New Quantum Internet Applications via Verifiable One-Time Programs
- URL: http://arxiv.org/abs/2509.22290v1
- Date: Fri, 26 Sep 2025 12:53:16 GMT
- Title: New Quantum Internet Applications via Verifiable One-Time Programs
- Authors: Lev Stambler,
- Abstract summary: We introduce Verifiable One-Time Programs (Ver-OTPs) and use them to construct single-round Open Secure Computation (OSC)<n>Our work provides a new framework for quantum-assisted cryptography that may be implementable with near-term quantum technology.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We introduce Verifiable One-Time Programs (Ver-OTPs) and use them to construct single-round Open Secure Computation (OSC), a novel primitive enabling applications like (1) single-round sealed-bid auctions, (2) single-round and honest-majority atomic proposes -- a building block of consensus protocols, and (3) single-round differentially private statistical aggregation without pre-registration. First, we construct Ver-OTPs from single-qubit states and classical cryptographic primitives. Then, assuming a multi-key homomorphic scheme (MHE) with certain properties, we use Ver-OTPs with MHE to construct OSC. The underlying quantum requirement is minimal: only single-qubit states are needed alongside a hardware assumption on the receiver's quantum resources. Our work therefore provides a new framework for quantum-assisted cryptography that may be implementable with near-term quantum technology.
Related papers
- Verifier-initiated quantum message-authentication via quantum zero-knowledge proofs [38.81686642226027]
We introduce a new method where the verifier can request authentication only when needed, improving efficiency for quantum networks and blockchain applications.<n>Our approach adapts the concept of zero-knowledge widely used in classical cryptography to quantum settings, ensuring that verification reveals nothing about secret keys.<n>This work delivers the first general verifier-initiated quantum signature scheme with formal security, paving the way for scalable, secure authentication in future quantum infrastructures and decentralized systems.
arXiv Detail & Related papers (2025-12-05T04:40:34Z) - Hybrid Authentication Protocols for Advanced Quantum Networks [0.6827423171182154]
We introduce a new authentication approach that combines hardware assumptions, particularly Physical Unclonable Functions (PUFs), along with quantum properties of non-local states, such as local indistinguishability, to achieve provable security in entanglement-based protocols.<n>These protocols are suitable for implementation across various platforms, particularly photonics-based ones, and offer a practical and flexible solution to the long-standing challenge of authentication in quantum communication networks.
arXiv Detail & Related papers (2025-04-15T18:51:22Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Quantum Random Access Codes Implementation for Resource Allocation and Coexistence with Classical Telecommunication [32.73124984242397]
Modern quantum networks have limited capacity to distribute resources among different users.
We experimentally test our encoding and decoding strategy from the resource allocation perspective.
By emulating a coexistent classical communication, we test the resilience of our implementation in presence of noise.
arXiv Detail & Related papers (2024-03-27T20:46:50Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - One-Time Universal Hashing Quantum Digital Signatures without Perfect
Keys [24.240914319917053]
We show that imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising security.
This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols.
arXiv Detail & Related papers (2023-01-03T14:54:27Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Parallel self-testing of EPR pairs under computational assumptions [12.847847919343646]
We show that a single EPR pair of a single quantum device can be self-tested under computational assumptions.
We show that our protocol can be passed with probability negligibly close to $1$ by an honest quantum device.
A simplified version of our protocol is the first that can efficiently certify an arbitrary number of qubits of a single cloud quantum computer.
arXiv Detail & Related papers (2022-01-31T18:42:45Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Two-party quantum private comparison based on eight-qubit entangled
state [0.7130302992490973]
The purpose of quantum private comparison (QPC) is to solve "Tierce problem" using quantum mechanics laws.
We consider for the first time the usefulness of eight-qubit entangled states for QPC by proposing a new protocol.
arXiv Detail & Related papers (2021-01-05T12:07:45Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Probabilistic one-time programs using quantum entanglement [0.0]
We present an improved protocol for one-time programs that resolves major drawbacks of previous schemes.
This results in four orders of magnitude higher count rates as well the ability to execute a program long after the quantum information exchange has taken place.
We demonstrate our protocol over an underground fiber link between university buildings in downtown Vienna.
arXiv Detail & Related papers (2020-08-05T18:02:56Z) - Post-Quantum Multi-Party Computation [32.75732860329838]
We study multi-party computation for classical functionalities (in the plain model) with security against malicious-time quantum adversaries.
We assume superpolynomial quantum hardness of learning with errors (LWE), and quantum hardness of an LWE-based circular security assumption.
Along the way, we develop cryptographic primitives that may be of independent interest.
arXiv Detail & Related papers (2020-05-23T00:42:52Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.