Impersonating Quantum Secrets over Classical Channels
- URL: http://arxiv.org/abs/2601.01058v1
- Date: Sat, 03 Jan 2026 03:40:28 GMT
- Title: Impersonating Quantum Secrets over Classical Channels
- Authors: Luowen Qian, Mark Zhandry,
- Abstract summary: We show that a simple eavesdropper listening in on classical communication will eventually be able to impersonate any of the parties.<n>As an additional application, we show that any quantum money scheme that can be verified through only classical queries to any oracle cannot be information-theoretically secure.
- Score: 10.75127981612396
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We show that a simple eavesdropper listening in on classical communication between potentially entangled quantum parties will eventually be able to impersonate any of the parties. Furthermore, the attack is efficient if one-way puzzles do not exist. As a direct consequence, one-way puzzles are implied by reusable authentication schemes over classical channels with quantum pre-shared secrets that are potentially evolving. As an additional application, we show that any quantum money scheme that can be verified through only classical queries to any oracle cannot be information-theoretically secure. This significantly generalizes the prior work by Ananth, Hu, and Yuen (ASIACRYPT'23) where they showed the same but only for the specific case of random oracles. Therefore, verifying black-box constructions of quantum money inherently requires coherently evaluating the underlying cryptographic tools, which may be difficult for near-term quantum devices.
Related papers
- Quantum Public Key Encryption for NISQ Devices [6.773399736037789]
Quantum public-key encryption (PKE) is an important primitive in quantum cryptography.<n>We design a PKE scheme with quantum-classical public keys and classical ciphertexts, that is noise-resilient and only requires a small number of qubits acting coherently.
arXiv Detail & Related papers (2025-09-22T13:20:26Z) - Hard Quantum Extrapolations in Quantum Cryptography [9.214658764451348]
We study the quantum analogues of the universal extrapolation task.<n>We show that it is hard if quantum commitments exist, and it is easy for quantum space.
arXiv Detail & Related papers (2024-09-25T00:09:42Z) - Towards the Impossibility of Quantum Public Key Encryption with
Classical Keys from One-Way Functions [0.5999777817331317]
It has been recently shown that public-key encryption (PKE) from one-way functions (OWF) is possible if we consider quantum public keys.
In this paper, we focus on black-box separation for PKE with classical public key and quantum ciphertext from OWF.
arXiv Detail & Related papers (2023-11-06T20:41:25Z) - Classical Verification of Quantum Learning [42.362388367152256]
We develop a framework for classical verification of quantum learning.
We propose a new quantum data access model that we call "mixture-of-superpositions" quantum examples.
Our results demonstrate that the potential power of quantum data for learning tasks, while not unlimited, can be utilized by classical agents.
arXiv Detail & Related papers (2023-06-08T00:31:27Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - On the (Im)plausibility of Public-Key Quantum Money from
Collision-Resistant Hash Functions [6.164147034988822]
We present the first black-box separation of quantum money and cryptographic primitives.
Specifically, we show that collision-resistant hash functions cannot be used as a black-box to construct public-key quantum money schemes.
arXiv Detail & Related papers (2023-01-23T00:44:54Z) - Anticipative measurements in hybrid quantum-classical computation [68.8204255655161]
We present an approach where the quantum computation is supplemented by a classical result.
Taking advantage of its anticipation also leads to a new type of quantum measurements, which we call anticipative.
In an anticipative quantum measurement the combination of the results from classical and quantum computations happens only in the end.
arXiv Detail & Related papers (2022-09-12T15:47:44Z) - Entanglement and coherence in Bernstein-Vazirani algorithm [58.720142291102135]
Bernstein-Vazirani algorithm allows one to determine a bit string encoded into an oracle.
We analyze in detail the quantum resources in the Bernstein-Vazirani algorithm.
We show that in the absence of entanglement, the performance of the algorithm is directly related to the amount of quantum coherence in the initial state.
arXiv Detail & Related papers (2022-05-26T20:32:36Z) - Depth-efficient proofs of quantumness [77.34726150561087]
A proof of quantumness is a type of challenge-response protocol in which a classical verifier can efficiently certify quantum advantage of an untrusted prover.
In this paper, we give two proof of quantumness constructions in which the prover need only perform constant-depth quantum circuits.
arXiv Detail & Related papers (2021-07-05T17:45:41Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.