A Quantum Cloning Game with Applications to Quantum Position Verification
Abstract
We introduce a quantum cloning game in which separate collaborative parties receive a classical input, determining which of them has to share a maximally entangled state with an additional party (referee). We provide the optimal winning probability of such a game for every number of parties , and show that it decays exponentially when the game is played times in parallel. These results have applications to quantum cryptography, in particular in the topic of quantum position verification, where we show security of the routing protocol (played in parallel), and a variant of it, in the random oracle model.
Keywords and phrases:
Quantum position verification, cloning game, random oracle, parallel repetitionFunding:
Léo Colisson Palais: European Union (ERC, ASC-Q, 101040624) and the Dutch Ministry of Economic Affairs and Climate Policy (EZK), as part of the Quantum Delta NL programme.Copyright and License:
2012 ACM Subject Classification:
Security and privacy CryptographyEvent:
20th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2025)Editor:
Bill FeffermanSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Non-local correlations have extensively been studied in the field of quantum information theory, see e.g. [12]. Bell [9] originally showed that distant parties sharing quantum resources can reproduce correlations that could never be attained by any classical theory. Often, non-local correlations are studied as non-local games, which provide an operational framework for understanding them. These games are interesting per se from a fundamental point of view, since they give rise to understanding the underlying essence of nature, but they additionally lead to applications such as secure key distribution [1], certified randomness [33], reduced communication complexity [14], self-testing [32, 37], and computation [5].
A vast literature in non-local games covers the scenario where a classical referee sends questions to non-communicating collaborative parties, and their task is to produce answers according to a certain publicly-known predicate, where the questions and answers are all classical. The best-known non-local game is the CHSH game [18]. Non-locality has also been investigated in terms of supersets of non-local games, called monogamy-of-entanglement (MoE) games [38], where a quantum referee sends the same classical question to the players and the parties have to guess the (classical) outcome of a referee’s quantum measurement (depending on the question). MoE games have been used to provide security proofs for the quantum cryptographic primitives device-independent quantum key distribution [10] and quantum position verification [28]. Such games were later generalized under the name of extended non-local games [27].
Here, we introduce the concept of the quantum cloning game, played by distant parties and a quantum referee. The referee publically announces a party, i.e., sends the same classical question to all the players, and the chosen party has to end up with the maximally entangled (EPR) state with the referee. At the beginning of the game, the players are allowed to share any quantum state with the referee. In this work, we show that the optimal winning probability for players using any quantum resources is given by , converging to for a large number of players. We analyze the game when it is played times in parallel, showing an exponential decay in of the optimal winning probability. Additionally, the quantum cloning game can be generalized to any arbitrary quantum state instead of an EPR state, and we provide its optimal winning probability.
We show that these results have applications in quantum position verification (QPV), which is a cryptographic primitive consisting of verifying the location of an untrusted party. Securely implementing this primitive is unachievable using only classical information, because a general attack exists even when using computational assumptions [17]. Due to the no-cloning theorem [41] the general classical attack does not apply if quantum information is used instead [28, 31], however, a general quantum attack exists which requires exponential entanglement [13, 8]. This means that hope for protocols secure against reasonable amounts of entanglement is alive, and indeed there has been much analysis on attacks on specific protocols [2, 28, 29, 34, 16, 36, 21, 22, 25, 20], and security analysis under extra assumptions [30, 24], such as the random oracle model [39]. A generic 1-dimensional (the main ideas generalize to higher dimensions) QPV protocol is described in the following way: two verifiers V0 and V1, placed on the left and right of an untrusted prover P, supposedly at the position , send quantum and classical messages to P at the speed of light, and he has to pass a challenge and reply correctly to them at the speed of light as well, if so, the verifiers accept, and if any of them receives a wrong answer or the timing does not correspond with the time it would have taken for light to travel back from the honest prover, the verifiers reject. The time consumed by the prover to perform the challenge is assumed to be negligible, and the verifiers are assumed to have perfectly-synchronized clocks.
In this work, we consider the routing QPV protocol [28], which has an appealing simple form: the prover has to return a received qubit to one of the verifiers, where the choice of verifier is a function of the classical information sent by the verifiers [28]. Besides the theoretical interest of this protocol, it is also an appealing candidate for free-space quantum position verification, when the quantum messages can travel with the vacuum speed of light, since the hardware of the prover could hypothetically be as simple as a mirror or an optical switch. Despite theoretical work on this protocol [15, 20, 11, 3, 6], there were gaps left in our understanding relative to measurement-based QPV protocol variants: namely the security of parallel repetition of this protocol against unentangled attackers and attackers who pre-share a linear (in the security parameter) amount of entangled qubits, and its security in the random-oracle model against arbitrary adversaries. As an application of the quantum cloning game, we show the security of the routing protocol in these scenarios.
2 Preliminaries
For , we will denote . Let , be finite-dimensional Hilbert spaces, we denote by the set of bounded operators from to and . Denote by the set of quantum states on , i.e. . A pure state will be denoted by a ket . The maximally entangled state or EPR pair is . We denote the identity matrix by . For , we denote its Schatten -norm by . We will use the notation to denote .
Definition 1.
Let . Two permutations are said to be orthogonal if for all .
Lemma 2 (Lemma 2 in [38]).
Let be projectors acting on a Hilbert space . Let be a set of mutually orthogonal permutations. Then,
| (1) |
Remark 3.
There always exist a set of permutations of that are mutually orthogonal, an example is the cyclic shifts.
Lemma 4 (Lemma 1 in [38]).
Let such that . Then it holds that .
3 -party quantum cloning game
In the following definition, we introduce the quantum cloning game.
Definition 5.
The -party quantum cloning game, shortly denoted by QCGk, consists of a referee with associated Hilbert space and collaborative distant parties (players) . Before the game starts, the parties prepare a joint quantum state of arbitrary dimension between themselves and the referee. During the game, the referee sends , drawn uniformly at random, to all the collaborative parties. The players win the game if and only if the party (holding a qubit register ) ends up sharing the maximally entangled state with the referee, i.e. if a projection onto yields the correct outcome.
See Figure 1 for a schematic representation of the . Intuitively, in such a game, the referee publically announces which party has to create an entangled state with herself.
A strategy for the QCGk is described by a quantum state , where, for , registers are of the same dimension as and are auxiliary systems of arbitrary dimension that each party possess, and completely positive trace-preserving (CPTP) maps , where the subscript indicates that the map has input and output registers and , respectively, i.e. . The winning probability of such a game, given the strategy , is provided by
| (2) |
The optimal winning probability of such games is given by
| (3) |
where the supremum is taken over all the possible strategies over all possible Hilbert spaces. The following theorem gives the optimal winning probability of this game for every number of parties .
Theorem 6.
For every , the optimal winning probability of the is given by
| (4) |
Intuitively, this game cannot be perfectly won since, otherwise, it would be possible to have maximal entanglement between the referee and each of the parties, and this is not possible since entanglement is monogamous [19]. In the proof, see below, the key part is to show that the optimal winning probability is attainable by the actions of the players being independent of , intuitively, each party acts as if they were chosen to reproduce the maximally entangled state with the referee. In addition, in the proof, we show that the optimal value can be attained by preparing an initial state where, locally, each of the parties holds a qubit and no further actions taken by the players, i.e. their local actions are described by the identity channel . We then specify a strategy by providing a quantum state, since any local actions are independent of , they can be absorbed in the quantum state. More precisely, the optimal winning probability for the can be attained by the strategy given by the (pure) quantum state
| (5) |
Note that other natural multi-party entangled states that have been widely studied in the literature, such as the GHZ state ([26]) and the W state ([23]) , and their respective generalizations to arbitrary dimensions, as well as the strategy of “guessing” which party has to reproduce the quantum state, e.g. guessing , given by preparing the state , provide significantly suboptimal winning probabilities. For 2-players, , and
| (6) |
which converges to the value attained by the strategy given by preparing the state , showing that when increases even unentangled states allow for a near-optimal winning probability.
Proof.
