Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 79 tok/s
Gemini 2.5 Pro 60 tok/s Pro
GPT-5 Medium 25 tok/s Pro
GPT-5 High 29 tok/s Pro
GPT-4o 117 tok/s Pro
Kimi K2 201 tok/s Pro
GPT OSS 120B 466 tok/s Pro
Claude Sonnet 4.5 37 tok/s Pro
2000 character limit reached

Pseudorandom Unitaries (PRUs)

Updated 9 October 2025
  • Pseudorandom unitaries (PRUs) are efficiently computable quantum operators indistinguishable from Haar random operators to any quantum polynomial-time adversary.
  • They are constructed using methods like concatenated random Clifford unitaries and the path-recording framework, ensuring security against both standard and adaptive attacks.
  • PRUs underpin critical quantum cryptographic applications such as authentication, secure quantum money, and hardware unclonable functions, while imposing stringent resource and circuit depth requirements.

Pseudorandom unitaries (PRUs) are families of efficiently computable unitary operators on quantum systems that are computationally indistinguishable from Haar-random unitaries to any efficient (quantum polynomial-time) adversary. PRUs play a central role in quantum cryptography, derandomization, complexity theory, and the emerging theory of quantum pseudorandomness. They are the quantum analog of classical pseudorandom functions, but with profound structural, resource, and separability differences unique to the quantum setting.

1. Definition, Characterization, and Security

A family U={Uk}k\mathcal{U} = \{ U_k \}_k of %%%%1%%%%-qubit unitary operators is called a pseudorandom unitary (PRU) if:

  • There exists a quantum polynomial-time (QPT) algorithm capable of computing UkU_k for any key kk.
  • For every QPT adversary AA with quantum query access, the probability difference

Prk[AUk(1n)=1]PrUμ[AU(1n)=1]\left| \Pr_k[A^{U_k}(1^n) = 1] - \Pr_{U \sim \mu}[A^{U}(1^n) = 1] \right|

is negligible in nn, where UU is drawn from the Haar measure μ\mu over the unitary group U(2n)\mathrm{U}(2^n) (Doosti et al., 2021).

PRUs are defined in both standard and strong forms. The strong form remains secure even when the adversary can query both UU and UU^\dagger (Ma et al., 14 Oct 2024, Ananth et al., 29 Sep 2025). Security is typically proven either via reductions from quantum-secure one-way functions or, in oracle models, using information-theoretic simulation arguments.

2. Construction Techniques and the Path-Recording Framework

Early candidate constructions for PRUs were based on concatenation of random Clifford unitaries, pseudorandom binary phase operators, and pseudorandom permutations:

Uk=Pk1Fk2Ck3U_k = P_{k_1} F_{k_2} C_{k_3}

where Pk1P_{k_1} is an efficiently computable pseudorandom permutation, Fk2F_{k_2} applies a pseudorandom phase via a quantum-secure pseudorandom function, and Ck3C_{k_3} is a random Clifford (Metger et al., 22 Feb 2024, Metger et al., 19 Apr 2024). Such constructions are secure against non-adaptive (parallel-query) adversaries. For full (adaptive) security, the "path-recording" framework was introduced (Ma et al., 14 Oct 2024, Ananth et al., 25 Oct 2024, Ananth et al., 29 Sep 2025). This reformulates simulation of queries to a Haar-random unitary as a process that "records" all input-output query pairs in an auxiliary "relation" register, enabling efficient isometric simulation that is indistinguishable from Haar up to negligible trace distance, even against adversaries making both UU and UU^\dagger queries.

In the quantum Haar random oracle model (QHROM), efficient constructions include "sandwich" forms:

Gk=X(k3)UX(k2)UX(k1)G_k = X^{(k_3)} U X^{(k_2)} U X^{(k_1)}

where UU is a fixed Haar random oracle and X(k)X^{(k)} is a tensor-product Pauli XX operation for key kk (Ananth et al., 29 Sep 2025).

For extension to large Hilbert spaces with minimal additional key, "gluing" techniques and recursive compositions assemble large PRUs from smaller blocks, preserving invertibility security and reducing key requirements to nearly sublinear in nn (Ananth et al., 5 Oct 2025).

3. Resource Requirements and Fundamental Limitations

PRUs differ sharply in resource requirements from pseudorandom states. They require:

  • Maximal "imaginarity"

Ip(U)=14ntr(UU)21negl(n)\mathcal{I}_\mathrm{p}(U) = 1 - 4^{-n}|\mathrm{tr}(U^\dagger U^*)|^2 \approx 1-\mathrm{negl}(n)

Any real or nearly real unitaries can be efficiently distinguished from Haar, so PRUs must encode nontrivial complex phases (Haug et al., 2023).

  • High quantum coherence, quantified (e.g., via the relative entropy of coherence) to grow as ω(logn)\omega(\log n) (Haug et al., 2023).
  • PRUs cannot be realized by sparse unitaries or with shallow (constant-depth) quantum circuits. Any such shallow circuit is efficiently learnable and therefore not pseudorandom by the required criteria (Wadhwa et al., 20 May 2024).
  • Extreme noise sensitivity: PRUs can only be generated on devices with error rates p=negl(n)p = \text{negl}(n); any higher noise makes the constructed unitaries efficiently distinguishable from Haar random (Haug et al., 2023). These constraints establish strong lower bounds on any physical or circuit realization of PRUs.

