Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography

Authors Prabhanjan Ananth , Fatih Kaleoglu, Henry Yuen



PDF
Thumbnail PDF

File

LIPIcs.ITCS.2025.7.pdf
  • Filesize: 0.93 MB
  • 23 pages

Document Identifiers

Author Details

Prabhanjan Ananth
  • University of California, Santa Barbara, CA, USA
Fatih Kaleoglu
  • University of California, Santa Barbara, CA, USA
Henry Yuen
  • Columbia University, New York, NY, USA

Acknowledgements

The authors would like to thank Ludovico Lami for answering many questions related to non-local state discrimination.

Cite As Get BibTex

Prabhanjan Ananth, Fatih Kaleoglu, and Henry Yuen. Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography. In 16th Innovations in Theoretical Computer Science Conference (ITCS 2025). Leibniz International Proceedings in Informatics (LIPIcs), Volume 325, pp. 7:1-7:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2025) https://doi.org/10.4230/LIPIcs.ITCS.2025.7

Abstract

We study a novel question about nonlocal quantum state discrimination: how well can non-communicating - but entangled - players distinguish between different distributions over quantum states? We call this task simultaneous state indistinguishability. Our main technical result is to show that the players cannot distinguish between each player receiving independently-chosen Haar random states versus all players receiving the same Haar random state.
We show that this question has implications to unclonable cryptography, which leverages the no-cloning principle to build cryptographic primitives that are classically impossible to achieve. Understanding the feasibility of unclonable encryption, one of the key unclonable primitives, satisfying indistinguishability security in the plain model has been a major open question in the area. So far, the existing constructions of unclonable encryption are either in the quantum random oracle model or are based on new conjectures.
We leverage our main result to present the first construction of unclonable encryption satisfying indistinguishability security, with quantum decryption keys, in the plain model. We also show other implications to single-decryptor encryption and leakage-resilient secret sharing. These applications present evidence that simultaneous Haar indistinguishability could be useful in quantum cryptography.

Subject Classification

ACM Subject Classification
  • Theory of computation → Cryptographic protocols
  • Theory of computation → Quantum information theory
Keywords
  • Quantum
  • Haar
  • unclonable encryption

