Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient
Abstract
:1. Introduction
- 1.
- Definition of generalized quantum power functions. We define two different generalized quantum power functions, which we refer to as quantum power functions with leading coefficient and quantum n-th power functions, respectively. A quantum power function with a leading coefficient contains two parameters in the form of a quantum state. Quantum n-th power function contains both quantum and classical parameters.
- 2.
- Construction of quantum obfuscation schemes for generalized quantum power functions. We construct different quantum circuits to obfuscate and interpret each function. We utilize quantum teleportation for multiple qubits to obfuscate two quantum states simultaneously in a quantum power function with a leading coefficient. In addition, we utilize quantum teleportation and quantum superdense coding to obfuscate quantum and classical parameters in the quantum n-th power function. More generally, the parameter obfuscation method used in this work can be applied as a general method to obfuscate more quantum functions, therefore contributing to the progression of quantum obfuscation.
2. Related Work
2.1. Quantum Function Obfuscation
- 1.
- Polynomial expansion: The output quantum state with m-qubit remains polynomial scale satisfying
- 2.
- Functional equivalence: For any possible quantum state ρ, there existsThe obfuscated program has the same functionality as the original one.
- 3.
- Virtual black box: For every QPT adversary there exists a QPT quantum simulator such thatHere, means any polynomial of n and means for all , there exists such that for all integers , we have .
2.2. Quantum Techniques for Obfuscation
3. Generalized Quantum Power Functions with Coefficient
3.1. Quantum Power Function with Leading Coefficient
3.2. Quantum n-th Power Function
3.2.1. Bloch Sphere and Qubit Rotation
3.2.2. Functionality of Quantum n-th Power Function
4. Quantum Obfuscation Schemes for Generalized Quantum Power Functions
4.1. Obfuscation Scheme for Quantum Power Function with Leading Coefficient
4.1.1. Construction of Quantum Obfuscator
- (1)
- Alice Input the leading coefficient , the exponent into the obfuscator.
- (2)
- Alice measures the particles and by Bell basis and obtains the measurement result.
- (3)
- Alice sends the measurement result to Bob through a classical channel.
- (4)
- Bob performs corresponding unitary operations to restore the initial leading coefficient and the exponent of the function.
4.1.2. Construction of Quantum Interpreter
- (1)
- Perform an X gate on the restored exponent , then we can obtain .
- (2)
- Perform a Toffoli gate on , , and the first auxiliary qubit , in which and are control qubits and is the target qubit. After this step, we obtain .
- (3)
- Perform a CNOT gate on and , in which is the control qubit and is the target qubit. After this step, we obtain .
- (4)
- Perform a Toffoli gate on , and the second auxiliary qubit , in which and are the control qubits and is the target qubit.
- (5)
- Perform a quantum “OR” gate on and . Then we can obtain which satisfies the functionality of quantum power functions with leading coefficient.
4.2. Obfuscation Scheme for Quantum n-th Power Functions
4.2.1. Construction of Quantum Obfuscator
4.2.2. Construction of Quantum Interpreter
- (1)
- Perform a RY gate on the base with the angle where . Thus, we obtain .
- (2)
- Perform a RZ gate on with the angle where . Thus, we obtain .
- (3)
- Perform a Toffoli gate on , and the auxiliary qubit , where is the target qubit. Thus, we obtain the result . When , . When , .
5. Discussion
5.1. Impossibility and Possibility
5.2. Obfuscation Circuits in a Noisy Channel
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- Shor, P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 1999, 41, 303–332. [Google Scholar] [CrossRef]
- Bennett, C.H. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Bangalore, India, 9–12 December 1984. [Google Scholar]
- Gottesman, D. Theory of quantum secret sharing. Phys. Rev. A 2000, 61, 042311. [Google Scholar] [CrossRef]
- Boneh, D.; Zhandry, M. Quantum-secure message authentication codes. In Proceedings of the Advances in Cryptology—EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 26–30 May 2013; Proceedings 32. Springer: Berlin/Heidelberg, Germany, 2013; pp. 592–608. [Google Scholar]
- Gottesman, D.; Chuang, I. Quantum digital signatures. arXiv 2001, arXiv:quant-ph/0105032. [Google Scholar]
- Hada, S. Zero-knowledge and code obfuscation. In Proceedings of the Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, 3–7 December 2000; Proceedings 6. Springer: Berlin/Heidelberg, Germany, 2000; pp. 443–457. [Google Scholar]
- Barak, B.; Goldreich, O.; Impagliazzo, R.; Rudich, S.; Sahai, A.; Vadhan, S.; Yang, K. On the (im) possibility of obfuscating programs. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 1–18. [Google Scholar]
- Lynn, B.; Prabhakaran, M.; Sahai, A. Positive results and techniques for obfuscation. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 20–39. [Google Scholar]
