The meteoric rise in power and popularity of machine learning models dependent on valuable training data has reignited a basic tension between the power of running a program locally and the risk of exposing details of that program to the user. At the same time, fundamental properties of quantum states offer new solutions to data and program security that can require strikingly few quantum resources to exploit, and offer advantages outside of mere computational run time. In this work, we demonstrate such a solution with quantum one-time tokens.
A quantum one-time token is a quantum state that permits a certain program to be evaluated exactly once. One-time security guarantees, roughly, that the token cannot be used to evaluate the program more than once. We propose a scheme for building quantum one-time tokens for any randomized classical program, which include generative AI models. We prove that the scheme satisfies an interesting definition of one-time security as long as outputs of the classical algorithm have high enough min-entropy, in a black box model.
Importantly, the classical program being protected does not need to be implemented coherently on a quantum computer. In fact, the size and complexity of the quantum one-time token is independent of the program being protected, and additional quantum resources serve only to increase the security of the protocol. Due to this flexibility in adjusting the security, we believe that our proposal is parsimonious enough to serve as a promising candidate for a near-term useful demonstration of quantum computing in either the NISQ or early fault tolerant regime.
Quantum One-Time Protection of any Randomized Algorithm
- Paper ID: 2411.03305
- Title: Quantum One-Time Protection of any Randomized Algorithm
- Authors: Sam Gunn, Ramis Movassagh (Google Quantum AI)
- Classification: quant-ph cs.CR
- Publication Date: January 3, 2025 (arXiv v2)
- Paper Link: https://arxiv.org/abs/2411.03305v2
The rapid advancement of machine learning models and their dependence on valuable training data have reignited the fundamental tension between the convenience of running programs locally and the risk of exposing program details to users. Simultaneously, the fundamental properties of quantum states provide novel solutions for data and program security that require minimal quantum resources and offer advantages beyond computational runtime. This work demonstrates such a solution through quantum one-time tokens.
Quantum one-time tokens are quantum states that allow a specific program to be evaluated exactly once. One-time security guarantees that the token cannot be used to evaluate the program multiple times. The authors propose a scheme for constructing quantum one-time tokens for arbitrary randomized classical programs (including generative AI models) and prove in the black-box model that the scheme satisfies an interesting one-time security definition, provided that the classical algorithm's output possesses sufficiently high min-entropy.
Software commercialization faces a core dilemma: how to distribute software without surrendering ownership? Traditional solutions exhibit inherent trade-offs between usability and exclusivity:
- Program Obfuscation Schemes: Distribute obfuscated versions of software, but face piracy risks and users can run it unlimited times
- Server Query Schemes: Keep software on servers responding to user queries, but reduce availability and require continuous communication
In the era of generative AI, this problem becomes more acute because:
- Software can be extremely valuable
- It may leak private information
- Pay-per-query models are increasingly prevalent
Classical information can always be copied; once software is distributed, users can query or copy it arbitrarily many times. This limitation prevents traditional schemes from simultaneously achieving high availability and strong exclusivity.
The no-cloning property of quantum information provides opportunities to improve existing solutions:
- Quantum Copy Protection: Improves scheme (1), preventing program copying while allowing unlimited runs
- Quantum One-Time Programs: Improves scheme (2), eliminating online communication requirements in pay-per-query models
- First Universal Quantum Tokenization Scheme: Proposes the first universal scheme using quantum information to protect arbitrary randomized algorithms, not limited to specific cryptographic functions
- Program-Complexity-Independent Quantum Resources: The size and complexity of quantum tokens are completely independent of the protected program
- Theoretical Security Proof: Proves the scheme satisfies one-time security definitions in the black-box model
- Practical Considerations: The scheme is sufficiently simple to be implementable in the NISQ or early fault-tolerant quantum computing era
Construct quantum one-time tokens to protect arbitrary randomized algorithms f: X × R → Y such that:
- Tokens allow the program to be evaluated exactly once
- Provide one-time security guarantees
- Do not require coherent implementation of the program on a quantum computer
The scheme relies on three cryptographic primitives:
- (AuthKeyGen, AuthTokenGen, Sign, Verify): Quantum one-time authentication scheme
- Obf: Classical program obfuscator
- H: Hash function (modeled as random oracle)
Program tokens consist of two parts:
- |ψ⟩: Non-cloneable quantum state independent of f
- Obf(P): Obfuscated classical circuit P dependent on f
KeyGen(1^λ, f):
- Sample sk ← AuthKeyGen(1^λ)
- Define classical circuit P: X × {0,1}^m → Y ∪ {⊥}
- Compute Verify(sk, (x,z)), output ⊥ if rejected
- Otherwise output f(x; H(x,z))
- Compute obfuscation P̂ = Obf(P)
- Output (sk, P̂)
TokenGen(sk):
- Compute one-time authentication token |tk⟩ ← AuthTokenGen(sk)
- Output |tk⟩
TokenEval(x, |tk⟩, P̂):
- Compute z ← Sign(x, |tk⟩)
- Compute and output P̂(x,z)
Quantum one-time authentication schemes must satisfy:
- Correctness: Legitimate signatures pass verification
- One-Time Unforgeability: No polynomial-time adversary can generate two distinct valid signature pairs
Single-bit authentication based on hidden subspace states:
AuthKeyGen(1^λ): Sample random subspace A ⊆ F₂^λ with dimension λ/2
AuthTokenGen(A): Output |A⟩ = 2^(-λ/4) ∑_{a∈A} |a⟩
Sign(x, |A⟩):
- If x = 0: Measure in standard basis and output result
- If x = 1: Measure in Hadamard basis and output result
Verify(A, (x,z)): Verify whether z belongs to the corresponding subspace
- Program-Independent Quantum Resources: Quantum state |ψ⟩ is independent of the protected program, allowing complex programs to be protected with small quantum devices
- Randomness Binding Mechanism: Randomness is determined through H(x,z), effectively "mixing" input, authentication, and output
- Collapsing Hash Function Property: Leverages the quantum property that measurement output causes input and authentication labels to collapse
- Adversary obtains |ψ⟩ and quantum oracle access to P̂
- Adversary submits quantum queries; challenger computes P̂ and measures result y
- If y = ⊥ the game aborts and adversary fails
- Adversary submits second query; challenger measures to get y'
- Adversary wins if y' ∉ {y, ⊥}
Theorem 2: If for each x ∈ X, f(x;r) has min-entropy at least poly(λ) over random r, and the quantum one-time authentication scheme is secure, then Construction 2 is black-box one-time secure for f.
