Quantum Copy-Protection and Quantum Money

被引:105
作者
Aaronson, Scott [1 ]
机构
[1] MIT, Cambridge, MA 02139 USA
来源
PROCEEDINGS OF THE 24TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY | 2009年
关键词
D O I
10.1109/CCC.2009.42
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Forty years ago; Wiesner proposed using quantum states to create money that is physically impossible to counterfeit; something that cannot be done in the classical world. However, Wiesner's scheme required a central bank to verify the money, and the question of whether there can be unclonable quantum money that anyone can verify has remained open since. One can also ask a related question; which seems to be new: can quantum states be used as copy-protected programs, which let the user evaluate some function f, but not create more programs for f ? This paper tackles both questions using the arsenal of modern computational complexity. Our main result is that there exist quantum oracles relative to which publicly-verifiable quantum money is possible, and any family of functions that cannot be efficiently learned from its input-output behavior can be quantumly copy-protected. This provides the first formal evidence that these tasks are achievable. The technical core of our result is a "Complexity-Theoretic No-Cloning Theorem," which generalizes both the standard No-Cloning Theorem and the optimality of Grover search, and might be of independent interest. Our security argument also requires explicit constructions of quantum t-designs. Moving beyond the oracle world, we also present an explicit candidate scheme for publicly-verifiable quantum money, based on random stabilizer states; as well as two explicit schemes for copy-protecting the family of point functions. We do not know how to base the security of these schemes on any existing cryptographic assumption. (Note that without an oracle. we can only hope for security under some computational assumption.)
引用
收藏
页码:229 / 242
页数:14
相关论文
共 23 条
[1]   Improved simulation of stabilizer circuits [J].
Aaronson, S ;
Gottesman, D .
PHYSICAL REVIEW A, 2004, 70 (05) :052328-1
[2]  
AARONSON S, 2009, QUANTUM MONEY UNPUB
[3]  
Aaronson Scott, 2007, Theory Comput, V3, P129, DOI DOI 10.4086/TOC.2007.V003A007
[4]   Quantum lower bounds by quantum arguments [J].
Ambainis, A .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2002, 64 (04) :750-767
[5]  
AMBAINIS A, 2007, P IEEE C COMP COMPL
[6]  
[Anonymous], 2005, Theor. Comput.
[7]  
Barak B., 2001, Crypto 2001, P1
[8]   Strengths and weaknesses of quantum computing [J].
Bennett, CH ;
Bernstein, E ;
Brassard, G ;
Vazirani, U .
SIAM JOURNAL ON COMPUTING, 1997, 26 (05) :1510-1523
[9]  
BENNETT CH, 1982, QUANTUM CRYPTOGRAPHY, P267
[10]   INHERENT INTRACTABILITY OF CERTAIN CODING PROBLEMS [J].
BERLEKAMP, ER ;
MCELIECE, RJ ;
VANTILBORG, HCA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (03) :384-386