Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography
Abstract
We study a novel question about nonlocal quantum state discrimination: how well can non-communicating – but entangled – players distinguish between different distributions over quantum states? We call this task simultaneous state indistinguishability. Our main technical result is to show that the players cannot distinguish between each player receiving independently-chosen Haar random states versus all players receiving the same Haar random state.
We show that this question has implications to unclonable cryptography, which leverages the no-cloning principle to build cryptographic primitives that are classically impossible to achieve. Understanding the feasibility of unclonable encryption, one of the key unclonable primitives, satisfying indistinguishability security in the plain model has been a major open question in the area. So far, the existing constructions of unclonable encryption are either in the quantum random oracle model or are based on new conjectures.
We leverage our main result to present the first construction of unclonable encryption satisfying indistinguishability security, with quantum decryption keys, in the plain model. We also show other implications to single-decryptor encryption and leakage-resilient secret sharing. These applications present evidence that simultaneous Haar indistinguishability could be useful in quantum cryptography.
Keywords and phrases:
Quantum, Haar, unclonable encryptionFunding:
Prabhanjan Ananth: the National Science Foundation Grant No. 2329938.Copyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Cryptographic protocols ; Theory of computation Quantum information theoryRelated Version:
This paper is based on the following technical report:Acknowledgements:
The authors would like to thank Ludovico Lami for answering many questions related to non-local state discrimination.Editors:
Raghu MekaSeries and Publisher:

1 Introduction
Quantum state discrimination [40] is a foundational concept with applications to quantum information theory, learning theory and cryptography. In a state discrimination task, a party receives from an ensemble and has to determine which state it received. A compelling variant of this problem is concerned with the multi-party setting where there are two or more parties and each party receives a disjoint subset of qubits of . This multi-party variant of state discrimination has also garnered interest from quantum information-theorists focused on the LOCC (local operations and classical communication) model and quantum data hiding [50, 14, 29, 25]. Understanding the multi-party state discrimination problem in turn sheds light on the difficulty of simulating global measurements using local measurements [52].
An important aspect to consider when formulating the multi-party state discrimination problem is the resources shared between the different parties. If we allow the parties to share entanglement and also communicate with each other then this is equivalent to the original state discrimination task (against a single party) due to teleportation. Thus, in order for the multi-party setting to be distinct from the single-party setting, we need to disallow either shared entanglement or classical communication. This results in two different settings:
-
Parties with shared entanglement: In this setting, the parties are allowed to share entanglement but they cannot communicate. On the contrary, this setting is relatively unexplored with the notable exception being the recent works of [45, 30]. There are good reasons to study multi-party state discrimination with shared entanglement. Firstly, it can be viewed as a subclass of semi-quantum games [18], which are non-local games with quantum questions and classical answers. Secondly, it has connections to unclonable cryptography [54, 1], an emerging area in quantum cryptography, as discussed in [45].
Our Work.
We focus on the setting when the parties share entanglement but are not allowed to communicate. We introduce a new concept called simultaneous state indistinguishability (SSI). In the two-party version of the problem, we have two parties (say, Bob and Charlie) who receive as input one of two bipartite states and they are supposed to distinguish. The first half of is given to Bob and the second half is given to Charlie for .
We say that and are -simultaneous state indistinguishable if the probability that Bob and Charlie can simultaneously distinguish is at most . That is, , where denotes the total variation distance, denotes the random variable corresponding to the joint outputs of Bob and Charlie given input , and similarly denotes the random variable corresponding to their joint outputs when given input .
This is related to a recent concept introduced by [45] who considered the unpredictability (search) version of this problem whereas we are interested in indistinguishability. Looking ahead, for applications, it turns out that the indistinguishability notion is more amenable to carrying out proofs (e.g. in the security of unclonable encryption) compared to the unpredictability definition considered by [45]. This is largely due to the fact that our notion is more compatible with the hybrid technique.
An interesting special case of simultaneous-state-indistinguishability is when Bob and Charlie either receive copies of the same state drawn from some distribution or receive i.i.d. samples from , i.e.
Observe that if Bob and Charlie were allowed to make global entangled measurements then they can indeed distinguish by performing swap tests. However, it is not clear these two situations are distinguishable using local measurements, even with preshared entanglement between Bob and Charlie.
We study simultaneous state indistinguishability in the case that each party receives (copies of) a state drawn from the Haar measure.111The Haar measure over states is the unique measure where for all fixed unitaries , if is Haar-distributed then so is . Specifically, we consider the following definition:
-Simultaneous Haar Indistinguishability: We say that -simultaneous Haar indistinguishability holds if any two non-communicating and entangled adversaries Bob and Charlie can distinguish the following distributions with probability at most :
Bob and Charlie each receive copies of , where is a -dimensional Haar state,
Bob receives copies of and Charlie receives copies of , where are i.i.d -dimensional Haar states.
In the default setting, both Bob and Charlie each output 1 bit. We also consider the setting when they output multiple bits.
Variants of this problem have been studied in different contexts before. Independently, two works, namely, Harrow [38] and Chen, Cotler, Huang and Li [22] showed (for the case when ) that Bob and Charlie fail, except with probability negligible in the dimension , in the above distinguishing experiment as long as they don’t share any entanglement. In fact, Harrow’s result proves something stronger: the indistinguishability holds even if the two parties exchange classical information (i.e., LOCC setting). Both works discuss the applications of this problem to well studied topics such as multiparty data hiding, local purity testing and separations between quantum and classical memory. Neither of the works [38, 22] addresses the setting when Bob and Charlie can share an arbitrary amount of entanglement.
1.1 Our Results
1.1.1 Main Result
We show the following:
Theorem 1 (Informal).
For any , -Simultaneous Haar indistinguishability holds for .
Our result complements the works of [38, 22] by showing that it is not possible to distinguish i.i.d versus identical Haar states either using the entanglement resource or using classical communication.
In the case when , we show that -simultaneous Haar indistinguishability does not hold for , which suggests that the above bound cannot be improved significantly. Perhaps surprisingly, our attack even holds in the setting when Bob and Charlie do not share any entanglement. This further indicates that for the problem of simultaneous Haar indistinguishability, the gap between the optimal success probabilities in the entangled and the unentangled cases is small.
1.1.2 Applications
Besides being a natural problem, simultaneous Haar indistinguishability has applications to unclonable cryptography [54, 1, 55, 17, 9, 28, 27, 19]. This is an area of quantum cryptography that leverages the no-cloning principle of quantum mechanics to design cryptographic notions for tasks that are impossible to achieve classically.
