2018
DOI: 10.1038/s41467-018-07591-2
|View full text |Cite
|
Sign up to set email alerts
|

Quantum advantage for probabilistic one-time programs

Abstract: One-time programs, computer programs which self-destruct after being run only once, are a powerful building block in cryptography and would allow for new forms of secure software distribution. However, ideal one-time programs have been proved to be unachievable using either classical or quantum resources. Here we relax the definition of one-time programs to allow some probability of error in the output and show that quantum mechanics offers security advantages over purely classical resources. We introduce a sc… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

3
6

Authors

Journals

citations
Cited by 24 publications
(22 citation statements)
references
References 32 publications
0
21
0
1
Order By: Relevance
“…Examples of this type of devices can already be found both in classical and quantum computing, where the security of one-time programs essentially relies on hardware components, i.e. on onetime memories [9,10]. Other potential applications of our finding may be expected to be found in cryptography and hardware security in general.…”
Section: Discussionmentioning
confidence: 77%
“…Examples of this type of devices can already be found both in classical and quantum computing, where the security of one-time programs essentially relies on hardware components, i.e. on onetime memories [9,10]. Other potential applications of our finding may be expected to be found in cryptography and hardware security in general.…”
Section: Discussionmentioning
confidence: 77%
“…One way to do so is to follow the reasoning of [27]: take the timeordered decomposition of the distribution P from [53] that violates the guess-your-neighbor's-input (GYNI) inequality and find the λ that best mimic the marginal P a|x,λ -this effectively amounts to a one-time program [54]. The resulting TO-LHS assemblage violates GYNI, hence is not NS-LHS, but it is also supra-quantum, since no quantum state can violate the GYNI inequality.…”
Section: Methodsmentioning
confidence: 99%
“…Consequently, the natural choice of the feedback law would be one that replicates the dynamics of Eq. (26). By the mere correspondence of the quantities, this would translate to Ṙ(θ) ∝ n in .…”
Section: F Quantum Reservoir Computingmentioning
confidence: 99%
“…These structures have proven very effective in many relevant tasks, such as speech recognition [21] or image classification [22] and nowadays form the core of the most advanced artificial intelligence algorithms [23]. The second is quantum computation, which harnesses uniquely quantum features such as superposition and entanglement [1] to provide dramatic advantages for classically intractable problems [4,5,24], and enhanced data security for networks and data clouds [25][26][27].…”
Section: Introductionmentioning
confidence: 99%

Experimental quantum memristor

Spagnolo,
Morris,
Piacentini
et al. 2021
Preprint
Self Cite