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Scott Aaronson. Quantum copy-protection and quantum money. In 2009 24th Annual IEEE Conference on Computational Complexity, pages 229-242. IEEE, 2009. URL: https://doi.org/10.1109/CCC.2009.42.
  2. Divesh Aggarwal, Ivan Damgård, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, Joao Ribeiro, and Mark Simkin. Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In Advances in Cryptology-CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part II 39, pages 510-539. Springer, 2019. URL: https://doi.org/10.1007/978-3-030-26951-7_18.
  3. Prabhanjan Ananth and Amit Behera. A modular approach to unclonable cryptography. In Leonid Reyzin and Douglas Stebila, editors, Advances in Cryptology - CRYPTO 2024, pages 3-37, Cham, 2024. Springer Nature Switzerland. URL: https://doi.org/10.1007/978-3-031-68394-7_1.
  4. Prabhanjan Ananth, Aditya Gulati, and Yao-Ting Lin. Cryptography in the common haar state model: Feasibility results and separations. In Elette Boyle and Mohammad Mahmoody, editors, Theory of Cryptography, pages 94-125, Cham, 2025. Springer Nature Switzerland. Google Scholar
  5. Prabhanjan Ananth and Fatih Kaleoglu. Unclonable encryption, revisited. In Theory of Cryptography Conference, pages 299-329. Springer, 2021. URL: https://doi.org/10.1007/978-3-030-90459-3_11.
  6. Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, and Mark Zhandry. On the feasibility of unclonable encryption, and more. In Yevgeniy Dodis and Thomas Shrimpton, editors, Advances in Cryptology - CRYPTO 2022, pages 212-241, Cham, 2022. Springer Nature Switzerland. URL: https://doi.org/10.1007/978-3-031-15979-4_8.
  7. Prabhanjan Ananth, Fatih Kaleoglu, and Qipeng Liu. Cloning games: A general framework for unclonable primitives. In CRYPTO, 2023. Google Scholar
  8. Prabhanjan Ananth, Fatih Kaleoglu, and Henry Yuen. Simultaneous haar indistinguishability with applications to unclonable cryptography, 2024. https://arxiv.org/abs/2405.10274, URL: https://doi.org/10.48550/arXiv.2405.10274.
  9. Prabhanjan Ananth and Rolando L. La Placa. Secure software leasing. In Anne Canteaut and François-Xavier Standaert, editors, Advances in Cryptology - EUROCRYPT 2021, pages 501-530, Cham, 2021. Springer International Publishing. URL: https://doi.org/10.1007/978-3-030-77886-6_17.
  10. Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. On the (im) possibility of obfuscating programs. In Annual international cryptology conference, pages 1-18. Springer, 2001. URL: https://doi.org/10.1007/3-540-44647-8_1.
  11. James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa. Obfuscation of pseudo-deterministic quantum circuits. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing, pages 1567-1578, 2023. URL: https://doi.org/10.1145/3564246.3585179.
  12. James Bartusek and Giulio Malavolta. Indistinguishability obfuscation of null quantum circuits and applications. In ITCS, 2022. Google Scholar
  13. Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, and Tal Rabin. On the local leakage resilience of linear secret sharing schemes. Journal of Cryptology, 34:1-65, 2021. Google Scholar
  14. Charles H Bennett, Gilles Brassard, Claude Crépeau, Richard Jozsa, Asher Peres, and William K Wootters. Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Physical review letters, 70(13):1895, 1993. Google Scholar
  15. Charles H Bennett, David P DiVincenzo, Christopher A Fuchs, Tal Mor, Eric Rains, Peter W Shor, John A Smolin, and William K Wootters. Quantum nonlocality without entanglement. Physical Review A, 59(2):1070, 1999. Google Scholar
  16. Anne Broadbent and Raza Ali Kazmi. Constructions for quantum indistinguishability obfuscation. In International Conference on Cryptology and Information Security in Latin America, pages 24-43. Springer, 2021. URL: https://doi.org/10.1007/978-3-030-88238-9_2.
  17. Anne Broadbent and Sébastien Lord. Uncloneable Quantum Encryption via Oracles. In Steven T. Flammia, editor, 15th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2020), volume 158 of Leibniz International Proceedings in Informatics (LIPIcs), pages 4:1-4:22, Dagstuhl, Germany, 2020. Schloss Dagstuhl - Leibniz-Zentrum für Informatik. URL: https://doi.org/10.4230/LIPIcs.TQC.2020.4.
  18. Francesco Buscemi. All entangled quantum states are nonlocal. Physical review letters, 108(20):200401, 2012. Google Scholar
  19. Alper Çakan and Vipul Goyal. Unclonable cryptography with unbounded collusions. Cryptology ePrint Archive, 2023. Google Scholar
  20. Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, and João Ribeiro. Unbounded leakage-resilience and intrusion-detection in a quantum world. Cryptology ePrint Archive, 2023. Google Scholar
  21. Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Ashutosh Kumar, Xin Li, Raghu Meka, and David Zuckerman. Extractors and secret sharing against bounded collusion protocols. In 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 1226-1242. IEEE, 2020. URL: https://doi.org/10.1109/FOCS46700.2020.00117.
  22. Sitan Chen, Jordan Cotler, Hsin-Yuan Huang, and Jerry Li. Exponential separations between learning with and without quantum memory. In FOCS, 2021. Google Scholar
  23. Andrew M Childs, Debbie Leung, Laura Mančinska, and Maris Ozols. A framework for bounding nonlocality of state discrimination. Communications in Mathematical Physics, 323:1121-1153, 2013. Google Scholar
  24. Eric Chitambar and Min-Hsiu Hsieh. Asymptotic state discrimination and a strict hierarchy in distinguishability norms. Journal of Mathematical Physics, 55(11), 2014. Google Scholar