- Garg, S.; Gentry, C.; Halevi, S.; Raykova, M.; Sahai, A.; Waters, B. Candidate indistinguishability obfuscation and functional encryption for all circuits (generalized abstract). In Proceedings of the IEEE Annual Symposium on Foundations of Computer Science, Berkeley, CA, USA, 26–29 October 2013. [Google Scholar]
- Barak, B.; Garg, S.; Kalai, Y.T.; Paneth, O.; Sahai, A. Protecting obfuscation against algebraic attacks. In Proceedings of the Advances in Cryptology—EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 11–15 May 2014; Proceedings 33. Springer: Berlin/Heidelberg, Germany, 2014; pp. 221–238. [Google Scholar]
- Bitansky, N.; Canetti, R.; Cohn, H.; Goldwasser, S.; Kalai, Y.T.; Paneth, O.; Rosen, A. The impossibility of obfuscation with auxiliary input or a universal simulator. In Proceedings of the Advances in Cryptology—CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, 17–21 August 2014; Proceedings, Part II 34. Springer: Berlin/Heidelberg, Germany, 2014; pp. 71–89. [Google Scholar]
- Boneh, D.; Zhandry, M. Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. Algorithmica 2017, 79, 1233–1285. [Google Scholar] [CrossRef]
- Garg, S.; Gentry, C.; Halevi, S.; Wichs, D. On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. Algorithmica 2017, 79, 1353–1373. [Google Scholar] [CrossRef]
- Hohenberger, S.; Sahai, A.; Waters, B. Replacing a random oracle: Full domain hash from indistinguishability obfuscation. In Proceedings of the Advances in Cryptology—EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, 11–15 May 2014; Proceedings 33. Springer: Berlin/Heidelberg, Germany, 2014; pp. 201–220. [Google Scholar]
- Alagic, G.; Fefferman, B. On quantum obfuscation. arXiv 2016, arXiv:1602.01771. [Google Scholar]
- Chen, R.; Shang, T.; Liu, J. IND-secure quantum symmetric encryption based on point obfuscation. Quantum Inf. Process. 2019, 18, 1–16. [Google Scholar] [CrossRef]
- Zhang, Y.J.; Shang, T.; Liu, J.W.; Wu, W. Quantum homomorphic encryption based on quantum obfuscation. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 2010–2015. [Google Scholar]
- Ben-David, S.; Sattath, O. Quantum tokens for digital signatures. Quantum 2023, 7, 901. [Google Scholar] [CrossRef]
- Zhandry, M. Quantum lightning never strikes the same state twice. or: Quantum money from cryptographic assumptions. J. Cryptol. 2021, 34, 1–56. [Google Scholar] [CrossRef]
- Pan, C.; Shang, T.; Zhang, Y. Universal quantum obfuscation for quantum non-linear functions. Front. Phys. 2023, 10, 1342. [Google Scholar] [CrossRef]
- Tan, X.; Li, X.; Yang, P. Perfect quantum teleportation via Bell states. Comput. Mater. Continua 2018, 57, 495–503. [Google Scholar] [CrossRef]
- Mastriani, M. Quantum key secure communication protocol via enhanced superdense coding. Opt. Quantum Electron. 2023, 55, 10. [Google Scholar] [CrossRef]
- Alagic, G.; Brakerski, Z.; Dulek, Y.; Schaffner, C. Impossibility of quantum virtual black-box obfuscation of classical circuits. In Proceedings of the Advances in Cryptology—CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, 16–20 August 2021; Proceedings, Part I 41. Springer: Berlin/Heidelberg, Germany, 2021; pp. 497–525. [Google Scholar]
- Bartusek, J.; Kitagawa, F.; Nishimaki, R.; Yamakawa, T. Obfuscation of Pseudo-Deterministic Quantum Circuits. arXiv 2023, arXiv:2302.11083. [Google Scholar]
- Zhao, J.; Jeng, H.; Conlon, L.O.; Tserkis, S.; Shajilal, B.; Liu, K.; Ralph, T.C.; Assad, S.M.; Lam, P.K. Enhancing quantum teleportation efficacy with noiseless linear amplification. Nat. Commun. 2023, 14, 4745. [Google Scholar] [CrossRef] [PubMed]
- Islam, A.; Wang, A.M.; Abliz, A. Optimizing quantum teleportation and dense coding via mixed noise under non-Markovian approximation. Int. J. Theor. Phys. 2021, 60, 1225–1236. [Google Scholar] [CrossRef]
Measurement Result | Collapsed State | Unitary Operation |
---|---|---|
Classical Bits | Operation of Alice | Resultant State | Decoded Bits |
---|---|---|---|
00 | 00 | ||
01 | 01 | ||
10 | 10 | ||
11 | 11 |
Measurement Result | Unitary Operation | Measurement Result | Unitary Operation |
---|---|---|---|
Measurement | Collapsed State | Unitary Operation |
---|---|---|
Classical Exponent | Operation | States after Operation |
---|---|---|
00 | ||
01 | ||
10 | ||
11 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jiang, Y.; Shang, T.; Tang, Y.; Liu, J. Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient. Entropy 2023, 25, 1524. https://doi.org/10.3390/e25111524
Jiang Y, Shang T, Tang Y, Liu J. Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient. Entropy. 2023; 25(11):1524. https://doi.org/10.3390/e25111524
Chicago/Turabian StyleJiang, Yazhuo, Tao Shang, Yao Tang, and Jianwei Liu. 2023. "Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient" Entropy 25, no. 11: 1524. https://doi.org/10.3390/e25111524
APA StyleJiang, Y., Shang, T., Tang, Y., & Liu, J. (2023). Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient. Entropy, 25(11), 1524. https://doi.org/10.3390/e25111524