Unclonable Encryption: Unclonable encryption is an encryption scheme with quantum ciphertexts that are unclonable. It was first introduced by Broadbent and Lord [17] and is now considered a fundamental notion in unclonable cryptography. There are two security notions of unclonable encryption, namely search and indistinguishability security, studied in the literature. The search security stipulates that any cloning adversary222A cloning adversary is a tri-partite adversary . receives as input an unclonable state and produces a bipartite state given to and who are not allowed to communicate. Then, in the challenge phase, the cloning adversary receives as input and then gives to and to . Finally, and output their respective answers. Refer to [7] for an abstract modeling of unclonable security notions. after receiving a ciphertext of randomly chosen message should not be able to guess except with probability negligible in . In the challenge phase, the cloning adversary receives as input , where is the decryption key. The indistinguishability security imposes a stronger guarantee that any cloning adversary after receiving encryption of , for a randomly chosen bit and adversarially chosen message pair , cannot predict except with probability negligibly close to .
While we have long known that search security is feasible [17], establishing indistinguishability security has remained an important and intriguing open problem. Unclonable encryption satisfying indistinguishability is achievable in the quantum random oracle model [6, 7] or in the plain model (i.e., without oracles) based on new unproven conjectures [3]. Various generic transformations are also known that convert one-time unclonable encryption to the public-key variant [5] or those that convert unclonable encryption for one-bit messages to multi-bit messages [41]. Given that unclonable-indistinguishable encryption has interesting applications to copy-protection [5, 26], it is important we completely settle its feasibility in the plain model. Perhaps embarassingly, we do not how to establish feasibility in the plain model even under strong assumptions such as indistinguishability obfuscation [10, 31]!
We consider the notion of unclonable encryption, where the decryption keys are allowed to be quantum keys. This only affects the challenge phase of the security experiment, where the cloning adversary now receives as input many copies333We consider a security notion where the adversary receives at most copies of the quantum decryption key and is fixed ahead of time. of the quantum decryption key.
We show the following:
Theorem 2 (Informal).
There is an unclonable encryption scheme, with quantum decryption keys, satisfying indistinguishability security in the plain model.
Ours is the first work to show that unclonable-indistinguishable encryption exists in the plain model albeit with quantum decryption keys. Our relaxation (i.e. decryption keys being quantum states) is not only natural and interesting, it also respects the essence of unclonable encryption. For a detailed perspective on the above result, we refer the reader to the full version. We leave open the problem of achieving unclonable encryption with classical decryption keys to future works; we note that the prior works only mentioned the open problem of constructing unclonable encryption in the plain model without explicitly mentioning the need for classical decryption keys.
Moving Beyond Quantum Decryption Keys: A potential approach to transform this scheme into another scheme where the decryption keys are binary strings is to generate the decryption key to be an obfuscation of the setup algorithm that produces decryption keys. It is an intriguing problem to formalize the requirements of the underlying quantum obfuscation scheme. At the bare minimum, we require that the quantum obfuscation scheme satisfies the property that the obfuscated program can be represented as a binary string. While achieving quantum obfuscation has been a difficult open problem [16, 12, 11], obfuscating special classes of quantum algorithms (those that capture the setup algorithm of Theorem 2) could be relatively more tractable.
Our scheme supports one-bit messages and is one-time secure. It is an interesting future direction to extend the works of [5] and [41] to generically achieve unclonable encryption with quantum decryption keys in the public-key setting and for longer messages.
Single-Decryptor Encryption: Single-decryptor encryption [33] is a sister notion of unclonable encryption, where instead of requiring the ciphertexts to be unclonable, we instead require the decryption keys to be unclonable. Constructions of single-decryptor encryption in different settings are known from a variety of assumptions [33, 27, 7, 43]. There are two important security notions considered in the literature. In the independent setting, in the challenge phase, the cloning adversary gets two independently generated ciphertexts while in the identical setting, it gets copies of the same ciphertext. All the known constructions of single-decryptor encryption [27, 7, 43] are in the independent setting and specifically, there are no known constructions in the identical setting. This should not be surprising in light of [33] who showed the equivalence between single-decryptor encryption with identical ciphertexts and unclonable encryption, which suggests the difficulty in achieving the identical ciphertext setting.
We prove the following.
Theorem 3 (Informal).
There is a single-decryptor encryption scheme, with quantum ciphertexts, satisfying identical indistinguishability security.
Ours is the first work to demonstrate the feasibility of single-decryptor encryption in the identical-challenge setting, albeit with quantum ciphertexts.
In addition to its applications to unclonable cryptography, simultaneous Haar indistinguishability can be used to construct leakage-resilient secret sharing.
Leakage-Resilient Secret Sharing: Leakage-resilient cryptography [42] is an area of cryptography that is concerned with the goal of building cryptographic primitives that are resilient to side-channel attacks. We are interested in designing secret sharing schemes that are leakage resilient. In a leakage-resilient secret sharing scheme, a leakage function is applied on each share and we require the guarantee that all the leakages put together are not sufficient enough to compromise the security of the secret sharing scheme.
Leakage-resilient secret sharing is a well studied topic [35, 53, 2, 21, 13] with applications to leakage-resilient secure multi-party computation [13].
We consider a notion of leakage-resilient secret sharing, where we allow the parties holding the shares to be entangled with each other. We now require the guarantee that security should still hold even if each share is individually leaked. Moreover, we consider a relaxed requirement where the shares are allowed to be quantum. Just like the works in the classical setting, we consider the bounded leakage model. That is, if the number of qubits of each share is then we allow for some fraction of bits of leakage from each share, where is some constant and is the number of parties444We set ..
We show the following:
Theorem 4 (Informal).
There is a 2-out- leakage-resilient secret sharing scheme with the following properties: (a) the shares are quantum, (b) the number of bits of leakage on each share is , where is some constant and the size of each share is qubits, and (c) the parties can share arbitrary amount of entanglement.
In fact, our construction satisfies a stronger security guarantee where the adversary can receive number of copies of its share, where is an arbitrary polynomial.
A recent interesting work by [20] also considers leakage-resilient secret sharing schemes with quantum shares. However, there are notable differences. Firstly, they consider the setting when there can be unbounded amount of classical555They also consider bounded quantum leakage in addition to the classical leakage. bits of leakage from each quantum share whereas we consider bounded leakage. On the other hand, we allow the parties to be entangled whereas they mainly focus on the LOCC setting. In fact, they show that it is not possible to achieve unbounded amount of leakage in the shared entanglement setting even with two parties; this is the reason we focus on the setting of bounded leakage. However, there seems to be a large gap between the amount of leakage leveraged in the impossibility result in [20]666Their impossibility result seems to require bits of total leakage from all the parties. and the leakage that we tolerate in our feasibility result. It is an interesting problem to close the gap. Finally, we allow each party to get arbitrary polynomially many copies of its share whereas [20] doesn’t satisfy this guarantee.
Paper Organization.
We give a technical overview in Section 1.3. In Section 2 we formally define simultaneous state indistinguishability and give basic facts about it. In Section 3, we show SSI for Haar states. In Section 4 we show cryptographic applications of our result. For a full list of preliminaries and a list of missing proofs, please refer to the full version of the paper.