  25. Eric Chitambar, Debbie Leung, Laura Mančinska, Maris Ozols, and Andreas Winter. Everything you always wanted to know about locc (but were afraid to ask). Communications in Mathematical Physics, 328:303-326, 2014. Google Scholar
  26. Andrea Coladangelo and Sam Gunn. How to use quantum indistinguishability obfuscation. In STOC, 2024. Google Scholar
  27. Andrea Coladangelo, Jiahui Liu, Qipeng Liu, and Mark Zhandry. Hidden cosets and applications to unclonable cryptography. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology - CRYPTO 2021, pages 556-584, Cham, 2021. Springer International Publishing. URL: https://doi.org/10.1007/978-3-030-84242-0_20.
  28. Andrea Coladangelo, Christian Majenz, and Alexander Poremba. Quantum copy-protection of compute-and-compare programs in the quantum random oracle model. Quantum, 8:1330, May 2024. URL: https://doi.org/10.22331/q-2024-05-02-1330.
  29. David P DiVincenzo, Debbie W Leung, and Barbara M Terhal. Quantum data hiding. IEEE Transactions on Information Theory, 48(3):580-598, 2002. URL: https://doi.org/10.1109/18.985948.
  30. Llorenç Escolà-Farràs, Jaròn Has, Maris Ozols, Christian Schaffner, and Mehrdad Tahmasbi. Parallel repetition of local simultaneous state discrimination. arXiv preprint arXiv:2211.06456, 2022. Google Scholar
  31. Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM Journal on Computing, 45(3):882-929, 2016. URL: https://doi.org/10.1137/14095772X.
  32. Julio Gea-Banacloche. Hiding messages in quantum data. Journal of Mathematical Physics, 43(9):4531-4536, 2002. Google Scholar
  33. Marios Georgiou and Mark Zhandry. Unclonable decryption keys. IACR Cryptol. ePrint Arch., 2020:877, 2020. URL: https://eprint.iacr.org/2020/877.
  34. O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, STOC '89, pages 25-32, New York, NY, USA, 1989. Association for Computing Machinery. URL: https://doi.org/10.1145/73007.73010.
  35. Vipul Goyal and Ashutosh Kumar. Non-malleable secret sharing. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, pages 685-698, 2018. URL: https://doi.org/10.1145/3188745.3188872.
  36. Saronath Halder, Manik Banik, Sristy Agrawal, and Somshubhro Bandyopadhyay. Strong quantum nonlocality without entanglement. Physical review letters, 122(4):040403, 2019. Google Scholar
  37. Aram W. Harrow. The church of the symmetric subspace, 2013. URL: https://arxiv.org/abs/1308.6595.
  38. Aram W. Harrow. Approximate orthogonality of permutation operators, with application to quantum information, 2023. URL: https://arxiv.org/abs/2309.00715.
  39. Patrick Hayden, Debbie Leung, and Graeme Smith. Multiparty data hiding of quantum information. Physical Review A, 71(6):062339, 2005. Google Scholar
  40. Carl W Helstrom. Quantum detection and estimation theory. Journal of Statistical Physics, 1:231-252, 1969. Google Scholar
  41. Taiga Hiroka, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa. Robust combiners and universal constructions for quantum cryptography. arXiv preprint arXiv:2311.09487, 2023. Google Scholar
  42. Yael Tauman Kalai and Leonid Reyzin. A survey of leakage-resilient cryptography. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pages 727-794. Association for Computing Machinery, 2019. URL: https://doi.org/10.1145/3335741.3335768.
  43. Fuyuki Kitagawa and Ryo Nishimaki. One-out-of-many unclonable cryptography: Definitions, constructions, and more. In Theory of Cryptography Conference, pages 246-275. Springer, 2023. URL: https://doi.org/10.1007/978-3-031-48624-1_10.
  44. Srijita Kundu and Ernest Y. Z. Tan. Device-independent uncloneable encryption, 2022. URL: https://doi.org/10.48550/arXiv.2210.01058.
  45. Christian Majenz, Maris Ozols, Christian Schaffner, and Mehrdad Tahmasbi. Local simultaneous state discrimination, 2021. URL: https://arxiv.org/abs/2111.01209.
  46. William Matthews, Stephanie Wehner, and Andreas Winter. Distinguishability of quantum states under restricted families of measurements with an application to quantum data hiding. Communications in Mathematical Physics, 291:813-843, 2009. Google Scholar
  47. Antonio Anna Mele. Introduction to haar measure tools in quantum information: A beginner’s tutorial, 2024. URL: https://arxiv.org/abs/2307.08956.
  48. Michael Nathanson. Distinguishing bipartitite orthogonal states using locc: Best and worst cases. Journal of Mathematical Physics, 46(6), 2005. Google Scholar
  49. Roger Penrose. Applications of negative dimensional tensors. Welsh, D., Ed., Combinatorial Mathematics and Its Applications, pages 221-244, 1971. Google Scholar
  50. Asher Peres and William K Wootters. Optimal detection of quantum information. Physical Review Letters, 66(9):1119, 1991. Google Scholar
  51. Marco Piani, Varun Narasimhachar, and John Calsamiglia. Quantumness of correlations, quantumness of ensembles and quantum data hiding. New Journal of Physics, 16(11):113001, 2014. Google Scholar
  52. Robert Raussendorf and Tzu-Chieh Wei. Quantum computation by local measurement. Annual Review of Condensed Matter Physics, 3(Volume 3, 2012):239-261, 2012. URL: https://doi.org/10.1146/annurev-conmatphys-020911-125041.
  53. Akshayaram Srinivasan and Prashant Nalini Vasudevan. Leakage resilient secret sharing and applications. In Annual International Cryptology Conference, pages 480-509. Springer, 2019. URL: https://doi.org/10.1007/978-3-030-26951-7_17.
  54. Stephen Wiesner. Conjugate coding. ACM Sigact News, 15(1):78-88, 1983. URL: https://doi.org/10.1145/1008908.1008920.
  55. Mark Zhandry. Quantum lightning never strikes the same state twice. In Yuval Ishai and Vincent Rijmen, editors, Advances in Cryptology - EUROCRYPT 2019, pages 408-438, Cham, 2019. Springer International Publishing. URL: https://doi.org/10.1007/978-3-030-17659-4_14.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail