacks such as side-channel analysis, which are particularly relevant in hardware implementations and embedded systems. This gap motivates the need for schemes like NTRU-MCF that build in side-channel resistance from the ground up.
Recent research has expanded NTRU’s utility in homomorphic encryption [27], blind signatures [28], and linkable ring signatures (LRSs). For example, Ye et al. [29] reduced LRS signature length from O(n log q) to O(n) while improving verification efficiency by 40%. In 2024, Kim et al. [30] combined NTRU-LRS with verifiable random functions (VRFs) for hybrid blockchain authentication, showcasing NTRU’s cross-domain potential. Advancements in trapdoor generation have further optimized NTRU signatures. Ducas et al. [31] combined NTRU lattice trapdoors with fast Fourier orthogonalization [32], tripling Gaussian sampling efficiency. Integration with secure multi-party computation (MPC) and blockchain technologies has also emerged, with Jiang et al. [33] developing an NTRU-MKFHE-based MPC protocol for blockchain, while Parthasarathy et al. [34] implemented a medical data-sharing system using NTRU signatures and MPC.
The application of chaotic systems in cryptography is a well-explored area, often leveraging their properties of sensitivity to initial conditions, unpredictability, and complex dynamics for tasks like pseudorandom number generation, image encryption, and secure communication. For instance, Yu et al. [35] explores a PRNG based on hyperchaotic systems. However, integrating chaotic systems directly into lattice-based schemes, particularly in the context of post-quantum signatures and side-channel resistance, remains a less explored domain. Existing chaotic cryptosystems often face challenges related to finite precision effects, small key space issues, and the lack of rigorous security proofs against dedicated cryptanalytic attacks. Our work differs by specifically employing fractional-order chaotic systems to enhance the randomness and unpredictability of critical components within a well-established lattice framework (NTRU), aiming to build resistance against both quantum and physical attacks without compromising the underlying lattice-based security guarantees. The use of fractional-order systems, with their potentially richer dynamics and higher complexity compared to integer-order systems, offers a distinct approach to generating the required cryptographic randomness for lattice-based constructions.

3. Safety Model

3.1. Safety Assumptions

The security of the proposed scheme relies on two foundational assumptions: (1) the computational intractability of problems in multidimensional lattices and (2) the unpredictability of fractional-order chaotic systems.

3.1.1. Computational Hardness in Multidimensional Lattices

A multidimensional polynomial ring framework R = Z [ x 1 , . . . , x m ] / ( x 1 N 1 1 , . . . , x m N m 1 ) significantly amplifies computational complexity compared to traditional one-dimensional counterparts (e.g., NTRU). The Approximate Shortest Vector Problem (Approx-SVP), which involves finding a vector v in lattice L ( R ) with length | v | γ · λ 1 ( L ) (where γ is a polynomial multiple), is a classic hard problem in cryptography. Specifically, attackers need to search for vectors meeting certain conditions in high-dimensional spaces, with the search complexity growing exponentially with the lattice dimension m. For multidimensional lattices L ( R ) with dimension m 3 and modulus q = 2048 , there are no known polynomial-time algorithms (including quantum algorithms) that can find vectors with length v γ · λ 1 ( L ) with probability ϵ > negl ( λ ) (where γ = poly ( n ) , and λ is the security parameter). Existing research indicates that the complexity of Approx-SVP for high-dimensional tensor product lattices has a superlinear relationship with dimension m. When m = 3 and N i = 256 , the quantum algorithm complexity lower bound is Ω ( 2 0.35 · m · N ) . As there are currently no effective quantum algorithms capable of solving the Approx-SVP problem in polynomial time, signature schemes based on multidimensional lattices theoretically offer resistance to quantum attacks.

3.1.2. Unpredictability of Fractional-Order Chaotic Systems

The fractional-order Lü-system-generated sequences are assumed to satisfy the following properties:
  • Initial value sensitivity: A minor deviation ( δ > 10 6 ) in the initial seed induces statistical independence in subsequent outputs. For the fractional-order Lü system, a slight change in the initial seed (e.g., δ > 10 6 ) will cause the sequence to become statistically independent after 𝒪 ( log ( 1 / δ ) ) steps. Even if an attacker obtains some sequence information, it will be difficult for them to deduce the initial seed.
  • Chaotic sequence randomness: Sequence generation depends on control parameters (e.g., a i , b i , c i , q i ) and initial seeds. The nonlinear dynamics of fractional-order systems preclude parameter or seed reconstruction from limited outputs. Given a discretization coefficient c o e f i , j { 1 , 0 , 1 } , recovering a i , b i , c i , q i or x 0 with non-negligible probability is computationally infeasible.

