Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography (2405.10274v1)
Abstract: Unclonable cryptography is concerned with leveraging the no-cloning principle to build cryptographic primitives that are otherwise impossible to achieve classically. Understanding the feasibility of unclonable encryption, one of the key unclonable primitives, satisfying indistinguishability security in the plain model has been a major open question in the area. So far, the existing constructions of unclonable encryption are either in the quantum random oracle model or are based on new conjectures. We present a new approach to unclonable encryption via a reduction to a novel question about nonlocal quantum state discrimination: how well can non-communicating -- but entangled -- players distinguish between different distributions over quantum states? We call this task simultaneous state indistinguishability. Our main technical result is showing that the players cannot distinguish between each player receiving independently-chosen Haar random states versus all players receiving the same Haar random state. We leverage this result to present the first construction of unclonable encryption satisfying indistinguishability security, with quantum decryption keys, in the plain model. We also show other implications to single-decryptor encryption and leakage-resilient secret sharing.
- Scott Aaronson. Quantum copy-protection and quantum money. In 2009 24th Annual IEEE Conference on Computational Complexity, pages 229–242. IEEE, 2009.
- A modular approach to unclonable cryptography. arXiv preprint arXiv:2311.11890, 2023.
- A quantum goldreich-levin theorem with cryptographic applications. In Helmut Alt and Afonso Ferreira, editors, STACS 2002, pages 323–334, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.
- Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II 39, pages 510–539. Springer, 2019.
- Unclonable encryption, revisited. In Theory of Cryptography Conference, pages 299–329. Springer, 2021.
- On the feasibility of unclonable encryption, and more. In Yevgeniy Dodis and Thomas Shrimpton, editors, Advances in Cryptology – CRYPTO 2022, pages 212–241, Cham, 2022. Springer Nature Switzerland.
- Cloning games: A general framework for unclonable primitives. In CRYPTO, 2023.
- Secure software leasing. In Anne Canteaut and François-Xavier Standaert, editors, Advances in Cryptology – EUROCRYPT 2021, pages 501–530, Cham, 2021. Springer International Publishing.
- Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Physical review letters, 70(13):1895, 1993.
- Quantum nonlocality without entanglement. Physical Review A, 59(2):1070, 1999.
- On the local leakage resilience of linear secret sharing schemes. Journal of Cryptology, 34:1–65, 2021.
- On the (im) possibility of obfuscating programs. In Annual international cryptology conference, pages 1–18. Springer, 2001.
- Constructions for quantum indistinguishability obfuscation. In International Conference on Cryptology and Information Security in Latin America, pages 24–43. Springer, 2021.
- Obfuscation of pseudo-deterministic quantum circuits. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing, pages 1567–1578, 2023.
- Uncloneable Quantum Encryption via Oracles. In Steven T. Flammia, editor, 15th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2020), volume 158 of Leibniz International Proceedings in Informatics (LIPIcs), pages 4:1–4:22, Dagstuhl, Germany, 2020. Schloss Dagstuhl – Leibniz-Zentrum für Informatik.
- Indistinguishability obfuscation of null quantum circuits and applications. In ITCS, 2022.
- Francesco Buscemi. All entangled quantum states are nonlocal. Physical review letters, 108(20):200401, 2012.
- Exponential separations between learning with and without quantum memory. In FOCS, 2021.
- Unclonable cryptography with unbounded collusions. Cryptology ePrint Archive, 2023.
- How to use quantum indistinguishability obfuscation. In STOC, 2024.
- Extractors and secret sharing against bounded collusion protocols. In 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 1226–1242. IEEE, 2020.
- Unbounded leakage-resilience and intrusion-detection in a quantum world. Cryptology ePrint Archive, 2023.
- Asymptotic state discrimination and a strict hierarchy in distinguishability norms. Journal of Mathematical Physics, 55(11), 2014.
- Hidden cosets and applications to unclonable cryptography. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology – CRYPTO 2021, pages 556–584, Cham, 2021. Springer International Publishing.
- Everything you always wanted to know about locc (but were afraid to ask). Communications in Mathematical Physics, 328:303–326, 2014.
- A framework for bounding nonlocality of state discrimination. Communications in Mathematical Physics, 323:1121–1153, 2013.
- Quantum copy-protection of compute-and-compare programs in the quantum random oracle model, 2020.
- Quantum data hiding. IEEE Transactions on Information Theory, 48(3):580–598, 2002.
- Parallel repetition of local simultaneous state discrimination. arXiv preprint arXiv:2211.06456, 2022.
- Julio Gea-Banacloche. Hiding messages in quantum data. Journal of Mathematical Physics, 43(9):4531–4536, 2002.
- Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM Journal on Computing, 45(3):882–929, 2016.
- Non-malleable secret sharing. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, pages 685–698, 2018.
- O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, STOC ’89, page 25–32, New York, NY, USA, 1989. Association for Computing Machinery.
- Unclonable decryption keys. IACR Cryptol. ePrint Arch., 2020:877, 2020.
- Aram W. Harrow. The church of the symmetric subspace, 2013.
- Aram W. Harrow. Approximate orthogonality of permutation operators, with application to quantum information, 2023.
- Strong quantum nonlocality without entanglement. Physical review letters, 122(4):040403, 2019.
- Carl W Helstrom. Quantum detection and estimation theory. Journal of Statistical Physics, 1:231–252, 1969.
- Robust combiners and universal constructions for quantum cryptography. arXiv preprint arXiv:2311.09487, 2023.
- Multiparty data hiding of quantum information. Physical Review A, 71(6):062339, 2005.
- One-out-of-many unclonable cryptography: Definitions, constructions, and more. In Theory of Cryptography Conference, pages 246–275. Springer, 2023.
- A survey of leakage-resilient cryptography. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pages 727–794. Association for Computing Machinery, 2019.
- Srijita Kundu and Ernest Y. Z. Tan. Device-independent uncloneable encryption, 2022.
- Antonio Anna Mele. Introduction to haar measure tools in quantum information: A beginner’s tutorial, 2024.
- Local simultaneous state discrimination, 2021.
- Distinguishability of quantum states under restricted families of measurements with an application to quantum data hiding. Communications in Mathematical Physics, 291:813–843, 2009.
- Michael Nathanson. Distinguishing bipartitite orthogonal states using locc: Best and worst cases. Journal of Mathematical Physics, 46(6), 2005.
- Roger Penrose. Applications of negative dimensional tensors. Welsh, D., Ed., Combinatorial Mathematics and Its Applications, pages 221–244, 1971.
- Quantumness of correlations, quantumness of ensembles and quantum data hiding. New Journal of Physics, 16(11):113001, 2014.
- Optimal detection of quantum information. Physical Review Letters, 66(9):1119, 1991.
- Quantum computation by local measurement. Annual Review of Condensed Matter Physics, 3(Volume 3, 2012):239–261, 2012.
- Leakage resilient secret sharing and applications. In Annual International Cryptology Conference, pages 480–509. Springer, 2019.
- Stephen Wiesner. Conjugate coding. ACM Sigact News, 15(1):78–88, 1983.
- Mark Zhandry. Quantum lightning never strikes the same state twice. In Yuval Ishai and Vincent Rijmen, editors, Advances in Cryptology – EUROCRYPT 2019, pages 408–438, Cham, 2019. Springer International Publishing.