Obfuscation of Quantum Computation
James Bartusek
UC Berkeley
Indistinguishability Obfuscation of Null Quantum Circuits and Applications
with Giulio Malavolta (Bocconi University)
Obfuscation of Pseudo-Deterministic Quantum Circuits
with Fuyuki Kitagawa, Ryo Nishimaki, and Takashi Yamakawa (NTT)
Traditional encryption:
Enc
Obfuscation:
Obf
“One-way compiler”
The Story of (Classical) Obfuscation
Quantum Obfuscation
QObf
Describes a quantum computation
Quantum Obfuscation
QObf
Describes a quantum computation
Quantum Obfuscation
QObf
Describes a quantum computation
Do there exist one-way compilers for quantum computations?
The Story of Quantum Obfuscation (so far)
Initial interest
Initial results
Goal: General-Purpose Feasibility Results
Which quantum programs can be obfuscated given access to an ideal classical cryptographic object:
Oracle that computes an (efficient) classical computation of our choice
Focus: quantum programs with (pseudo)-deterministic classical outputs
Can be heuristically instantiated with indistinguishability obfuscation
Results in the classical oracle model
QObf
[B, Malavolta 22]
Description of a null quantum computation
Cryptographic applications:
e.g. the only currently known NIZK and SNARG for QMA
(QObf should satisfy correctness for non-null computations)
Results in the classical oracle model
QObf
Description of a pseudo-deterministic quantum computation
[B, Kitagawa, Nishimaki, Yamakawa 23]
E.g. obfuscate a circuit that computes Shor’s algorithm
Results in the classical oracle model
QObf
Quantum description of a pseudo-deterministic computation
[B, Brakerski, Vaikuntanathan] (in submission)
Implies “best-possible” copy-protection [Coladangelo, Gunn 23]
Bird’s Eye View
Blind quantum computation
Should only allow to decrypt honestly generated encodings
Verifiable +
Blind Delegation
(Classically) Verifiable Delegation
[Mahadev 18a]
[Mahadev 18b]
Attempted fix: verify the blind evaluation algorithm
Still a problem: verification algorithm is learnable
Goal: achieve classically verifiable delegation with
reusable soundness [B, Kitagawa, Nishimaki, Yamakawa 23]
Attack on reusability:
Reusable soundness of classically verifiable delegation
Attack on reusability:
Main idea: Commit to history state first
Impossible due to binding of the commitment
Main idea: Commit to history state first
Publicly-decodable Pauli Functional Commitment
Committed state can be opened to either a Z or X measurement
Binding to Z measurements
Binding holds even given oracle access to receiver
Main idea: Commit to history state first
Publicly-decodable Pauli Functional Commitment
Construction: Generalize template from [Brakerski, Christiano, Mahadev, Vazirani, Vidick 18] to support high-dimensional coset states
Main idea: Commit to history state first
Summary
Future Directions
Thanks for listening!