1.2 Subsequent Work
Studying the simultaneous Haar indistinguishabiliy problem could have further implications beyond unclonable cryptography. Indeed, inspired by our work, a recent subsequent work [4] studied a dual problem of simultaneous Haar indistinguishabiliy problem where two parties can communicate using classical channels but cannot share entanglement. They showed similar bounds and demonstrated applications to proving black-box separations in quantum cryptography. The combination of our results implies an interesting fact: entanglement and classical communication are resources that are individually insufficient to non-locally distinguish independent vs. identical Haar states, whereas together they suffice (indeed trivialize the problem) due to quantum teleportation. Exploring the relationship between the resources of entanglement and classical communication for different non-local tasks is an interesting research direction.
1.3 Technical Overview
1.3.1 Simultaneous Haar Indistinguishability
We formally define the notion of simultaneous state indistinguishability (SSI), of which simultaneous Haar indistinguishability is a special case. We consider a non-local distinguisher where Bob and Charlie are spatially separated quantum parties who share an entangled state . Given two distributions over bipartite states, we can write the distinguishing advantage of as , where is the random variable corresponding to the output of Bob and Charlie when they get as input where is sampled from . Here, refers to Bob’s output and refers to Charlie’s output. Similarly, is the random variable corresponding to Bob and Charlie’s outputs when they receive where is sampled from .
For fixed we can ask the question: What is the maximal distinguishing advantage if Bob and Charlie are restricted to output classical bits?. We first limit our attention to a special case of this problem such that as well as:
-
1.
outputs two identical Haar random states .
-
2.
outputs two independent Haar random states .
In both and , the first half of the state will be given to Bob and the second half will be given to Charlie. Note that if we restrict our attention to Bob (or Charlie) alone, then the two cases are perfectly indistinguishable. Therefore, Bob and Charlie need to work collectively in order to achieve a non-trivial distinguishing advantage.
For now assume that the pre-shared entanglement consists of some arbitrary number () of EPR pairs, denoted by . Let and be the measurements (formally POVM elements) applied by Bob and Charlie, respectively. It is without loss of generality to assume that and are projective. In this case, we can write the distinguishing advantage of Bob and Charlie as
The second expectation equals the maximally mixed state , where is the dimension of the Haar random states. The first expectation equals the maximally mixed state over the symmetric subspace777See [37] for an introduction to the symmetric subspace., which is close to , where is the operator that swaps two registers. Hence, we can approximate the advantage as
We examine this expression in terms of tensor network diagrams888See [47] for an introduction to tensor network diagrams. [49]. Up to normalization, the effect of the EPR pairs (followed by trace) is to connect the entangled registers of and in reverse (i.e. after partially transposing one of the projectors), whereas the effect of (followed by trace) is to connect the registers of and containing the Haar states. Overall, we observe that the expression above equals
(1) |
where denotes the partial transpose operation. Notice that this is the Hilber-Schmidt inner-product of and , hence by Cauchy-Schwarz we can bound it by
where we used the fact that equals the rank of . Together with the previous approximation error we had, this gives us a bound of .
This bound is in fact tight, which can be seen by a simple attack where Bob and Charlie measure and output the first qubit of their input state. Moreover, this attack is unentangled, leading to the interesting conclusion that entangled attacks are no more powerful than unentangled attacks.
The Case of Many Copies.
Now we generalize our argument to the case when Bob and Charlie each get copies of their input. Similar to the case, we can write the projection onto the symmetric subspace over registers as
where is a register-wise permutation operator. Using this identity for Bob’s and Charlie’s registers alike, the independent case yields a sum of terms of the form . On the other hand, the identical case will give us a sum of for . We can match the coefficients up to error, and thus we can approximate the advantage as
where is the set of permutations over registers that cannot be expressed as a product of two permutations over registers. A natural idea would be to bound this expression separately for each , but it would yield a factor of which blows up very fast. Our idea instead is to group permutations based on how far they are from a product permutation. In more detail, we define as the set of permutations which obeys the identity
for some permutations over registers, where is a fixed permutation that swaps of Bob’s registers with of Charlie’s registers. Indeed, is the set of permutations that make swaps across Bob’s and Charlie’s registers. Moreover, by a combinatorial argument, we can compute the average of by averaging the identity above over , so that
where is a constant that depends on , and are projections onto the symmetric subspace over Bob’s and Charlie’s registers, respectively. Using the generalization of Equation 1 we show that
and summing this over gives us a bound of . Keep in mind that is excluded from the sum because it corresponds to product permutations.
The Case of General Entanglement.
Now suppose the entangled state shared between Bob and Charlie is arbitrary. Intuitively, we don’t expect this relaxation to help the adversary a lot since the number of EPR pairs above was unbounded, yet it requires a proof to show this. Recall that can be written as
for some choice of bases for the registers of Bob and Charlie, known as the Schmidt decomposition. An equivalent way to write this is999Here we are implicitly assuming that the dimensions of Bob and Charlie’s registers both equal the same power of 2. This is merely for convenience and does not affect the analysis.
for some density matrix , unitary , and integer . The unitary can be safely ignored by changing the basis of Charlie’s projection . Using the cyclicity of trace we can absorb in and get a similar expression for the distinguishing advantage as the maximally entangled state, where is replaced with , with being the dimension of Bob’s share of the entangled state. Following the same analysis as the EPR case results in a bound that scales with . In order to get a bound that does not depend on the amount of entanglement we perform a more refined and involved analysis coupled with a more careful application of Cauchy-Schwarz, which yields a bound of on the distinguishing advantage. An interesting open question is whether the gap between the EPR and non-EPR cases is inherent.
1.3.2 Applications
Unclonable Encryption.
The search (weak) security of unclonable encryption (UE) was known since its formal introduction [17], yet strong (CPA-style/indistinguishability) security has been an open problem. There are fundamental reasons why this problem has been difficult, including the following:
-
1.
Because the adversary learns the secret key in the challenge phase of the unclonable security experiment, it is hard to leverage traditional cryptographic tools – wherein revealing the secret key tantamounts to the compromise of security – in the construction of unclonable encryption.
-
2.
There is a lack of straightforward equivalence between unpredictability and indistinguishability in the unclonability setting. The former is used to define CPA-style security and is not transitive, hence unfriendly to hybrid arguments.
-
3.
Due to the simultaneous nature of the security experiment, extraction techniques that work for a single party often fail against two or more entangled parties.
To elaborate on the third bullet further, one can hope to deploy classical techniques for search-to-decision reductions in this setting. For instance, it has been shown that random oracles can be used to go from weak security to strong security in UE [6, 7]. In the plain model, a common classical tool is the Goldreich-Levin extraction technique [34], using which one can try the following folklore construction of UE:
-
1.
The key consists of , where is a key for a weakly secure UE scheme and is a random string.
-
2.
To encrypt a single-bit message , sample a random message , then output encryption of using , as well as .
-
3.
To decrypt, first use to recover using the decryption procedure of the weakly secure UE scheme and then recover .
To prove unclonable security of this construction, one needs the identical-challenge version of simultaneous Goldreich-Levin, where Bob and Charlie will get the same as challenge. This is unknown even though the independent-challenge version is known [44, 7].
Our main insight is to make the string in the key come in superposition, i.e. from a quantum state . Intuitively, if Bob and Charlie were to measure in the computational basis, then they would effectively receive independent values of , meaning that we can hope to use independent-challenge Goldreich-Levin. Accordingly, we look for a state such that (1) Bob and Charlie cannot simultaneously distinguish whether or not this state has been measured in the computational basis, and (2) the computational basis measurement results in a uniform value of .
Perhaps the most natural candidate for this task is to pick a Haar random state. This allows us to apply our simultaneous Haar indistinguishability result. Nonetheless, there still remain some technical challenges in the application of this concept. To begin with, we need to adapt the construction slightly to incorporate the newly acquired quantumness of . Our solution is as follows:
-
1.
The key is partially quantum:
-
The (classical) encryption key consists of , where is a random message and is a single-bit one-time-pad.
-
The (quantum) decryption key consists of and a state , where is a Haar random state.
-
-
2.
To encrypt a single-bit message , output encryption of using , as well as .
-
3.
To decrypt, first use to recover , then coherently recover followed by .
Using the simultaneous Haar indistinguishability, we can show that our construction is secure via the hybrid method. Note that we can do this because our notion of simultaneous-state-indistinguishability is strong enough that it is amenable to the use of hybrids.
In more detail, we reach an indistinguishable hybrid experiment where the Bob and Charlie get keys which use independently generated Haar random states. Equivalently, Bob gets and Charlie gets for independent .
Next, we move to a hybrid which is the weak security (i.e. search security) experiment of the underlying unclonable encryption scheme, so that Bob and Charlie need to output each given the key . Unfortunately, even though and are independent in the previous hybrid, independent-challenge simultaneous Goldreich-Levin [44, 7] is insufficient due to the correlation between the bits and , namely . To overcome this issue, we prove exactly what we need, which we call correlated simultaneous quantum Goldreich-Levin101010As a side note, this lemma resolves an open question in [44], implying that their construction achieves a more desirable notion of security. 111111Previously, the work of [3] explicitly stated the correlated Goldreich-Levin problem over large finite fields as a conjecture. (Lemma 30), which can be summarized as follows:
Correlated Goldreich-Levin: Suppose that Bob is given input and Charlie is given input , where are independent strings and are uniform bits satisfying the correlation . If (Bob, Charlie) can output with probability , then there is an extractor that extracts from (Bob, Charlie) with probability .
To prove this lemma we first tackle the correlation between and . Consider who takes as input , samples himself uniformly, and runs Bob on input to obtain ; similarly consider who takes as input, samples and runs Charlie on input to obtain . Now that the input bits are uncorrelated, (), who output , are expected to have worse success probability than (Bob, Charlie). However, we can in turn relax the success criterion for () to merely output bits that satisfy in order to counteract this lack of correlation. In other words, now () are additionally allowed to be both incorrect. Indeed, we show that the success probability of () in this case is at least that of (Bob, Charlie), i.e. . To show this fact, we define as the event that . Conditioned on , Bob and Charlie will output with probability by our assumption. In addition, the event is independent of Bob’s (or Charlie’s) marginal output due to the fact that the players’ correlation satisfies no-signalling. To see this, notice that the bits and can each independently control the event . We utilize this important observation to show the desired result. Another way to interpret this reduction is as follows: the correlation that (Bob, Charlie) require in order to output appears as a correlation in the output of (), who take uncorrelated bits as input.
After this reduction, it seems that we still cannot use the original independent-challenge simultaneous Goldreich-Levin because of the relaxed success criterion above. Luckily, by examining the proof of [7] we see that this condition is sufficient without additional work for the existence of (ExtBob, ExtCharlie) who can extract simultaneously.
Many-Copy Security.
For -copy security, where Bob and Charlie get copies of the decryption key in the unclonable security experiment, we need to be at most linear in , for otherwise Bob and Charlie can learn using Gaussian elimination. In the proof, we similarly reach a hybrid where the Haar random states given to Bob and Charlie are independent. Then, we need an extra step where we switch to a hybrid in which Bob gets as input for independent samples (instead of being generated from copies of a Haar random state) and similarly Charlie gets for independently generated . We show that the success probability of Bob and Charlie does not decrease from this change. To show this, we argue that that given Bob can prepare
where is a Haar random state. In the expression above, corresponds to the register that holds Goldreich-Levin samples, which are generated from copies of a Haar random state rather than independent samples. Recall that can be written as a random vector in the type basis. Using this fact, Bob can coherently apply a random permutation to the values , after which he can uncompute the permutation . We can argue similarly for Charlie, since their inputs originate from independent Haar distributions. This argument in fact requires the strings to be distinct, which fortunately holds with high probability by the birthday bound.
Note that the input above given to Bob can be thought of as alongside random samples of . In the final step, we apply our correlated Goldreich-Levin result in the presence of this extra information to reach the search security experiment for the weakly secure UE scheme. In this experiment, the extra information can be guessed by Bob and Charlie, hence if is bounded by a linear function of the security still holds.
Single-Decryptor Encryption.
Single-decryptor encryption is a primitive that closely resembles unclonable encryption. It is an encryption scheme in which the decryption key is unclonable. In the security experiment, Alice tries to clone a quantum decryption key and split it between Bob and Charlie, who then try to decrypt a ciphertext they receive using their shares of the key. Depending on the correlation of these ciphertexts, one can define identical-challenge or independent-challenge security. We adapt our construction of unclonable encryption with quantum decryption keys to construct single-decryptor encryption with quantum ciphertexts. Our construction can be summarized as follows:
-
1.
The encryption key consists of a key as well as a random message for a weakly secure UE scheme. The quantum decryption key contains and encryption of using .
-
2.
To encrypt a one-bit message , output as well as , where is a Haar random state.
-
3.
To decrypt, first recover and then coherently compute .
We can show that this construction is secure if Bob and Charlie are given copies of the same ciphertext for . The proof is nearly identical to the security proof of our UE construction above. For more clear exposition, in the technical sections we first present our construction of single-decryptor encryption (Section 4.1), followed by that of unclonable encryption (Section 4.2).
Classical-Leakage-Resilient Secret-Sharing.
As another application of simultaneous Haar indistinguishability, we construct a 2-out-of- quantum secret-sharing scheme for a single-bit classical message. The construction is as follows:
-
1.