A strategy for the QCGk is described by a quantum state , where, for , registers are of the same dimension as and are auxiliary systems of arbitrary dimension that each party possesses, and unitary transformations , acting on the registers in the subscripts (due to the Stinespring dilation of the quantum channels, we restrict our attention to unitary transformations instead of quantum channels ). Let be the dimension of the above (total) Hilbert space, which we denote by . Then, the winning probability of the QCGk, given the strategy on a -dimensional Hilbert space, is provided by
where in the last equation we used cyclicity of the trace. For a specific choice of unitary transformations , the optimal winning probability is given by
Notice that, since are unitary matrices, , moreover,
, then we can use , and therefore
| (7) |
where in the fourth equality we used that the Schatten -norm is unitarily invariant, i.e. for unitary matrices and , and denotes the optimal winning probability if the dimension of the total initial Hilbert space is . Equation (7) shows that, given a Hilbert space , the optimal winning probability can be attained by an optimal quantum state independently of the actions of the players after knowing , i.e. the optimal winning probability is independent of and they can apply . We are going to see that, actually, the optimal winning probability can be attained by each of the parties possessing a qubit (2-dimensional Hilbert space), i.e. by the total Hilbert space being . From (7),
| (8) |
where, in the arguments of the supremums, the dependence on is implicit in the auxiliary spaces, which, together with the registers and , fully describe the total Hilbert space, and thus its dimension.
In order to provide the explicit value for the optimal winning probability, we have that, from (8),
| (9) |
where the last equation is obtained by direct computation.
3.1 Quantum cloning game with any target state
The concept of QCGk can be generalized to the case where, instead of the parties having to reproduce EPR pairs with the referee, the state that has to be reproduced is an arbitrary-fixed state, i.e. the referee’s Hilbert space is now of arbitrary dimension, and on input the party has to generate a given state . Here, the dimension of the registers is the same for all . We will refer to such a game as a -party quantum cloning game with target state , in short denoted by -QCGk, see Figure 1. Notice that this game becomes trivial if the target state is a tensor product state. In the following theorem, we provide the optimal winning probability for any -QCGk for every number of parties and for any target state .
Theorem 7.
The optimal winning probability for every -QCGk is given by
| (10) |
Along the lines of the proof of Theorem 6, the key idea relies on showing that the optimal winning probability can be attained by the actions of the players being independent on .
Proof.
4 Parallel repetition of QCGk
A case of particular interest is given when is played times in parallel, denoted by . Specifically, we will analyze where now the two collaborative parties, who we rename as Alice and Bob, will receive . We denote by , and the final (qubit) registers of the referee, Alice and Bob, respectively. The players win if at the end of the game Alice is able to create the maximally entangled state with the referee in all her registers such that , and analogously for Bob in all his registers such that . See Figure 2 for a schematic representation.
Similarly as before, at the beginning of the game the three parties are allowed to share any arbitrary quantum state and, upon receiving the classical information, Alice and Bob can apply CPTP maps and , where and are arbitrary auxiliary systems that Alice and Bob possess, respectively.
In the following theorem, we state that the optimal winning probability decays exponentially with the number of parallel repetitions .
Theorem 8.
The optimal winning probability for parallel repetitions of the is such that
| (11) |
The key idea of the proof relies on combining ideas used in the proof of Theorem 7 together with Proposition 4.3 in [35], which was also used in [38] to prove parallel repetition for monogamy-of-entanglement games.
Proof.
A strategy for the -parallel repetition of QCG2 is described by a quantum state , where, for , registers and are of the same dimension as and and are auxiliary systems of arbitrary dimension that each party possess, and unitary transformations and , acting on the registers in the subscripts (due to the Stinespring dilation of the quantum channels, we restrict our attention to unitary transformations). For , let if and if , and we use the shorthand notation , and . Then, the winning probability of this game, given the strategy , is provided by
Denote
| (12) |
then,
| (13) |
where we used Lemma 2, and , for being a set of mutually orthogonal permutations. Fix and , and let be the set of indices where and differ, i.e. , and let . Let , and , then we have that
where in the last equality we used that . Similarly,
We have that , and, since the Schatten -norm is unitarily invariant,
| (16) |
where we used that, for every ,
| (17) |
Without loss of generality, assume , then, combining (15) and (16), we have that
| (18) |
In order to apply the bound in Lemma 4, consider the set of permutations given by , where (they are such that they have the same Hamming distance). There are permutations with Hamming distance . Then, we have
| (19) |
5 Application to QPV in the No-PE and BE(m) models
In this section, we analyze the security of the routing QPV protocol, originally introduced in [28]. A round of this protocol, see Figure 3 for a schematic representation, is described as follows:
-
1.