3.2. Security Analysis

Multidimensional lattice-based cryptography extends the NTRU protocol into higher-dimensional spaces, enhancing quantum resistance and security robustness. The framework comprises five core processes: key generation, encryption, decryption, signature generation, and verification, all underpinned by the hardness of lattice problems.
(1) Key generation
Parameter selection: polynomial degree, N, moduli, q (large) and p (small), and basis vectors, b 1 , b 1 , . . . , b d , in d-dimensional space.
Key derivation: the public key h x is computed as h ( x ) = p · g ( x ) · f 1 ( x ) mod q , where f x (private key) and g x (random polynomial) are small-norm polynomials.
(2) Encryption
A message, m ( x ) , is encoded as a multidimensional vector. Encryption involves selecting a random polynomial, r ( x ) , (bounded by p), and computing the following:
e ( x ) = r ( x ) · h ( x ) + m ( x ) mod q
where h ( x ) is a public parameter, r ( x ) is a random polynomial selected from a small modulus, p, and the ciphertext e ( x ) consists of two parts: one part is the product of the random polynomial and the public key, and the other part is the message polynomial.
(3) Decryption
During the decryption process, the private key polynomial f ( x ) is used to recover the message. Under the assumption that the received ciphertext is e ( x ) , the private key f ( x ) is used to calculate the intermediate value.
a ( x ) = e ( x ) · f ( x ) mod q
Then, a ( x ) is divided by p, and the modulus is taken to obtain the following:
b ( x ) = a ( x ) mod q
Finally, the plaintext message is recovered.
m ( x ) = f p 1 ( x ) · b ( x ) mod p
In this context, f p 1 ( x ) is the inverse of the private key polynomial f ( x ) modulo p.
(4) Signature generation
For message m ( x ) , compute its hash H ( m ( x ) ) , and then generate the signature:
s ( x ) = H ( m ( x ) ) · f ( x ) mod q
(5) Signature verification
Use the public key to verify the signature, and determine whether v ( x ) is equal to H ( m ( x ) ) · f ( x ) mod q . If they are equal, the signature is valid. The formula is as follows:
v ( x ) = s ( x ) · h ( x ) mod q
v ( x ) = ? H ( m ( x ) ) · f ( x ) ( mod q )
(6) Quantum resistance
Security hinges on the hardness of lattice problems (SVP/CVP), which remain intractable even for quantum computers. Thus, compared to number-theoretic cryptosystems (e.g., RSA and ECC), NTRU-based schemes offer superior post-quantum security.

3.3. Confidentiality Analysis

3.3.1. Public–Private Key Relationship Complexity

The relationship between the public key h and the private key f is as follows:
h = p f + g mod q
The solution of the inverse element of the private key f depends on the extended Euclidean algorithm, which has high computational complexity in the multidimensional polynomial ring. Attackers cannot effectively derive the private key f only through the public key h, thus ensuring the confidentiality of the private key.

3.3.2. Chaotic System Randomness

The private key f is generated via a fractional order chaotic system, and the chaotic sequence is defined via the following formula:
x n + 1 = x n · e α ( 1 x n ) · Γ ( 1 q ) k = 0 n ( 1 ) k Γ ( q + 1 ) k ! Γ ( q k + 1 ) x n k
The output of a chaotic system is non-periodic and sensitive to initial values. Even if an attacker obtains part of the output sequence, they still cannot predict the values of other sequences, ensuring the randomness and unpredictability of the key.

3.4. Unforgeability Analysis

3.4.1. Signature Security

The signature s is calculated through the following formula:
s = H ( m ) · f mod q
Since H ( m ) is the unique hash value of the message, and f is an unpredictable private key, an attacker cannot forge a legitimate signature. If an attacker attempts to forge a signature, s , they must meet the following conditions:
s H ( m ) · p mod q
However, in the case where the attacker does not know f, forging a signature is equivalent to solving the discrete logarithm problem or the SVP problem, which is not feasible under the existing computational model.

3.4.2. Verification Reliability

The process of verifying a signature is as follows:
v = s · h mod q
The verifier checks whether the following equation is valid:
v H ( m ) · p mod q
Any attempt to tamper with the signature s or the message m will result in a failed verification, thereby ensuring the non-forgeability of the signature.

3.5. Anonymity Analysis

3.5.1. Identity Obfuscation

Signatures depend solely on the private key f and the message m hash H ( m ) , with no identity-linked data in the signature itself. Attackers cannot infer the identity of the signatory by observing the signature. The initial value sensitivity and randomness of the fractional-order chaotic system further conceal the generation process of the signature, enhancing its anonymity.

3.5.2. Resistance to Linkage Attacks

High-dimensional chaotic seeds ensure distinct trajectories for different signers. Even with multiple signatures, adversaries cannot correlate them to a single entity due to the non-periodic and unpredictable nature of the chaotic sequences used in key generation.

3.6. Linkability Analysis

3.6.1. Signature Linkability

Identical messages signed by the same private key share a mathematical relationship through the hash function H ( m ) , enabling deterministic linkage. This property is crucial for applications requiring signature linkability, such as in some blockchain implementations.

3.6.2. Replay Attack Prevention

Since the signature s contains the message hash value H ( m ) , the signatures of different messages are independent of each other. Attackers cannot forge new messages using old signatures s, and the uniqueness and independence of signatures ensure the ineffectiveness of replay attacks. The scheme ensures that each signature is bound to its specific message, preventing unauthorized reuse.

4. Lattice-Based Cryptographic Signature Scheme with NTRU-MCF

The NTRU-MCF scheme, a lattice-based post-quantum cryptographic protocol, comprises three core algorithms detailed in Algorithms 1–3: key generation (Algorithm 1), encryption/decryption (Algorithm 2), and signature/verification (Algorithm 3). These algorithms form the complete framework for NTRU-MCF’s cryptographic operations, leveraging multidimensional lattice structures and fractional-order chaotic systems to achieve security reducible to the Ring Learning with Errors (RLWE) problem. Designed to run on classical computers, these algorithms are compatible with standard hardware and software environments, ensuring practical deployment. Their security against quantum attacks stems from the intractability of lattice problems like the shortest vector problem (SVP), which remain hard even for quantum algorithms, providing robust protection against quantum computing threats.

4.1. Extended Multidimensional Lattice Structure

Traditional NTRU employs a one-dimensional convolution polynomial ring. To enhance security, we extend this structure to a multidimensional lattice, where keys and message polynomials reside in a multivariate polynomial ring. Under this framework, key generation, encryption, and decryption operations are defined as follows:
R = Z [ x 1 , x 2 , , x m ] / ( x 1 N 1 1 , , x m N m 1 )
Let x 1 , x 2 , , x m denote independent variables, where m > 1 increases lattice complexity and resistance to quantum attacks. The private key f ( x 1 , , x m ) and public key h ( x 1 , , x m ) in this structure are generated as follows:
h ( x 1 , , x m ) = g ( x 1 , , x m ) · f 1 ( x 1 , , x m ) mod q

4.2. Fractional-Order Chaotic Systems

Traditional NTRU relies on pseudo-random number generators (PRNGs) for key generation, which exhibit periodicity and predictability risks. To address this limitation, we propose the integration of fractional-order chaotic systems. These systems leverage nonlinear dynamics, aperiodicity, and extreme sensitivity to initial conditions, thereby enhancing cryptographic security.

4.2.1. Fractional-Order Logistic Map

The fractional-order Logistic map is a fractional-order extension of the classic Logistic map, which is expressed as follows:
x n + 1 ( i ) = x n ( i ) · e α i ( 1 x n ( i ) )
where x n ( i ) is the state variable of the system, and α i is the control parameter that determines the chaotic behavior of the system.
Among them, x n ( i ) is the state variable of the system, and α i is the control parameter that determines the chaotic behavior of the system. e α i ( 1 x n ( i ) ) is an exponentially nonlinear term, which takes the form of an exponential function. As the parameter α i changes, the system will experience a transition from stable periodicity to chaos. Chaotic behavior is relatively simple, usually manifested as a single-peak mapping.
We propose using a discrete chaotic mapping described by a fractional difference equation, and the key generation formula is as follows:
x n + 1 = x n · e α ( 1 x n ) · Γ ( 1 q ) k = 0 n ( 1 ) k Γ ( q + 1 ) k ! Γ ( q k + 1 ) x n k
where α ( 0 , 4 ] ) is the chaos control parameter; when α > 3.2 , the system enters the chaotic state. q ( 0 , 1 ) is the order of the fractional order, and reducing q can enhance nonlinearity. Γ ( · ) is the Gamma function, which is used for fractional order difference calculation. The sequence xn takes values in the range of (0,1), and it has the properties of ergodicity and initial value sensitivity.

4.2.2. Fractional-Order Lü Hyperchaotic System

The fractional-order Lü hyperchaotic system is defined as a three-dimensional continuous system:
D q x = a ( y x ) + z D q y = c y x z D q z = x y b z
where D q denotes the Caputo fractional derivative, a , b , c are system parameters, and q is the fractional order, and q ( 0 , 1 ) (e.g., q = 0.9 ). The fractional-order Lü hyperchaotic system exhibits enhanced chaotic complexity characterized by hyperchaotic phenomena, manifested through the coexistence of multiple positive Lyapunov exponents. Its chaotic attractor demonstrates intricate topological features, typically manifesting as high-dimensional surfaces or fractal structures. The incorporation of fractional calculus through order parameter q amplifies both the system’s nonlinear complexity and trajectory unpredictability.

4.2.3. Randomness Validation and Finite Precision of Fractional-Order Chaotic Systems

To ensure the cryptographic suitability of the fractional-order Lü hyperchaotic system as a replacement for traditional PRNGs, we conducted statistical randomness tests using the NIST SP 800-22 test suite. A sequence of 10 6 bits was generated from the discretized output of the Lü system with parameters a = 36 , b = 3 , c = 20 , and q = 0.9 and initial conditions derived from a SHA-3 seed. We validated their output sequences using the NIST SP 800-22 statistical test suite. The test suite was applied to sequences generated via the fractional-order Lü system with double-precision floating-point arithmetic, typical of cryptographic implementations. All relevant tests—including frequency, block frequency, runs, and random excursions—were passed at a significance level of 0.01, indicating that the generated sequences exhibit no statistically significant deviation from uniform randomness. The detailed results are provided in Table 1.
However, it is important to acknowledge the impact of finite precision in practical implementations. Chaotic systems, when realized in digital hardware or software, are subject to rounding and quantization errors, which may introduce periodicity or degrade unpredictability over long sequences. To mitigate this, we (i) use sufficiently large precision (64-bit or higher), (ii) frequently refresh seeds using entropy sources, and (iii) limit the length of any single generated sequence for key material. Finite precision effects were specifically mitigated through careful parameter selection and high-precision arithmetic. The Lü system was implemented using 64-bit double-precision floating-point arithmetic, ensuring that the Lyapunov exponent ( λ 0.5 ) remains stable over 10 3 iterations. To further counter precision-related periodicity, we periodically reseed the system every 10 3 iterations using a SHA-3 hash of the current state concatenated with a counter. This approach maintains the aperiodicity and initial value sensitivity critical for cryptographic security, as validated through the divergence of trajectories for initial condition differences as small as 10 6 . These measures ensure that the chaotic sequences are both unpredictable and robust against finite precision limitations in practical deployments. Further, we recommend that implementations re-validate the randomness properties under the target hardware architecture to ensure the absence of hidden cycles or correlations. Thus, while fractional-order chaotic systems can serve as a strong entropy source, their cryptographic deployment must account for implementation-specific precision constraints.