The shares of bit are identical Haar random states and the shares of are independent Haar random states . In addition, we give copies of their share to all parties .
-
2.
Any two parties can recover the message by applying SWAP tests between their secrets. If , then all the tests will succeed. On the other hand, if , then with high probability the independent Haar random states held by and will be almost orthogonal, therefore the number of SWAP tests that pass will be concentrated near by a Chernoff bound.
Formally, we show that remains hidden in the presence of -bits of classical leakage from each party. This amounts to showing a many-party and many-bit generalization of simultaneous Haar indistinguishability (SHI), that is, either all parties get (copies of) the same Haar random state or they get (copies of) independent Haar random states. Firstly, we go from 1-bit SHI to -bit SHI for 2 parties. This can be achieved by a union bound, which incurs a multiplicative loss of in security. And then we show an equivalence between SHI in the cases of (1) parties each getting copies and (2) parties each getting copies. This can be seen as distributing a fixed number of Haar random states among more parties. In the proof we use hybrids, doubling the number of parties at each hybrid. We show by an additional hybrid argument that we incur a multiplicative loss of at each step, hence a multiplicative loss of in total after steps. Putting everything together, we show that we can allow bits of leakage from each party, where is the number of qubits of each copy of a share. The number of copies () given to each party can be an arbitrary polynomial, which lets us amplify the correctness of the scheme. An interesting open question is to get rid of the exponential dependence on the number of bits leaked (), which would imply that our construction tolerates unbounded polynomial leakage.
1.4 Notation
We write to denote the natural logarithm. We write . We use the notation to denote the inner product over , i.e. for classical strings we have . We denote the set of -dimensional pure quantum states by . We sometimes write for simplicity. For a complex matrix (or operator) , we write to denote its transpose and to denote its entry-wise complex conjugation, both with respect to the computational basis. denotes the total-variation distance between random variables .
2 Simultaneous State Indistinguishability
Terminology.
Below, represents a probability distribution over pure states. Particularly, we will consider bipartite pure states and non-local adversaries as distinguishers, where the register will be given to and the register will be given to .
2.1 Definitions
Remark 5.
A distribution has a unique representation as a quantum mixed state , whereas a quantum mixed state can represent many distributions. Accordingly, we can apply our results to mixed states for which we can find an appropriate distribution that satisfies .
Definition 6 (Simultaneous State Indistinguishability).
We say that two distributions and are -simultaneous state indistinguishable (-SSI) against a non-local adversary if the following holds for every pair of bits :
Here, gets the register of and gets the register .
Of interest to us is the case when and , where we define and as follows121212Here stands for identical and stands for independent.:
Sample and output
Sample and output , i.e. .
In this case, we refer to the above notion as -simultaneous state indistinguishability (-SSI). Note that up to a constant factor this is equivalent to the output distributions of with respect to having total variation distance . Also note that we can fix the bits without loss of generality.
Definition 7 (-SSI).
We say that (-SSI) holds if and defined above are -SSI against all non-local adversaries .
Remark 8.
When it is clear from the context, we omit the mention of the registers and .
2.1.1 SSI as a metric
This notion defines a metric over bipartite states, namely is the smallest value of such that and are simultaneously indistinguishable. Equivalently,
(2) |
It is easy to see that this is a valid metric131313Technically, a pseudometric since two different states may have distance 0..
Since any binary measurement is a linear combination of projective measurements by the Spectral Theorem, we have the following fact.
Lemma 9.
can be equivalently defined by restricting to be projective measurements.
2.1.2 Extending to Many-Bit Output
We can extend the definition of SSI such that the non-local adversary can output many bits in each register. We then require that the total variation distance between the collective outputs of and for the two distributions is small.
Definition 10 (-SSI).
We say that -SSI holds if for any nonlocal adversary and any we have
Note that -SSI and -SSI are equivalent up to a constant factor on . There is a straightforward relation between -SSI and -SSI using the union bound, which we formally state below.
Lemma 11.
Suppose -SSI holds, then -SSI holds for all .
Proof.
For any non-local adversary and any , we have
by -SSI. This is because () can associate (respectively, ) with 0 and every other string with 1. By summing over all and dividing by we get the desired result.
2.1.3 Extending to Many Copies
For a distribution , denote by the distribution that samples and outputs . Then, we can consider -SSI or -SSI as extensions where and each get copies of their respective inputs.
2.1.4 Extending to Many Parties
We can consider as the distinguisher a -party non-local adversary . By giving every party copies of a quantum state generated either identically or independently we can generalize Definition 10:
Definition 12 (()-SSI against Parties).
We say that -SSI holds against parties if for any -party nonlocal adversary and any we have
In general, SSI against many parties is weaker than regular SSI with the same number of copies and the same total output length, which we state formally below.
Lemma 13.
Suppose that -SSI holds (against 2 parties), then -SSI holds against parties.
Corollary 14.
Suppose that -SSI holds, then -SSI holds against parties.
2.2 Distinguishing Bell-States
In this section, we use the Bell basis over a 2-qubit system as a warm-up example to demonstrate some facts about simultaneous state indistinguishability. By the Bell basis we mean
Note that the Bell basis is symmetric for the purposes of this section, meaning any fact we show about a pair of Bell states will also apply to any other pair of Bell states. We start off by demonstrating that the non-local distance can be strictly less than LOCC distance. Recall that two orthogonal Bell states can be perfectly distinguished using LOCC measurements.
Lemma 15 (Comparison to LOCC).
Let be orthogonal Bell states. Then, .
Proof.
It suffices to consider projective . After that, the only non-trivial case is when they both are rank-1 projections, in which case it is easy to show
Next, we show that a non-local distinguisher with an arbitrary number of EPR pairs is no more powerful than unentangled distinguishers for the same problem.
Lemma 16 (Entanglement has no effect).
Let be orthogonal Bell states and let denote EPR pairs. Then,
2.3 Impossibility Results about SSI
There are many distributions that are simultaneously distinguishable. We give some examples below by identifying for which -SSI does not hold for small .
Claim 17.
Suppose is a (classical) distribution on such that , for some . Then, -simultaneous state indistinguishability does not hold for any .
Claim 18.
Let and . Let be a Clifford circuit. That is, appends qubits initialized to zeros to its input and applies a sequence of Clifford gates. Define as follows: sample and then output . Define as follows: sample and then output . Then, the distributions and are -simultaneous state distinguishable for all .
3 Simultaneous Haar Indistinguishability
We show that SSI can be instantiated using Haar random states.
3.1 Single-Copy Case
Theorem 19 (Simultaneous Haar Indistinguishability (SHI)).
-simultaneous state indistinguishability holds for .
Remark 20.
The entangled state held by above can have arbitrary dimension. In particular, the proof shows that an arbitrary number of EPR pairs has no asymptotic advantage in distinguishing identical vs. independent Haar states, for the advantage is in both cases.
3.2 Generalization to Many Copies
We generalize Theorem 19 to show indistinguishability when the non-local distinguisher is given many copies of the input state. The proof has the same overall structure, but requires some additional ideas. We start by listing a useful lemma.
Lemma 21.
Let be the set of permutations over such that
Define as the permutation operator over registers , where we match with and with . Then,
where is the permutation that swaps with for .
Theorem 22 (-Copy Simultaneous Haar Indistinguishability (SHI)).
Let and . Let be the distribution defined by sampling copies of a state from . Then, -simultaneous state indistinguishability holds.
4 Applications
We present applications of simultaneous Haar indistinguishability (Section 3) to single-decryptor encryption (Section 4.1) and unclonable encryption (Section 4.2). Ordinarily, single-decryptor encryption is defined with classical ciphertexts and quantum decryption keys, whereas unclonable encryption is defined using quantum ciphertexts and classical encryption/decryption keys. We achieve relaxed notions of both primitives above: namely, we additionally allow quantum ciphertexts in single-decryptor encryption and quantum decryption keys in unclonable encryption.
In Section 4.3, we show how to construct leakage-resilient quantum secret sharing of classical messages, which additionally guarantees security against an eavesdropper that learns classical leakage of all the shares.
4.1 Single-Decryptor Encryption with Quantum Cipertexts
4.1.1 Definitions
We adopt the definition of single-decryptor encryption by [33] to the setting where the ciphertexts can be quantum.
Definition 23 (Single-Decryptor Encryption).
A single-decryptor encryption (SDE) scheme is a tuple of QPT algorithms :
-
takes as input a security paramter. It outputs a classical encryption key and a one-time quantum decryption key .
-
takes as input an encryption key , and a classical message . It outputs a quantum ciphertext . We require that is pseudo-deterministic.
-
takes as input a quantum decryption key , a quantum ciphertext and outputs a classical message .
Definition 24 (Correctness).
A SDE scheme with quantum ciphertexts is correct if for any security parameter and any message we have
Before defining security, we introduce a notation , which means sampling randomness and running for times.
Definition 25 (Security of SDE).
An SDE scheme is called (information-theoretically) secure against identical ciphertexts if for any cloning adversary and any pair of messages we have
where denotes the register of the bipartite state for .
Remark 26 (Identical Ciphertexts).
In Definition 25 we consider security against identical ciphertexts. One can similarly define security against ciphertexts that are independently generated. This alternate definition was achieved in the plain model by [7], and it only requires independent-challenge Goldreich-Levin.
Remark 27.
Note that Definition 25 need not be physical for an arbitrary scheme without the requirement that is pseudo-deterministic due to the fact that may be unclonable even for the encryptor. Nonetheless, our construction satisfies this condition, with the classical randomness of being used for sampling a Haar random state.
Below, we consider a stronger security definition where many copies of the quantum ciphertext are given to the adversary. This matches the case of classical ciphertext more closely, since classical ciphertexts can be cloned arbitrarily. Another implication of this stronger definition is that security holds against adversaries who can clone the quantum ciphertexts.
Definition 28 (-Copy Security of SDE).
An SDE scheme is called (information-theoretically) -copy secure against identical ciphertexts if for any cloning adversary and any pair of messages we have
where denotes the register of the bipartite state for .
4.1.2 Construction
Let be a one-time unclonable encryption scheme with -weak unclonable security and message space , with , where is a constant. Let , so that:
-
1.
-SSI holds for some by Theorem 22 as long as is negligible.
-
2.
.
We construct SDE for single-bit messages () secure against identical ciphertexts as follows:
-
samples a random message and a key . It computes . It outputs an encryption key and a decryption key .
-
samples . It parses and computes the state . It outputs a quantum ciphertext . Note that is pseudo-deterministic given that it can sample from using classical randomness.
-
parses . It computes . It computes and measures the second register to obtain , where is the unitary defined as . It outputs .
Remark 29.
Since is bounded (see Theorem 34), we can use a -state design to instantiate the Haar random state used in the construction. We can similarly use a -state design to instantiate our construction of unclonable encryption in Section 4.2.
From the correctness of , it follows that recovers (with probability negligibly close to 1) from , where is an encryption of .
4.1.3 Security Proof
We first show a lemma that is needed in our security proof:
Lemma 30 (Simultaneous Quantum Goldreich-Levin with Correlated Input).
Let be a cloning adversary that given141414Here is given to and then a bipartite state is given to , in the challenge phase. , where are i.i.d. uniform strings and are random bits satisfying , can output with probability at least . Then, there is an extractor that given input outputs (running as a subprotocol) with probability .
Remark 31.
Lemma 30 proves a special case of the simultaneous inner product conjecture postulated in [3]. Roughly speaking, the simultaneous inner product conjecture states that if a set of bipartite states is such that any non-local adversary given , where , cannot recover (except with negligible probability) then and cannot distinguish Goldreich-Levin samples versus uniform samples (except with negligible advantage). The conjecture is parameterized by the distribution of the samples and also by the algebraic field associated with the samples. Lemma 30 shows that the conjecture is true for a correlated distribution of samples and when the field in question is .
Remark 32.
Lemma 30 resolves an important technical issue we will face in our unclonable security proof, similar to the one faced by [44]151515See Remark 7 (pp. 53) in [44].. Namely, and seem to get additional information about the hidden values by holding secret shares of their XOR value. Above we show that this is in fact not the case, i.e. the adversary does not get additional power from these shares. In [44], the authors utilized alternative security definitions to overcome this issue.
Theorem 33.
above is secure against identical ciphertexts.
-Copy Security.
We show that our construction remains secure if up to copies of the quantum ciphertext is given to the adversary in the unclonable security experiment.
Theorem 34.
Let be a constant and , then above is -copy secure against identical ciphertexts.
By instantiating with the construction of [17], we can set and thus . Therefore, by setting we get the following corollary:
Corollary 35.
For any , there exists a single-decryptor encryption scheme with quantum ciphertexts -copy secure against identical ciphertexts (Definition 28) in the plain model.
Remark 36 (Bounded Number of Copies).
Our construction is not -copy secure against identical ciphertexts if is an unbounded polynomial due to a simple attack that measures each copy of the ciphertext in the computational basis. Every measurement (except the first) will give a random linear constraint on the bits of , hence a linear number of copies on average suffice to solve for entirely. Nonetheless, we can set accordingly for any fixed polynomial .
4.2 Unclonable Encryption with Quantum Keys
Using our ideas in Section 4.1, we construct unclonable encryption with quantum keys in the plain model. Besides allowing the decryption key to be quantum, we do not relax the syntax of unclonable encryption. In particular, we achieve identical-challenge security with quantum challenges. Due to its similarity with Section 4.1, we leave the details of this section for the full version.
4.3 Secret Sharing
Definition.
Below we formally define a quantum secret sharing scheme for a single-bit message , which is secure against an eavesdropper if only classical strings are leaked from the quantum shares.
Definition 37 (2-out-of- Classical-Leakage-Resilient Quantum Secret Sharing).
Let . A 2-out-of- classical-leakage-resilient quantum secret sharing scheme is a tuple of algorithms with the following syntax:
-
takes as input a security parameter and a message ; it outputs a product state over registers with qubits each.
-
takes as input two indices and quantum shares over registers . It outputs a message .
It satisfies the following properties:
-
1.
-Correctness: For all we have
-
2.
Perfect Secrecy: For all , we have
-
3.
-bit Classical-Leakage-Resilience: For any quantum algorithms that output classical bits, any -partite state , and any distinguisher , we have
where is the -th register of .
Remark 38.
Note that we consider the perfect secrecy and the classical leakage resilience properties separately. It is natural to ask if it is possible to combine the two properties into a stronger property that guarantees security even against adversaries who in addition to receiving one of the shares, also receives as input classical leakage on the rest of the shares. Unfortunately, this stronger property cannot be satisfied due to a simple attack via quantum teleportation. Thus, we need to consider these two properties separately.
Remark 39.
The above notion can be generalized in many ways. Firstly, for simplicity, we define the shares to be pure states and we could consider a general notion where the shares could be entangled with each other. Secondly, we can consider sharing schemes guaranteeing security against different adversarial access structures.
4.3.1 Construction
We will construct the primitive above using the Haar distribution for . This satisfies -SSI for by Corollary 14 and Theorem 22. can in turn be instantiated using a -design. We will pick , so that the construction is efficient.
-
: Set and . If , it samples copies of and outputs . If , it independently samples copies of for and outputs .
-
: It parses and as registers. It applies a SWAP test to the registers and for . It outputs if at least of the SWAP tests succeed and outputs otherwise.
4.3.2 Correctness and Secrecy
The construction above has -correctness for . Note that for each SWAP test will succeed with probability , so will always output the correct message. If on the other hand, each SWAP test will succeed with probability negligibly close to , so by a Chernoff bound will output with only negligible probability since .
Perfect secrecy is trivial given that each share is distributed according to .
4.3.3 Classical Leakage Resilience
By Corollary 14 and Theorem 22, the total variation distance between the output distributions of any -bit leakage functions with respect to shares of and is at most
References
- [1] Scott Aaronson. Quantum copy-protection and quantum money. In 2009 24th Annual IEEE Conference on Computational Complexity, pages 229–242. IEEE, 2009. doi:10.1109/CCC.2009.42.
- [2] Divesh Aggarwal, Ivan Damgård, Jesper Buus Nielsen, Maciej Obremski, Erick Purwanto, Joao Ribeiro, and Mark Simkin. Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II 39, pages 510–539. Springer, 2019. doi:10.1007/978-3-030-26951-7_18.
- [3] Prabhanjan Ananth and Amit Behera. A modular approach to unclonable cryptography. In Leonid Reyzin and Douglas Stebila, editors, Advances in Cryptology – CRYPTO 2024, pages 3–37, Cham, 2024. Springer Nature Switzerland. doi:10.1007/978-3-031-68394-7_1.
- [4] Prabhanjan Ananth, Aditya Gulati, and Yao-Ting Lin. Cryptography in the common haar state model: Feasibility results and separations. In Elette Boyle and Mohammad Mahmoody, editors, Theory of Cryptography, pages 94–125, Cham, 2025. Springer Nature Switzerland.
- [5] Prabhanjan Ananth and Fatih Kaleoglu. Unclonable encryption, revisited. In Theory of Cryptography Conference, pages 299–329. Springer, 2021. doi:10.1007/978-3-030-90459-3_11.
- [6] Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, and Mark Zhandry. On the feasibility of unclonable encryption, and more. In Yevgeniy Dodis and Thomas Shrimpton, editors, Advances in Cryptology – CRYPTO 2022, pages 212–241, Cham, 2022. Springer Nature Switzerland. doi:10.1007/978-3-031-15979-4_8.
- [7] Prabhanjan Ananth, Fatih Kaleoglu, and Qipeng Liu. Cloning games: A general framework for unclonable primitives. In CRYPTO, 2023.
- [8] Prabhanjan Ananth, Fatih Kaleoglu, and Henry Yuen. Simultaneous haar indistinguishability with applications to unclonable cryptography, 2024. arXiv:2405.10274, doi:10.48550/arXiv.2405.10274.
- [9] Prabhanjan Ananth and Rolando L. La Placa. Secure software leasing. In Anne Canteaut and François-Xavier Standaert, editors, Advances in Cryptology – EUROCRYPT 2021, pages 501–530, Cham, 2021. Springer International Publishing. doi:10.1007/978-3-030-77886-6_17.
- [10] Boaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. On the (im) possibility of obfuscating programs. In Annual international cryptology conference, pages 1–18. Springer, 2001. doi:10.1007/3-540-44647-8_1.
- [11] James Bartusek, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa. Obfuscation of pseudo-deterministic quantum circuits. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing, pages 1567–1578, 2023. doi:10.1145/3564246.3585179.
- [12] James Bartusek and Giulio Malavolta. Indistinguishability obfuscation of null quantum circuits and applications. In ITCS, 2022.
- [13] Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, and Tal Rabin. On the local leakage resilience of linear secret sharing schemes. Journal of Cryptology, 34:1–65, 2021.
- [14] Charles H Bennett, Gilles Brassard, Claude Crépeau, Richard Jozsa, Asher Peres, and William K Wootters. Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Physical review letters, 70(13):1895, 1993.
- [15] Charles H Bennett, David P DiVincenzo, Christopher A Fuchs, Tal Mor, Eric Rains, Peter W Shor, John A Smolin, and William K Wootters. Quantum nonlocality without entanglement. Physical Review A, 59(2):1070, 1999.
- [16] Anne Broadbent and Raza Ali Kazmi. Constructions for quantum indistinguishability obfuscation. In International Conference on Cryptology and Information Security in Latin America, pages 24–43. Springer, 2021. doi:10.1007/978-3-030-88238-9_2.
- [17] Anne Broadbent and Sébastien Lord. Uncloneable Quantum Encryption via Oracles. In Steven T. Flammia, editor, 15th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2020), volume 158 of Leibniz International Proceedings in Informatics (LIPIcs), pages 4:1–4:22, Dagstuhl, Germany, 2020. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.TQC.2020.4.
- [18] Francesco Buscemi. All entangled quantum states are nonlocal. Physical review letters, 108(20):200401, 2012.
- [19] Alper Çakan and Vipul Goyal. Unclonable cryptography with unbounded collusions. Cryptology ePrint Archive, 2023.