The verifier V0 selects a qubit , and the verifier V1 selects , both picked uniformly at random. They send and (at time ) so that they arrive at the same time () at .
-
2.
Upon receiving the information sent by V0 and V1, the prover sends the qubit to the verifier Vx.
-
3.
If arrives at the time consistent with (, and a projective measurement performed by Vx on the state sent by V0 leads to the correct outcome, the verifiers accept. Otherwise, they reject.
The most general attack to the routing protocol, pictured in Figure 4, consists of having two attackers Alice () and Bob (), located between and , and between and , respectively. Before , the attackers agree on a strategy and might prepare an entangled state. After , Alice () and Bob () intercept the information sent from their closest verifier, respectively. Due to timing constraints, they are allowed to perform one round of simultaneous communication. After communicating (after ), Alice () and Bob () answer to their closest verifier, respectively.
Here, we analyze security within three attack models: (i) the No Pre-shared Entanglement (No-PE) model [13], where adversaries do not (pre-)share any entanglement before the protocol’s execution; (ii) the Bounded-Entanglement BE model, where adversaries pre-share at most entangled qubits; and (iii) the Random Oracle Model (ROM), where attackers (pre-)share any amount of entanglement before the protocol’s execution. We formalize the concept of security, given an attack model , as follows:
Definition 9.
The routing protocol is said to be -sound in the model if, for any attackers acting according to such an attack model, the verifiers accept with probability at most .
The security of a variation of this protocol, the -routing QPV protocol, where the classical information is split into two bit strings, each sent from each verifier, and the qubit has to be routed according to the outcome of a boolean function on those bit strings has been studied in the BE model [11, 6, 7]. The authors of these works showed that the -routing QPV protocol remains secure as long as is at most linear in the size of the bit strings. However, unlike other protocols [13, 38, 4] the security of the routing QPV protocol in the No-PE model was never analyzed. The No-PE assumption is necessary to obtain non-trivial bounds, since there is a perfect attack if the attackers pre-share entanglement [28]. We show security in the No-PE model, providing the tight result, summarized in the following proposition:
Proposition 10.
In the No-PE model, the routing QPV protocol is -sound. Moreover, this is optimal.
The intuition behind Proposition 10 relies on the fact that the most general attack can be reduced to a QCG2. Consider the purified version of the routing protocol, which is equivalent to the original version, and where the only difference relies on V0, instead of sending the qubit , prepares the state and keeps a register for herself and sends the other register to the prover. Then, as seen in Figure 4, the most general attack to the routing QPV protocol is to place an adversary between V0 and the prover, Alice, and another adversary between the prover and V1, Bob. In the No-PE model, we can simplify it further, as Alice intercepts the qubit sent by V0, applies an arbitrary quantum operation to it, and possibly some ancillary systems she possesses. She keeps a part of it and sends the other to Bob. On the other side, Bob intercepts , copies it and sends the copy to Alice. Since they share no entanglement, any quantum operation that Bob could perform as a function of can be included in Alice’s operation. After one-round of simultaneous communication, Alice and Bob share a tripartite state with V0, and their task is that the party designated by has to end up with a maximally entangled state with the V0. By Theorem 7, even if Alice and Bob can share any state with the referee (in this case V0), they can succeed with at most probability .
On the other hand, to show optimality, consider the attack where (i) at the beginning of the protocol Alice prepares the 3-qubit state , (ii) intercepts and performs a Bell measurement on the intercepted state and her register , immediately she applies the teleportation corrections to both of her registers and , (iii) she keeps register and sends register to Bob, (iv) in the meantime, Bob intercepts and broadcasts , after receiving the information from their fellow attacker, if , Alice sends her register () to V0, whereas if , Bob sends his register () to V1. This attack has a winning probability of .