4. Structural Relations, Separations, and Oracle Worlds

Quantum pseudorandom constructs form a strict hierarchy:

  • PRU \Rightarrow PRI (pseudorandom isometry) \Rightarrow PRFSG (pseudorandom function-like state generator). However, there are no known black-box constructions from PRFSGs or generic PRIs back to PRUs (Gulati et al., 6 Oct 2025, Bouaziz--Ermann et al., 6 Oct 2025).
  • Oracle separations constructed using tools such as the quantum singular value transformation show that even adaptively secure, quantum-accessible PRFSGs do not imply ancilla-efficient PRUs (Gulati et al., 6 Oct 2025).
  • In unitary oracle worlds, non-ancilla PRUs are unachievable even as PRFSGs are possible (Bouaziz--Ermann et al., 6 Oct 2025).
  • These findings contrast sharply with the classical setting, where pseudorandom generators, functions, and permutations are equivalent up to polynomial reductions.

Key stretching is possible: using gluing techniques (e.g., with path-recording purification and composite projections), it is possible to extend a strong PRU acting on nn qubits to one acting on NnN \gg n qubits using a total key of O(N1/c)O(N^{1/c}) bits for any constant cc (Ananth et al., 5 Oct 2025, Ananth et al., 25 Oct 2024). This indicates a difference where key lengths can be shorter than the output dimension, in contrast to the classical case.

5. Applications: Cryptography, Hardware, and Fast Scrambling

PRUs allow a range of quantum cryptographic and cryptanalytic applications:

  • Quantum authentication and encryption: PRUs underlie the pseudorandom quantum authentication scheme (PQAS), which achieves indistinguishability from the maximally mixed state, strong message integrity, and resistance to meta-information leakage, all with potentially much weaker assumptions than quantum-secure one-way functions (Haug et al., 1 Jan 2025).
  • Secure quantum money: PRU-based state simulation yields "Haar money" protocols with information-theoretic unforgeability and untraceability (Alagic et al., 2019).
  • Commitment and key distribution limitations: Despite the power of PRUs, black-box constructions of classical-communication quantum commitments or key agreements from PRUs are ruled out by separability and indistinguishability bounds—PRUs are too "random" to coordinate classical outputs (Ananth et al., 29 Sep 2025).
  • Connection to quantum hardware: PRUs can be constructed (and conversely, used to construct) quantum physical unclonable functions (qPUFs), with a complete equivalence provided sufficient separation in diamond norm between qPUF instances (Doosti et al., 2021).
  • Fast scrambling: Strong PRUs (robust to UU, UU^\dag, UTU^T, UU^* queries) can be constructed in O(logn)O(\log n) depth and provide a rigorous proof of the fast scrambling conjecture: any observable feature expressible with access to UU, UU^\dag, UTU^T, UU^* is indistinguishable from Haar random after logarithmic depth (Schuster et al., 30 Sep 2025, Ananth et al., 5 Oct 2025).

6. Circuit Depth, Complexity, and Physical Realizability

Efficient PRUs can be constructed in poly(logn)\mathrm{poly}(\log n) depth in architectures with all-to-all connectivity and O(logn)O(\log n) depth even in 1D circuits, using gluing of patchwise PRUs (Schuster et al., 10 Jul 2024, Foxman et al., 15 Aug 2025). In models with enhanced gates (e.g., many-qubit TOFFOLI or FANOUT), constant-depth circuits suffice for PRU and strong PRU construction (Foxman et al., 15 Aug 2025). However, any attempt to aggregate PRUs via constant-depth circuits of two-qubit gates alone is impossible due to efficient learnability. Furthermore, the possibility of constructing strong PRUs in QAC0^0 circuits is intimately related to the question of whether PARITY is in QAC0^0 (Foxman et al., 15 Aug 2025).

In the context of quantum random oracle models (QHROMs), PRUs with security against unbounded queries can be constructed using two sequential queries to the oracle, but not with a single query; bounded security is possible with a single query (Ananth et al., 25 Oct 2024, Ananth et al., 29 Sep 2025).

7. Open Problems, Limitations, and Future Directions

PRUs are foundational in quantum cryptography yet exhibit sharp distinctions from both classical pseudorandomness and even related quantum primitives. Major open questions include:

  • The full equivalence (or lack thereof) between PRUs, PRIs, and PRFSGs.
  • Characterizing necessary and sufficient physical resources for realizing strong PRUs in minimal circuit depth and key length.
  • Closing the adaptive security gap for simple constructions and generalizing path-recording simulation to broader classes of quantum functions.
  • Determining the minimal assumptions required for existence in the plain model (i.e., are PRUs strictly weaker than quantum-secure one-way functions?).

Theoretical progress in these areas will clarify the precise role of PRUs as quantum cryptographic and computational primitives, further establish their hierarchy of power, and influence the design of both fundamental protocols and quantum hardware.

Forward Email Streamline Icon: https://streamlinehq.com

Follow Topic

Get notified by email when new papers are published related to Pseudorandom Unitaries (PRUs).