- [20] Alper Cakan, Vipul Goyal, Chen-Da Liu-Zhang, and João Ribeiro. Unbounded leakage-resilience and intrusion-detection in a quantum world. Cryptology ePrint Archive, 2023.
- [21] Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Ashutosh Kumar, Xin Li, Raghu Meka, and David Zuckerman. Extractors and secret sharing against bounded collusion protocols. In 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 1226–1242. IEEE, 2020. doi:10.1109/FOCS46700.2020.00117.
- [22] Sitan Chen, Jordan Cotler, Hsin-Yuan Huang, and Jerry Li. Exponential separations between learning with and without quantum memory. In FOCS, 2021.
- [23] Andrew M Childs, Debbie Leung, Laura Mančinska, and Maris Ozols. A framework for bounding nonlocality of state discrimination. Communications in Mathematical Physics, 323:1121–1153, 2013.
- [24] Eric Chitambar and Min-Hsiu Hsieh. Asymptotic state discrimination and a strict hierarchy in distinguishability norms. Journal of Mathematical Physics, 55(11), 2014.
- [25] Eric Chitambar, Debbie Leung, Laura Mančinska, Maris Ozols, and Andreas Winter. Everything you always wanted to know about locc (but were afraid to ask). Communications in Mathematical Physics, 328:303–326, 2014.
- [26] Andrea Coladangelo and Sam Gunn. How to use quantum indistinguishability obfuscation. In STOC, 2024.
- [27] Andrea Coladangelo, Jiahui Liu, Qipeng Liu, and Mark Zhandry. Hidden cosets and applications to unclonable cryptography. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology – CRYPTO 2021, pages 556–584, Cham, 2021. Springer International Publishing. doi:10.1007/978-3-030-84242-0_20.
- [28] Andrea Coladangelo, Christian Majenz, and Alexander Poremba. Quantum copy-protection of compute-and-compare programs in the quantum random oracle model. Quantum, 8:1330, May 2024. doi:10.22331/q-2024-05-02-1330.
- [29] David P DiVincenzo, Debbie W Leung, and Barbara M Terhal. Quantum data hiding. IEEE Transactions on Information Theory, 48(3):580–598, 2002. doi:10.1109/18.985948.
- [30] Llorenç Escolà-Farràs, Jaròn Has, Maris Ozols, Christian Schaffner, and Mehrdad Tahmasbi. Parallel repetition of local simultaneous state discrimination. arXiv preprint arXiv:2211.06456, 2022.
- [31] Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM Journal on Computing, 45(3):882–929, 2016. doi:10.1137/14095772X.
- [32] Julio Gea-Banacloche. Hiding messages in quantum data. Journal of Mathematical Physics, 43(9):4531–4536, 2002.
- [33] Marios Georgiou and Mark Zhandry. Unclonable decryption keys. IACR Cryptol. ePrint Arch., 2020:877, 2020. URL: https://eprint.iacr.org/2020/877.
- [34] O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, STOC ’89, pages 25–32, New York, NY, USA, 1989. Association for Computing Machinery. doi:10.1145/73007.73010.
- [35] Vipul Goyal and Ashutosh Kumar. Non-malleable secret sharing. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, pages 685–698, 2018. doi:10.1145/3188745.3188872.
- [36] Saronath Halder, Manik Banik, Sristy Agrawal, and Somshubhro Bandyopadhyay. Strong quantum nonlocality without entanglement. Physical review letters, 122(4):040403, 2019.
- [37] Aram W. Harrow. The church of the symmetric subspace, 2013. arXiv:1308.6595.
- [38] Aram W. Harrow. Approximate orthogonality of permutation operators, with application to quantum information, 2023. arXiv:2309.00715.
- [39] Patrick Hayden, Debbie Leung, and Graeme Smith. Multiparty data hiding of quantum information. Physical Review A, 71(6):062339, 2005.
- [40] Carl W Helstrom. Quantum detection and estimation theory. Journal of Statistical Physics, 1:231–252, 1969.
- [41] Taiga Hiroka, Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa. Robust combiners and universal constructions for quantum cryptography. arXiv preprint arXiv:2311.09487, 2023.
- [42] Yael Tauman Kalai and Leonid Reyzin. A survey of leakage-resilient cryptography. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pages 727–794. Association for Computing Machinery, 2019. doi:10.1145/3335741.3335768.
- [43] Fuyuki Kitagawa and Ryo Nishimaki. One-out-of-many unclonable cryptography: Definitions, constructions, and more. In Theory of Cryptography Conference, pages 246–275. Springer, 2023. doi:10.1007/978-3-031-48624-1_10.
- [44] Srijita Kundu and Ernest Y. Z. Tan. Device-independent uncloneable encryption, 2022. doi:10.48550/arXiv.2210.01058.
- [45] Christian Majenz, Maris Ozols, Christian Schaffner, and Mehrdad Tahmasbi. Local simultaneous state discrimination, 2021. arXiv:2111.01209.
- [46] William Matthews, Stephanie Wehner, and Andreas Winter. Distinguishability of quantum states under restricted families of measurements with an application to quantum data hiding. Communications in Mathematical Physics, 291:813–843, 2009.
- [47] Antonio Anna Mele. Introduction to haar measure tools in quantum information: A beginner’s tutorial, 2024. arXiv:2307.08956.
- [48] Michael Nathanson. Distinguishing bipartitite orthogonal states using locc: Best and worst cases. Journal of Mathematical Physics, 46(6), 2005.
- [49] Roger Penrose. Applications of negative dimensional tensors. Welsh, D., Ed., Combinatorial Mathematics and Its Applications, pages 221–244, 1971.
- [50] Asher Peres and William K Wootters. Optimal detection of quantum information. Physical Review Letters, 66(9):1119, 1991.
- [51] Marco Piani, Varun Narasimhachar, and John Calsamiglia. Quantumness of correlations, quantumness of ensembles and quantum data hiding. New Journal of Physics, 16(11):113001, 2014.
- [52] Robert Raussendorf and Tzu-Chieh Wei. Quantum computation by local measurement. Annual Review of Condensed Matter Physics, 3(Volume 3, 2012):239–261, 2012. doi:10.1146/annurev-conmatphys-020911-125041.
- [53] Akshayaram Srinivasan and Prashant Nalini Vasudevan. Leakage resilient secret sharing and applications. In Annual International Cryptology Conference, pages 480–509. Springer, 2019. doi:10.1007/978-3-030-26951-7_17.
- [54] Stephen Wiesner. Conjugate coding. ACM Sigact News, 15(1):78–88, 1983. doi:10.1145/1008908.1008920.
- [55] Mark Zhandry. Quantum lightning never strikes the same state twice. In Yuval Ishai and Vincent Rijmen, editors, Advances in Cryptology – EUROCRYPT 2019, pages 408–438, Cham, 2019. Springer International Publishing. doi:10.1007/978-3-030-17659-4_14.