An analogous reduction applies when the routing QPV protocol is executed times in parallel, and therefore, its security can be reduced to the -parallel repetition of QCG2:
Proposition 11.
In the No-PE model, the routing QPV protocol executed times in parallel is -sound.
A direct consequence of Lemma 5.3 in [8] implies, similarly as in [38], security for the routing protocol executed in parallel for attackers who pre-share a linear amount of qubits:
Corollary 12.
In the model, the routing QPV protocol executed times in parallel is -sound.
In particular, the above soundness is exponentially small in if .
6 Application to QPV in the random oracle model
Consider the -parallel repetition of the routing QPV protocol but instead of V1 sending , V0 and V1 send , for , to the prover, respectively. Then, the used in the rest of the protocol is computed via , for a given hash function . We will denote this variation as -routing QPV protocol, see Figure 3 for a schematic representation.
To provide security in the quantum random oracle model against adversaries sharing an arbitrary amount of entanglement, we use some techniques introduced in [40]. A quantum random oracle is defined as a fixed function that is sampled uniformly at random from the set of functions from bits to bits111This can be done by simply sampling a large table of size , and outputting when queried on input . Note that this sampling procedure is not efficient: while having an efficient oracle [42] is sometimes required, for instance when working with composable security and computationally bounded distinguishers, or when reducing to problems that are hard only for bounded adversaries, in our case we do not need this additional property since we do a reduction to a problem that is hard even for unbounded adversaries.. The parties are not given the full description of directly, but they are given oracle access to , in the sense that they have access to a special gate implementing the unitary . We denote the number of queries made by the adversary by . As a proof technique, an oracle can also be reprogrammed, where security of the protocol is shown by first studying a variant where the gate applied by the oracle may change over time. A typical setting is where we change a single entry of the oracle: we denote by the new oracle that behaves like except that . The chances of distinguishing whether has been reprogrammed or not can be bounded using [40], which informally states that if we can distinguish whether the oracle has been reprogrammed or no, then we have queried it on before it has been reprogrammed (for completeness, see Lemma 14). In the following theorem, we show security of the -routing protocol in the ROM.
Theorem 13.
If the (possibly entangled) attackers Alice and Bob perform at most queries to the (quantum) random oracle , the -routing QPV protocol is -sound, with
| (20) |
In particular, is negligible if and scale polynomially with .
The starting idea of the proof follows [40], where we send Bell pairs instead of single qubits in order to make the input state independent of , the output of the oracle. Then we reprogram this oracle after adversaries share their state to ensure is truly random and independent of the state shared by malicious parties at time . Finally, we realize that we can rewrite this into an instance of Theorem 8. In the proof of Theorem 13, we will rely on this lemma by Unruh:
Lemma 14 ([40, Lemma 3]).
Let be oracle algorithms sharing state between invocations that perform at most queries to . Let be an oracle algorithm that on input does the following: Run until the -th query to , then measure the argument of that query in the computational basis, and output the measurement outcome (or if no -th query occurs). Let:
| (21) | ||||
| (22) | ||||
| (23) |
Then, .
Proof (of Theorem 13).
To prove this theorem, we must show that the probability that the verifiers accept in a malicious run of the protocol is lower bounded by , i.e., if we denote by the output of the verifiers ( or ) at the end of a protocol involving a malicious Alice and a malicious Bob , we want to show that
| (24) |
We prove this by defining a series of games, where the probability of accepting each game is close to the probability of accepting the next game. By ensuring that the first game corresponds to the real protocol, and that the probability of the last game can easily be computed, we can bound by transitivity.
Game1.
This game is defined as the real protocol, i.e. . Therefore, we trivially have:
| (25) |
Game2.
Is like , except that each is replaced with one half of a Bell pair. Similarly, instead of projecting on , the verifier will do a Bell measurement between the state sent by the prover and its corresponding half of Bell pair, accepting only if the outcome is . This trick is often used in literature, hence we skip the computations. Hence
| (26) |
Game3.