4.2.4. Key Generation via Fractional-Order Chaos

(1) Multidimensional chaotic sequence generation.
Initialization: generate initial values ( x 0 ( 1 ) , x 0 ( 2 ) , , x 0 ( m ) ) = SHA - 3 ( seed ) using the SHA-3 hash of user input.
Iteration: for each variable, independently iterate the fractional-order Lü system. The formula is as follows:
D q x = a ( y x ) D q y = b x y x z D q z = x y c z
where x , y , z are the state variables of the system, a , b , c are the state variables of the system, D q represents the fractional order derivative, q is the fractional order, and the first 103 iterations are discarded to eliminate the transient state, generating a stable sequence  { x i , n } n = 1 L .
(2) Discretization and Polynomial Mapping Mapping continuous chaotic values to the integer domain:
coef i , j = β · x i , j mod 3
The limiting coefficient is {−1, 0, 1}, which satisfies the requirements of NTRU sparse polynomials.
Private key construction, combining chaotic sequences from various dimensions to generate a multivariable private key polynomial:
f ( x 1 , , x m ) = k 1 = 0 N 1 1 k m = 0 N m 1 coef k 1 , , k m · x 1 k 1 x m k m mod q
where the modulus q takes a prime number (such as q = 2048 ) to ensure reversibility.
(3) Public Key Select a sparse polynomial g ( x 1 , , x m ) generated via the chaotic system, and compute the following:
h ( x 1 , , x m ) = g ( x 1 , , x m ) · f 1 mod q
Here, f 1 is computed via the extended Euclidean algorithm in R q . For each variable, run the fractional order Lü hyperchaotic system and discretize its generated sequence into integer values, ultimately constructing the coefficients for generating the private key. Using the discretized results of the generated chaotic sequence, construct a multi-dimensional private key polynomial, and then calculate the public key.
The pseudo-code for the NTRU-MCF scheme’s key generation and public key computation is formalized in Algorithm 1. The GenerateChaosSequence() routine produces a chaotic trajectory via fractional-order dynamics, while DiscretizeChaosSequence() maps these continuous-valued outputs to discrete integer coefficients through modular arithmetic operations. These coefficients drive GeneratePrivateKey() to construct the private key f ( x 1 , , x m ) , which governs core cryptographic transformations during encryption/decryption.
The GeneratePublicKey() module derives the public key h ( x 1 , , x m ) = g ( x 1 , , x m ) · f 1 mod q , where g represents a randomly sampled polynomial. This asymmetric configuration ensures public accessibility for encryption while mandating strict confidentiality of the private key for authorized decryption.   
Algorithm 1: NTRU-MCF algorithm: key generation and public key calculation.
Sensors 25 03423 i001

4.3. Encryption and Decryption

Through the encryption process for plaintext, m, compute the ciphertext:
c = r · h + m mod q
Among them, the chaotic mask generation uses the fractional-order logistic map to generate random polynomials, and the calculation formula is as follows:
x n + 1 ( i ) = x n ( i ) · e α i ( 1 x n ( i ) )
Transform x n ( i ) into the coefficients {−1, 0, 1} of r through a modular mapping, and the sparsity of the mask r is related to the chaotic initial value, which avoids statistical attacks.
Through the decryption process, compute the intermediate polynomial:
a = f · c mod q
Simplify the polynomial:
a g · r + f · m mod q
Retrieve the plaintext from the ciphertext p:
m = a mod p
Algorithm 2: NTRU-MCF encryption and decryption pseudo-code.
Sensors 25 03423 i002
    The encryption and decryption process takes into account the encryption and decryption process of the NTRU-MCF algorithm. Encryption includes key generation, chaotic mapping, key expansion, and encryption operations, while decryption includes decoding chaotic mapping, key recovery, and decryption operations. The process is shown in Algorithm 2. In pseudo-code, the NTRU-MCF encryption operation includes generating a chaotic random mask, expanding the key, performing the main encryption operation, and finally encrypting the plaintext into ciphertext.
Chaos mask generation: Use the fractional-order logistic map to generate a random polynomial, r ( x 1 , , x m ) . By controlling the chaos parameters α i , different random mask sequences are generated, which increases the security of the encryption system.
In the encryption process, we implement encryption by multiplying a randomly generated mask, r, with the public key, h, and adding it to the plaintext, m. When decrypting, we first calculate the intermediate polynomial a and then simplify the intermediate result through the relationship between the public and private keys, f · h g mod q , and finally, we recover the plaintext via modulo p. In the pseudo-code, the ChaosMaskGeneration function generates the chaos mask used in encryption. The NTRUEncrypt function performs encryption, using the generated mask to encrypt the plaintext. The NTRUDecrypt function is used to decrypt the ciphertext and recover the plaintext.

4.4. Signature and Verification

In the signing process, we generate a signature for the message hash H ( m ) :
s = H ( m ) · f mod q
Verification is performed by calculating the following:
v = s · h mod q
We verify whether they are equal:
v H ( m ) · p mod q
The process is shown in Algorithm 3. In pseudo-code, the NTRUSign function accepts the message hash H ( m ) and the private key f, and it generates a signature, s, that is, by calculating s = H ( m ) · f mod q . The NTRUVerify function is used to verify the validity of the signature. It calculates v = s · h mod q and then checks v H ( m ) · p mod q , where p is a constant (usually 3) to ensure the recovery of the hash value.
In the main function, we first calculate the hash value H ( m ) of the message, and then we call NTRUSign to generate a signature. Later, when verifying the signature, we call NTRUVerify to check whether the signature is valid.

5. Security Analysis

5.1. Quantum Attacks

The multidimensional lattice structure of NTRU-MCF significantly amplifies the complexity of solving the shortest vector problem (SVP), a core hardness assumption underpinning its security. The lattice is defined over a multidimensional polynomial ring, R = Z [ x 1 , , x m ] / ( x 1 N 1 1 , , x m N m 1 ) , with the base space dimension calculated as follows:
D = i = 1 m ( N i + 1 )
For typical parameters, ( m 3 and N i 251 ), D scales exponentially with m, significantly increasing the complexity of SVP. In classical settings, the best-known algorithms for exact SVP, such as enumeration-based methods, have a time complexity of O ( 2 c D ) , where c 0.292 for large D using the BKZ algorithm with optimal block sizes. For approximate SVP (relevant to cryptographic attacks), the LLL and BKZ algorithms yield a complexity of
Time 1 ϵ · 2 0.184 · D · log 2 D
where ϵ is the success probability. For m = 3 , N i = 251 , D 251 3 1.58 × 10 7 , yielding a classical complexity lower bound of 2 138 (assuming ϵ = 0.01 ). In contrast, a one-dimensional lattice ( m = 1 , N = 251 ) has D = 251 , with a complexity of approximately 2 46 , demonstrating the exponential growth in attack difficulty.
In the quantum setting, the best-known SVP algorithms, such as those based on quantum sieving, achieve a time complexity of O ( 2 0.265 D ) , a modest improvement over classical O ( 2 0.292 D ) . For D 1.58 × 10 7 , the quantum complexity is approximately 2 4.2 × 10 6 , far exceeding the one-dimensional case ( D = 251 complexity 2 66 ). This super-exponential increase arises because multidimensional lattices introduce a tensor product structure, amplifying the number of lattice points and the geometric complexity of finding short vectors. No known quantum algorithm, including adaptations of Kannan–Helfrich or Schnorr–Euchner enumeration, solves SVP in polynomial time for such high dimensions. Thus, NTRU-MCF’s multidimensional structure ensures robust quantum resistance, with attack complexities well beyond current and foreseeable computational capabilities.    
Algorithm 3: NTRU-MCF signature and verification pseudo-code.
Sensors 25 03423 i003

5.2. Anti-Counterfeiting Attack

The security of the signature scheme is based on the intractability of the inverse elements of polynomials in a ring. Suppose an attacker attempts to forge a signature, e, such that
s · h H ( m ) · p mod q
Substituting h = g · f 1 mod q , we get the following:
s · g H ( m ) · p · f mod q
If the attacker does not know f and g, they need to solve the following equations simultaneously:
s H ( m ) · f mod q f · g H ( m ) · p · f mod q
This is equivalent to finding f in the ring R q that satisfies f · g H ( m ) · p · f mod q . This problem can be reduced to the Ring-LWE problem, and its difficulty still holds in the quantum computing model. Specifically, if there is a forgery attack, the Ring-LWE problem can be solved in polynomial time, which contradicts the known difficulty assumptions.

5.3. Side-Channel Attacks

The fractional order chaotic system resists side-channel attacks through initial value sensitivity and parameter randomization. Given the initial conditions x 0 and x 0 = x 0 + Δ , after n iterations, the state difference is as follows.
The distance between x n and x n is approximately equal to Δ times e λ n , where Δ is a constant, and λ is a parameter.
x n x n Δ · e λ n
where λ > 0 is the largest Lyapunov exponent (the typical value for a fractional-order Lü system is λ 0.5 ). When n = 10 3 , the difference amplifies to the following.
The difference between x and x is approximately 10 14 times, which equals approximately 10 103 .
x n x n 10 14 · e 0.5 · 10 3 10 103
The key factor generated at this time has a Hamming distance of more than 0.49, which prevents side channels from recovering the initial conditions through minor leaks.

6. Performance Analysis

The high computational and storage complexity of NTRU-MCF, resulting from the exponential scaling with dimension mmm, precludes its use in low-power or real-time systems. Instead, the scheme targets scenarios where maximum security and resistance to quantum/physical attacks override performance considerations.

6.1. Computational Complexity

In the key generation phase of the NTRU-MCF algorithm, each iteration of the fractional order Lü hyperchaotic system involves O ( 1 ) basic operations (addition and multiplication). Under the assumption that each dimension requires L iterations, the total iteration number is. Therefore, the time complexity of generating a chaotic sequence is O ( m · L ) , the complexity of a single dimension is O ( N l o g N ) , and the complexity of m dimensions is O ( m N l o g N ) .
The construction of the private key polynomial f ( x 1 , , x m ) and the public key h ( x 1 , , x m ) involves the coefficient mapping of sparse polynomials and modular operations. In multidimensional format, the complexity of computing polynomial multiplication and inverse elements is reduced from the direct calculation of O ( N 2 m ) to O ( m N l o g N ) using multidimensional FFT. The overall complexity is O ( m N l o g N ) + O ( m N m l o g N ) = O ( m N m l o g N ) . When the dimension is simplified, and m = 2 , the complexity degenerates to O ( N 2 l o g N ) .
In the verification process, we only need to calculate the sparse polynomial product of m dimensions (with coefficients {−1,0,1}), and the complexity is O ( m N 2 ) . The complexity of hash calculation is O ( N m ) , but after sparsity optimization, it becomes O ( N 2 ) . The verification complexity is O ( m N 2 + N 2 ) = O ( m N 2 ) .
The computational complexity of generating a chaotic mask in the encryption process is the same as that of generating a signature, which is O ( m N l o g N ) . In multidimensional format, the computational complexity of polynomial multiplication and inverse elements is as follows: using multidimensional FFT to optimize the complexity of polynomial multiplication, reducing it from O ( N 2 m ) in direct calculation to O ( m N l o g N ) . Therefore, the total complexity is O ( m N l o g N ) + O ( m N m l o g N ) = O ( m N m l o g N ) . When m = 2, the complexity is O ( m N 2 l o g N ) .
In the decryption phase, the sparsity of the private key f (with coefficients {−1,0,1}) reduces the multiplication complexity to O ( m N 2 ) . The complexity of modular reduction and plaintext recovery is O ( N 2 ) . Therefore, the total complexity is O ( m N 2 ) + O ( N 2 ) = O ( m N 2 ) .
The time complexity comparison of NTRU-MCF, Dilithium-III, and Falcon is shown in Table 2. Although NTRU-MCF is based on a multidimensional lattice (m = 2 dimensions) and uses the Fast Fourier Transform (FFT) to optimize multidimensional polynomial multiplication, its complexity is significantly higher than that of other schemes due to the expansion of dimensions. The Dilithium algorithm is based on the Modular Learning with Error (MLWE) problem, and its complexity is quadratic (O(n2)). The Falcon algorithm is based on the NTRU lattice and uses the Fast Number Theoretic Transform (NTT) to accelerate polynomial multiplication, with a complexity of linear logarithmic (O(nlogn)), making it the most efficient. NTRU-MCF is suitable for high-security scenarios (such as military communication), and its multi-dimensional structure enhances its resistance to quantum attacks, but it requires sacrificing efficiency and storage overhead.

6.2. Space Complexity

The key and signature of the NTRU-MCF algorithm are both stored as multidimensional polynomials, defined in the ring. Its storage overhead is determined by the number of dimensions, m, the degree of the univariate polynomial, N, and the number of modulus bits logq.
In calculating the public key space complexity, a multi-dimensional polynomial h R q , which contains N m coefficients, each of which occupies l o g q bits, so the public key complexity is O ( N m · l o g q ) . Calculating the private key space complexity involves a sparse polynomial f R , whose coefficients are limited to {−1,0,1}, but when storing, we still need to keep the mod q value, so the private key space complexity is O ( N m · l o g q ) . Calculating the signature space complexity involves a multi-dimensional polynomial s R q , whose structure is the same as the public key, and the space complexity is O ( N m · l o g q ) .
The comparison of the spatial complexity of NTRU-MCF, Dilithium-III, and Falcon-512 is shown in Table 3. From the table, we can see that the storage overhead of the NTRU-MCF algorithm increases linearly with the product of dimensions and the modulus logq, which leads to a large storage overhead. Especially in high-dimensional scenarios, the storage demand increases exponentially with the dimension and period.
The Dilithium-III algorithm has moderate storage requirements, which are related to the dimension and modulus of the lattice matrix. The public key and signature contain polynomial matrices, and the storage overhead is relatively high but still in the KB level, which is suitable for general application scenarios. The Falcon-512 algorithm uses a tree structure to compress keys and signatures, and through compact lattice structure design and FFT optimization, the storage overhead is relatively small, especially suitable for devices with limited storage resources.

6.3. Practical Deployment Considerations

The multidimensional lattice structure of NTRU-MCF, while significantly enhancing quantum resistance, introduces substantial computational and storage overheads, as shown in Table 1 and Table 2. For instance, with m = 2 , N = 256 , and log q = 11 , the public key size is approximately O ( 256 2 · 11 ) 720 KB, and signatures are similarly large, contrasting sharply with Falcon-512’s compact public keys (<1 KB) and signatures (<0.5 KB). This overhead renders NTRU-MCF less suitable for resource-constrained environments like IoT devices, where lightweight schemes like Falcon are preferable due to their optimized NTT-based polynomial multiplication and compact trapdoor designs.
However, NTRU-MCF’s design prioritizes high-security applications, such as military communications, financial systems, or blockchain-based authentication, where computational resources are less constrained, and robust quantum resistance and side-channel protection are paramount. The exponential increase in SVP complexity (Equation (31)) and the chaotic system’s resistance to side-channel attacks (Equation (36)) make NTRU-MCF particularly advantageous in these contexts. Future optimizations, such as sparse polynomial compression or adaptive dimension scaling, could bridge the gap for broader applicability, but the current scheme is best suited for scenarios where security outweighs efficiency concerns.

7. Conclusions and Future Works

This work has proposed a lattice-based signature scheme leveraging multidimensional lattices to expand the private key search space and resist brute-force attacks. Notably, the SVP complexity grows exponentially with dimensions, while fractional-order chaotic systems enhance randomness via Lyapunov instability. Compared to Dilithium and Falcon, NTRU-MCF offers superior quantum resistance but sacrifices efficiency, necessitating future research on reducing communication overhead. Future directions include dynamic coupling between chaotic parameters and lattice dimensions, as well as engineering optimizations for real-world deployment.
Future research will investigate polynomial compression techniques and dynamic dimension reduction to make NTRU-MCF viable for resource-constrained IoT deployments while preserving its high-security guarantees.

Author Contributions

Conceptualization, R.W. and B.Y.; methodology, R.W. and B.Y.; software, and B.Y.; validation, R.W., B.Y., M.Y., and Y.L.; formal analysis, R.W. and B.Y.; investigation, M.Y.; resources, B.Y.; data curation, Y.L.; writing—original draft preparation, R.W. and B.Y.; writing—review and editing, M.Y. and Y.L.; visualization, R.W.; supervision, M.Y.; project administration, Y.L.; funding acquisition, Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Special Funding for the “Case-by-Case Introduction of Top Talent (Teams)” Program in Yantai.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

Author Yin Li was employed by the company Guangzhou Zhongke Yide Technology Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 1997, 26, 1484–1509. [Google Scholar] [CrossRef]
  2. Chen, L.; Jordan, S.P.; Liu, Y.K.; Moody, D.; Peralta, R.; Perlner, R.; Smith-Tone, D. Report on Post-Quantum Cryptography; US Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016.
  3. Ajtai, M. Generating Hard Instances of Lattice Problems (Extended Abstract). In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; pp. 99–108. [Google Scholar]
  4. Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada, 17–20 May 2008; pp. 197–206. [Google Scholar]
  5. Alwen, J.; Peikert, C. Generating Shorter Bases for Hard Random Lattices. Theory Comput. Syst. 2011, 48, 535–553. [Google Scholar] [CrossRef]
  6. Micciancio, D.; Peikert, C. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. In Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; pp. 700–718. [Google Scholar]
  7. Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Seiler, G.; Stehlé, D. CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018, 2018, 238–268. [Google Scholar] [CrossRef]
  8. Falcon: Fast-Fourier Lattice-Based Compact Signatures Over NTRU. 2024. Available online: https://csrc.nist.gov/projects/post-quantum-cryptography/round-3-submissions (accessed on 20 October 2024).
  9. Lyubashevsky, V. Lattice Signatures without Trapdoors. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; pp. 738–755. [Google Scholar]
  10. Laarhoven, T.; Mosca, M.; Van De Pol, J. Solving the shortest vector problem in lattices faster using quantum search. In Proceedings of the Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013, Limoges, France, 4–7 June 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 83–101. [Google Scholar]
  11. Doriguello, J.F.; Giapitzakis, G.; Luongo, A.; Morolia, A. On the practicality of quantum sieving algorithms for the shortest vector problem. arXiv 2024, arXiv:2410.13759. [Google Scholar]
  12. Certry, C.; Szydlo, M. Cryptanalysis of the revised NTRU signature scheme. In Advances in Cryptology-Eurocrypt’02 Proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10–14 May 2020; Springer: Berlin, Germany, 2002; pp. 299–320. [Google Scholar]
  13. Chailloux, A.; Loyer, J. Lattice sieving via quantum random walks. In Proceedings of the Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 6–10 December 2021; Proceedings, Part IV. Springer International Publishing: Berlin/Heidelberg, Germany, 2021; pp. 63–91. [Google Scholar]
  14. Hoffstein, J.; Pipher, J.; Silverman, J.H. NTRU: A ring-based public key cryptosystem. In Proceedings of the International Algorithmic Number Theory Symposium, Portland, OR, USA, 21–25 June 1998; Springer: Berlin, Germany, 1998; pp. 267–268. [Google Scholar]
  15. Mironor, I. A note on cryptanalysis of the preliminary version of the NTRU Signature scheme. IACR Cryptol. ePrint Arch. 2001, 2001, 1–6. [Google Scholar]
  16. Hoffstein, J.; Pipher, J.; Silverman, J.H.; Whyte, W. NTRU Sign: Digital signatures using the NTRU lattice. In Proceedings of the CTRSA’03, San Francisco, CA, USA, 13–17 April 2003; LNCS: San Francisco, CA, USA, 2003; pp. 122–140. [Google Scholar]
  17. Jakobsson, M. Blackmailing using undeniable signatures. In Workshop on the Theory and Application of Cryptographic Techniques; Springer: Berlin, Germany, 1994; pp. 425–427. [Google Scholar]
  18. Bhaskar, R.; Herranz, J.; Laguillaumie, F. Aggregate designated verifier signatures and application to secure routing. Int. J. Secur. Netw. 2007, 2, 192–201. [Google Scholar] [CrossRef]
  19. Hu, X.; Zhang, X.; Ma, C.; Xu, H.; Wang, J.; Tan, W. A designated verifier signature scheme with undeniable property in the random oracle. In Proceedings of the 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 26–28 August 2016; IEEE: New York, NY, USA, 2016; pp. 960–963. [Google Scholar]
  20. Huang, X.; Susilo, W.; Zhang, F. Short designated verifier signature scheme and its identity-based variant. Int. J. Netw. Secur. 2008, 6, 82–93. [Google Scholar]
  21. Wang, G. An Attack on Not-Interactive Designated Verifier Proofs for Undeniable Signatures. Cryptology ePrint Archive. 2003. Available online: http://eprint.iacr.org/2003/243 (accessed on 20 October 2024).
  22. Parthasarathy, S.; Harikrishnan, A.; Narayanan, G.; Lohith, J.J.; Singh, K. Secure distributed medical record storage using blockchain and emergency sharing using multi-party computation. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021; pp. 1–5. [Google Scholar]
  23. Zhang, Z.; Chen, C.; Hoffstein, J. pqNTRUSign; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017.
  24. Prest, T.; Fouque, P.A.; Hoffstein, J. Falcon; Technical Report; National Institute of Standards and Technolog: Gaithersburg, MD, USA, 2017.
  25. He, J.; Zhang, Z. Research on Encryption and Signature Algorithms Based on NTRU. J. Inf. Secur. 2019, 4, 29–36. [Google Scholar]
  26. Zyskind, G.; Nathan, O.; Pentland, A. Enigma: Decentralized Computation Platform With Guaranteed Privacy. In New Solutions for Cybersecurity; MIT Press: Cambridge, MA, USA, 2018. [Google Scholar]
  27. Zhang, J.; Cao, Z.; Xu, Q.; Song, X. Efficient identity baseline homomorphic signature scheme on NTRU lattice. Telecommun. Technol. 2020, 60, 502–510. [Google Scholar]
  28. Chongchitmate, W.; Ostrovsky, R. Circuit-private multi-key FHE. In Proceedings of the IACR International Workshop on Public Key Cryptography, Amsterdam, The Netherlands, 28–31 March 2017; Springer: Berlin, Germany, 2017; pp. 241–270. [Google Scholar]
  29. Ling, S.; Nguyen, K.; Wang, H.; Xu, Y. Lattice-based groupsignatures: Achieving full dynamicity with ease. In Proceedings of the International Conference on Applied Cryptography and Network Security, Kanazawa, Japan, 10–12 July 2017; Springer: Cham, Switzerland, 2017; pp. 293–312. [Google Scholar]
  30. Lu, X.; Au, M.H.; Zhang, Z. Raptor: A practical lattice based (linkable) ring signature. In Proceedings of the International Conference on Applied Cryptography and Network Security, Bogota, Colombia, 5–7 June 2019; pp. 110–130. [Google Scholar]
  31. Ye, Q.; Wang, M.; Meng, H.; Xia, F.; Yan, X. Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity. Comput. Intell. Neurosci. 2022, 2022, 8431874. [Google Scholar] [CrossRef] [PubMed]
  32. Alberto Torres, W.A.; Steinfield, R.; Sakzad, A.; Liu, J.K.; Kuchta, V.; Bhattacharjee, N.; Au, M.H.; Cheng, J. Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1. 0). In Information Security and Privacy, Proceedings of the 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, 11–13 July 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 558–576. [Google Scholar]
  33. Kim, B.G.; Wong, D.; Yang, Y.S. Quantum-Secure Hybrid Blockchain System for DID-based Verifiable Random Function with NTRU Linkable Ring Signature. Int. J. Cryptogr. Inf. Secur. 2024, 13, 1–25. [Google Scholar] [CrossRef]
  34. Saeednia, S.; Kremer, S.; Markowitch, O. An efficient strong designated verifier signature scheme. In Proceedings of the 6th International Conference on Information Security and Cryptology, Seoul, Republic of Korea, 27–28 November 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 40–54. [Google Scholar]
  35. Yu, F.; Li, L.; He, B.; Liu, L.; Qian, S.; Huang, Y.; Cai, S.; Song, Y.; Tang, Q.; Wan, Q.; et al. Design and FPGA implementation of a pseudorandom number generator based on a four-wing memristive hyperchaotic system and Bernoulli map. IEEE Access 2019, 7, 181884–181898. [Google Scholar] [CrossRef]
Table 1. NIST SP 800-22 Statistical Test Results.
Table 1. NIST SP 800-22 Statistical Test Results.
Test CategoryFractional-Order Lü Hyperchaotic Pass RatePRNG Pass Rate
Frequency100 %100 %
Block Frequency100 %100 %
Cumulative Sums100 %100 %
Runs100 %100 %
Non-Overlapping Templates100 %98.02 %
Overlapping Templates100 %100 %
Universal Statistical100 %100 %
Random Excursions100 %100 %
Linear Complexity100 %100 %
Table 2. Comparison of the time complexity of NTRU-MCF, Dilithium-III, and Falcon-512.
Table 2. Comparison of the time complexity of NTRU-MCF, Dilithium-III, and Falcon-512.
ProcessNTRU-MCFDilithium-IIIFalcon-512
Signature Generation O ( m n 2 log n ) O ( k n log q ) O ( n log n )
Signature Verification O ( m n 2 ) O ( k n ) O ( n )
Encryption O ( m n 2 log n ) --
Decryption O ( m n 2 ) --
Table 3. Comparison of the spatial complexity of NTRU-MCF with Dilithium-III and Falcon-512.
Table 3. Comparison of the spatial complexity of NTRU-MCF with Dilithium-III and Falcon-512.
ComplexityNTRU-MCFDilithium-IIIFalcon-512
Public key O ( N m log q ) O ( k l n log q ) O ( N m log q )
Private key O ( N m log q ) O ( ( k + l ) l n log q ) O ( l n log q + λ )
Signature O ( N m log q ) O ( n log n ) O ( n η )
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, R.; Yuan, B.; Yuan, M.; Li, Y. NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography. Sensors 2025, 25, 3423. https://doi.org/10.3390/s25113423

AMA Style

Wang R, Yuan B, Yuan M, Li Y. NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography. Sensors. 2025; 25(11):3423. https://doi.org/10.3390/s25113423

Chicago/Turabian Style

Wang, Rong, Bo Yuan, Minfu Yuan, and Yin Li. 2025. "NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography" Sensors 25, no. 11: 3423. https://doi.org/10.3390/s25113423

APA Style

Wang, R., Yuan, B., Yuan, M., & Li, Y. (2025). NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography. Sensors, 25(11), 3423. https://doi.org/10.3390/s25113423

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop