Obfuscation of Pseudo-Deterministic Quantum Circuits
- URL: http://arxiv.org/abs/2302.11083v3
- Date: Sun, 19 Nov 2023 23:43:04 GMT
- Title: Obfuscation of Pseudo-Deterministic Quantum Circuits
- Authors: James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa
- Abstract summary: We show how to obfuscate pseudo-deterministic quantum circuits in the classical oracle model.
Our obfuscator outputs a quantum state $ketwidetildeQ$ repeatedly on arbitrary inputs.
- Score: 14.026980555435841
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We show how to obfuscate pseudo-deterministic quantum circuits in the
classical oracle model, assuming the quantum hardness of learning with errors.
Given the classical description of a quantum circuit $Q$, our obfuscator
outputs a quantum state $\ket{\widetilde{Q}}$ that can be used to evaluate $Q$
repeatedly on arbitrary inputs.
Instantiating the classical oracle using any candidate post-quantum
indistinguishability obfuscator gives us the first candidate construction of
indistinguishability obfuscation for all polynomial-size pseudo-deterministic
quantum circuits. In particular, our scheme is the first candidate obfuscator
for a class of circuits that is powerful enough to implement Shor's algorithm
(SICOMP 1997).
Our approach follows Bartusek and Malavolta (ITCS 2022), who obfuscate
\emph{null} quantum circuits by obfuscating the verifier of an appropriate
classical verification of quantum computation (CVQC) scheme. We go beyond null
circuits by constructing a publicly-verifiable CVQC scheme for quantum
\emph{partitioning} circuits, which can be used to verify the evaluation
procedure of Mahadev's quantum fully-homomorphic encryption scheme (FOCS 2018).
We achieve this by upgrading the one-time secure scheme of Bartusek (TCC 2021)
to a fully reusable scheme, via a publicly-decodable \emph{Pauli functional
commitment}, which we formally define and construct in this work. This
commitment scheme, which satisfies a notion of binding against committers that
can access the receiver's standard and Hadamard basis decoding functionalities,
is constructed by building on techniques of Amos, Georgiou, Kiayias, and
Zhandry (STOC 2020) introduced in the context of equivocal but
collision-resistant hash functions.
Related papers
- Quantum State Obfuscation from Classical Oracles [18.878095837031292]
A major unresolved question in quantum cryptography is whether it is possible to obfuscate arbitrary quantum computation.
We develop a new array of techniques that we use to construct a quantum state obfuscator.
arXiv Detail & Related papers (2024-01-18T18:42:28Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - An Optimized Quantum Implementation of ISD on Scalable Quantum Resources [2.274915755738124]
We show that Prange's ISD algorithm can be implemented rather efficiently on a quantum computer.
We leverage the idea of classical co-processors to design hybrid classical-quantum trade-offs.
arXiv Detail & Related papers (2021-12-12T06:01:10Z) - Depth-efficient proofs of quantumness [77.34726150561087]
A proof of quantumness is a type of challenge-response protocol in which a classical verifier can efficiently certify quantum advantage of an untrusted prover.
In this paper, we give two proof of quantumness constructions in which the prover need only perform constant-depth quantum circuits.
arXiv Detail & Related papers (2021-07-05T17:45:41Z) - Indistinguishability Obfuscation of Null Quantum Circuits and
Applications [17.72516323214125]
We study the notion of indistinguishability obfuscation for null quantum circuits (quantum null-iO)
We show how quantum null-iO enables a series of new cryptographic primitives that, prior to our work, were unknown to exist even making assumptions.
arXiv Detail & Related papers (2021-06-11T00:08:14Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z) - Quantum Gram-Schmidt Processes and Their Application to Efficient State
Read-out for Quantum Algorithms [87.04438831673063]
We present an efficient read-out protocol that yields the classical vector form of the generated state.
Our protocol suits the case that the output state lies in the row space of the input matrix.
One of our technical tools is an efficient quantum algorithm for performing the Gram-Schmidt orthonormal procedure.
arXiv Detail & Related papers (2020-04-14T11:05:26Z) - Forging quantum data: classically defeating an IQP-based quantum test [0.0]
We describe a classical algorithm that can convince the verifier that the (classical) prover is quantum.
We show that the key extraction algorithm is efficient in practice for problem sizes of hundreds of qubits.
arXiv Detail & Related papers (2019-12-11T19:00:00Z) - Classical Homomorphic Encryption for Quantum Circuits [2.1756081703276]
We present the first leveled fully homomorphic encryption scheme for quantum circuits with classical keys.
We show that it is possible to construct such a scheme directly from a quantum secure classical homomorphic encryption scheme with certain properties.
arXiv Detail & Related papers (2017-08-07T14:27:06Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.