Lemma 1: Let f: {0,1}^m × {0,1}^n → Y. If for all x, f(x;r) has min-entropy at least τ over random r, then when H is a random oracle, the function g^H: x ↦ f(x;H(x)) is collapsing with advantage O(q³·2^(-τ)).
Uses compressed oracle techniques:
- Prove Invert_f and CPhsO are nearly commutative
- Use min-entropy condition to bound collision probability
- Achieve input collapse through output measurement
- Using the one-time signature scheme from CLLZ21, users only need:
- Storage of constant-size quantum state
- Measurements in standard and Hadamard bases
- Near-Term Feasibility: Quantum capability requirements are independent of program complexity
- Scalable Security: Additional quantum resources are only needed to increase security
- Classical Communication Alternative: Can replace quantum communication through remote state preparation protocols
- Generative AI model protection
- Pay-per-query software services
- Sensitive programs requiring offline execution
- GKR08: Initial study of one-time programs (without quantum computing)
- BGS13: Proposed quantum one-time programs concept, proved impossibility for deterministic programs
- BS23: Protected signature functions in standard model
- GLR+24: Parallel independent work providing stronger security definitions
- First universal scheme protecting arbitrary randomized algorithms
- Self-contained security proof with elegant structure
- Design oriented toward practical considerations
- Quantum one-time tokens can protect arbitrary randomized classical programs
- Security depends on high min-entropy of program outputs
- Quantum resource requirements are independent of program complexity
- The scheme is feasible for implementation in the NISQ era
- High Entropy Requirement: Program output must possess sufficiently high min-entropy
- Black-Box Model: Security proof is in the idealized black-box model
- Deterministic Program Restriction: Not applicable to deterministic programs (limited by impossibility results from BGS13)
- Complex Classical Communication Protocol: While theoretically replaceable with classical communication, the protocol is extremely complex
- Security analysis in the standard model
- Reducing requirements on program output entropy
- Implementation and testing on actual quantum devices
- Analysis of relationship with GLR+24 work
- Theoretical Innovation: First universal quantum scheme protecting arbitrary randomized algorithms
- Practical Design: Quantum resource requirements decoupled from program complexity, enhancing practicality
- Rigorous Proof: Provides elegant security proof based on collapsing hash functions
- Application Prospects: Directly applicable to current generative AI protection needs
- Idealized Assumptions: Relies on black-box model and random oracle model
- Entropy Condition Limitations: High min-entropy requirements may limit practical application scope
- Implementation Complexity: While theoretically elegant, practical implementation faces engineering challenges
- Security Definition: Authors acknowledge this is not the final definition of one-time security
- Academic Value: Provides new theoretical framework for program protection in quantum cryptography
- Practical Potential: Offers possible quantum solutions for protecting valuable AI models
- Technical Advancement: Promotes development of unclonable cryptography
- Inspirational Significance: Provides new insights for near-term practical applications of quantum computing
- AI service providers needing intellectual property protection
- Software licensing models with usage-based payment
- Algorithms requiring extremely high security protection
- Candidate applications for quantum advantage demonstration
This paper cites important works in quantum cryptography, unclonable cryptography, and quantum computational complexity theory, particularly:
- Aar09 Aaronson's pioneering work on quantum copy protection
- BS23 Ben-David and Sattath's work on quantum digital signatures
- CLLZ21 Constructions on hidden cosets and unclonable cryptography
- Zha19 Zhandry's work on compressed oracle techniques
This paper makes important contributions to theoretical quantum cryptography, providing an elegant solution to balance the contradiction between availability and security in software distribution. While practical implementation challenges remain, it provides a promising direction for near-term realization of quantum computing in cryptographic applications.