Is like , except that at time , one samples the random bit string , and reprogram the oracle to implement (i.e., and will have oracle access to instead of ). Note that the simulators will use this value of instead of to perform the verification at the end. Intuitively, the only way to distinguish this game from the previous game is if the adversary managed to query before and after, but this is highly unlikely since neither nor know both and (and remember that they cannot query the oracle more than times, so they cannot just evaluate the oracle on all inputs). This intuition is formalized thanks to Lemma 14: if we define as the execution of the protocol in until (which is the same as in ), except that is chosen as , and as the execution of the protocol after time , we can remark that (using notations from Lemma 14):
| (27) |
since sampling uniformly at random is strictly equivalent to sampling randomly and then defining . Similarly, we also have:
| (28) |
The remaining part is to bound . To compute , we need to bound the probability of querying during the first part of the protocol on -th query. But when does this query, we know that it must be independent of since all inputs of are independent of (if not, we could break non-signaling). Similarly, queries made by are independent of : the exact same argument does not hold since does depend on … but this is only a very superficial dependency, since we could have exactly the same probability distributions of and by sampling instead randomly and , making independent of now. Hence, the -th query is independent of , so the best probability of it being equal to is lower bounded by . Hence, using Lemma 14, we have:
| (29) | |||
| (30) |
Game4.
Now, we can realize that all operations in until is independent of . So let us call the (purification) of the state owned by the verifier (consisting in a list of qubits part of a shared Bell pair), Alice and Bob (we also include in the message sent by to , and similarly in the message sent by to ). Additionally, we also include in the (exponentially large) definition of , and in both registers and , one copy for each party. Then, we define the referee operation as the identity, as the map that runs , simulating the query to using the table , and that are part of , and that is given as an input to , and we define similarly simulating . We define then as the game , i.e. the parallel repetition of the -party quantum cloning game (Definition 5), involving the shared state , the referee , and the two parties and . This game is exactly like as we simulate exactly the same process, just grouping differently the various circuits involved. Hence, . But using Theorem 8, we have:
| (31) |
Hence, we can combine all the above equations to obtain:
| (32) |
concluding the proof.
7 Discussion
We have introduced the concept of the -party quantum cloning game and provided the optimal winning probability for any number of parties. The parallel repetition for the two-party version was studied, showing an exponential decay of the optimal winning probability. We applied the above results to show security of the routing QPV protocol in the No Pre-shared Entanglement and Bounded-Entanglement models, as well as in the Random Oracle Model. The tightness of Theorem 8 remains an open question, either by showing a strategy attaining the value (11), or if strong parallel repetition holds and actually the optimal value is (or neither of them). Closing this gap would imply knowing what is the optimal security for the routing protocol in the No-PE model, and would further tighten its security in the BE and random-oracle models.
References
- [1] Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani. Device-Independent Security of Quantum Cryptography against Collective Attacks. Physical Review Letters, 98(23):230501, June 2007. doi:10.1103/PhysRevLett.98.230501.
- [2] Tomothy Spiller Adrian Kent, William Munro and Raymond Beausoleil. Tagging systems. us patent nr 2006/0022832, 2006.
- [3] Rene Allerstorfer, Harry Buhrman, Alex May, Florian Speelman, and Philip Verduyn Lunel. Relating non-local quantum computation to information theoretic cryptography. Quantum, 8:1387, June 2024. doi:10.22331/q-2024-06-27-1387.
- [4] Rene Allerstorfer, Harry Buhrman, Florian Speelman, and Philip Verduyn Lunel. On the role of quantum communication and loss in attacks on quantum position verification, 2022. arXiv:2208.04341.
- [5] Janet Anders and Dan E. Browne. Computational Power of Correlations. Physical Review Letters, 102(5):050502, February 2009. doi:10.1103/PhysRevLett.102.050502.
- [6] Vahid Asadi, Richard Cleve, Eric Culf, and Alex May. Linear gate bounds against natural functions for position-verification, 2024. doi:10.22331/q-2025-01-21-1604.
- [7] Vahid Asadi, Eric Culf, and Alex May. Rank lower bounds on non-local quantum computation. In 16th Innovations in Theoretical Computer Science Conference (ITCS 2025), Leibniz International Proceedings in Informatics (LIPIcs), pages 11:1–11:18, 2025. doi:10.4230/LIPIcs.ITCS.2025.11.
- [8] Salman Beigi and Robert König. Simplified instantaneous non-local quantum computation with applications to position-based cryptography. New Journal of Physics, 13(9):093036, September 2011. doi:10.1088/1367-2630/13/9/093036.
- [9] J. S. Bell. On the einstein podolsky rosen paradox. Physics Physique Fizika, 1:195–200, November 1964. doi:10.1103/PhysicsPhysiqueFizika.1.195.
- [10] Charles H. Bennett and Gilles Brassard. Quantum cryptography: public key distribution and coin tossing. Proc. IEEE Int. Conf. on Computers, Systems, and Signal Process (Bangalore) (Piscataway, NJ: IEEE), 1984.
- [11] Andreas Bluhm, Matthias Christandl, and Florian Speelman. A single-qubit position verification protocol that is secure against multi-qubit attacks. Nature Physics, pages 1–4, 2022.
- [12] Nicolas Brunner, Daniel Cavalcanti, Stefano Pironio, Valerio Scarani, and Stephanie Wehner. Bell nonlocality. Rev. Mod. Phys., 86:419–478, April 2014. doi:10.1103/RevModPhys.86.419.
- [13] Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, and Christian Schaffner. Position-based quantum cryptography: Impossibility and constructions. SIAM Journal on Computing, 43(1):150–178, January 2014. doi:10.1137/130913687.
- [14] Harry Buhrman, Richard Cleve, Serge Massar, and Ronald de Wolf. Nonlocality and communication complexity. Reviews of Modern Physics, 82(1):665–698, March 2010. doi:10.1103/RevModPhys.82.665.
- [15] Harry Buhrman, Serge Fehr, Christian Schaffner, and Florian Speelman. The garden-hose model. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science - ITCS '13. ACM Press, 2013. doi:10.1145/2422436.2422455.
- [16] Kaushik Chakraborty and Anthony Leverrier. Practical position-based quantum cryptography. Physical Review A, 92(5), November 2015. doi:10.1103/physreva.92.052304.
- [17] Nishanth Chandran, Vipul Goyal, Ryan Moriarty, and Rafail Ostrovsky. Position based cryptography. In Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, volume 5677 of Lecture Notes in Computer Science, pages 391–407. Springer, 2009. doi:10.1007/978-3-642-03356-8_23.
- [18] John F. Clauser, Michael A. Horne, Abner Shimony, and Richard A. Holt. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 1969.
- [19] Valerie Coffman, Joydip Kundu, and William K. Wootters. Distributed entanglement. Physical Review A, 61(5), April 2000. doi:10.1103/physreva.61.052306.
- [20] Sam Cree and Alex May. Code-routing: a new attack on position-verification. Quantum, 7, 1079, 2022. doi:10.22331/q-2023-08-09-1079.
- [21] Kfir Dolev. Constraining the doability of relativistic quantum tasks. arXiv preprint, 2019. arXiv:1909.05403.
- [22] Kfir Dolev and Sam Cree. Non-local computation of quantum circuits with small light cones. arXiv preprint, 2022. arXiv:2203.10106.
- [23] W. Dür, G. Vidal, and J. I. Cirac. Three qubits can be entangled in two inequivalent ways. Phys. Rev. A, 62:062314, November 2000. doi:10.1103/PhysRevA.62.062314.
- [24] Fei Gao, Bin Liu, and QiaoYan Wen. Quantum position verification in bounded-attack-frequency model. SCIENCE CHINA Physics, Mechanics & Astronomy, 59(11):1–11, 2016.
- [25] Alvin Gonzales and Eric Chitambar. Bounds on instantaneous nonlocal quantum computation. IEEE Transactions on Information Theory, 66(5):2951–2963, 2019.
- [26] Daniel M. Greenberger, Michael A. Horne, and Anton Zeilinger. Going beyond bell’s theorem. In Menas Kafatos, editor, Bell’s Theorem, Quantum Theory and Conceptions of the Universe, pages 69–72. Springer Netherlands, Dordrecht, 1989. doi:10.1007/978-94-017-0849-4_10.
- [27] Nathaniel Johnston, Rajat Mittal, Vincent Russo, and John Watrous. Extended non-local games and monogamy-of-entanglement games. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 472(2189):20160003, May 2016. doi:10.1098/rspa.2016.0003.
- [28] Adrian Kent, William J. Munro, and Timothy P. Spiller. Quantum tagging: Authenticating location via quantum information and relativistic signaling constraints. Physical Review A, 84(1), July 2011. doi:10.1103/physreva.84.012326.
- [29] Hoi-Kwan Lau and Hoi-Kwong Lo. Insecurity of position-based quantum-cryptography protocols against entanglement attacks. Physical Review A, 83(1), January 2011. doi:10.1103/physreva.83.012322.
- [30] Jiahui Liu, Qipeng Liu, and Luowen Qian. Beating Classical Impossibility of Position Verification. In Mark Braverman, editor, 13th Innovations in Theoretical Computer Science Conference (ITCS 2022), volume 215 of Leibniz International Proceedings in Informatics (LIPIcs), pages 100:1–100:11, Dagstuhl, Germany, 2022. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2022.100.
- [31] Robert A. Malaney. Location-dependent communications using quantum entanglement. Phys. Rev. A, 81:042319, April 2010. doi:10.1103/PhysRevA.81.042319.
- [32] Dominic Mayers and Andrew Yao. Self Testing Quantum Apparatus. Quantum Info. Comput., 4(4):273–286, July 2004. URL: http://dl.acm.org/citation.cfm?id=2011827.2011830.
- [33] S. Pironio, A. Acín, S. Massar, A. Boyer de la Giroday, D. N. Matsukevich, P. Maunz, S. Olmschenk, D. Hayes, L. Luo, T. A. Manning, and C. Monroe. Random numbers certified by Bell’s theorem. Nature, 464(7291):1021–1024, April 2010. doi:10.1038/nature09008.
- [34] Jérémy Ribeiro and Frédéric Grosshans. A tight lower bound for the bb84-states quantum-position-verification protocol, 2015. doi:10.48550/arXiv.1504.07171.
- [35] Christian Schaffner. Cryptography in the bounded-quantum-storage model, 2007. arXiv:0709.0289.
- [36] Florian Speelman. Instantaneous non-local computation of low T-depth quantum circuits. In 11th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2016). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016.
- [37] Ivan Šupić and Joseph Bowles. Self-testing of quantum systems: a review. arXiv:1904.10042 [quant-ph], April 2019. arXiv: 1904.10042. arXiv:1904.10042.
- [38] Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski, and Stephanie Wehner. A monogamy-of-entanglement game with applications to device-independent quantum cryptography. New Journal of Physics, 15(10):103002, October 2013. doi:10.1088/1367-2630/15/10/103002.
- [39] Dominique Unruh. Quantum position verification in the random oracle model. In Juan A. Garay and Rosario Gennaro, editors, Advances in Cryptology – CRYPTO 2014, pages 1–18, Berlin, Heidelberg, 2014. Springer Berlin Heidelberg.
- [40] Dominique Unruh. Quantum Position Verification in the Random Oracle Model. In Juan A. Garay and Rosario Gennaro, editors, Advances in Cryptology – CRYPTO 2014, Lecture Notes in Computer Science, pages 1–18, Berlin, Heidelberg, 2014. Springer. doi:10.1007/978-3-662-44381-1_1.
- [41] William K. Wootters and Wojciech Zurek. A single quantum cannot be cloned. Nature, 299:802–803, 1982.
- [42] Mark Zhandry. How to Record Quantum Queries, and Applications to Quantum Indifferentiability. In Alexandra Boldyreva and Daniele Micciancio, editors, Advances in Cryptology – CRYPTO 2019, Lecture Notes in Computer Science, pages 239–268. Springer International Publishing, 2019. doi:10.1007/978-3-030-26951-7_9.
