Copy Protection: Difference between revisions
(Copy Protection: first commit) |
(→Use-cases: add information on delta security) |
||
Line 9: | Line 9: | ||
== Use-cases == | == Use-cases == | ||
* Any kind of software | * Any kind of software licence protection | ||
== Protocols == | == Protocols == | ||
Line 27: | Line 27: | ||
A Copy Protection scheme for a family of circuits has <math display="inline">\varepsilon</math>-<math display="inline">correctness</math> if for any circuit <math display="inline">C</math> of this family and for any input <math display="inline">x</math> for this circuit, <math display="block">Pr[\mathbf{Eval}(\rho_C, x) = f(x);\ \rho_C \gets \mathbf{Protect}(C)] \geq 1 - \varepsilon</math> | A Copy Protection scheme for a family of circuits has <math display="inline">\varepsilon</math>-<math display="inline">correctness</math> if for any circuit <math display="inline">C</math> of this family and for any input <math display="inline">x</math> for this circuit, <math display="block">Pr[\mathbf{Eval}(\rho_C, x) = f(x);\ \rho_C \gets \mathbf{Protect}(C)] \geq 1 - \varepsilon</math> | ||
A Copy Protection scheme for a family of circuits has <math display="inline">\delta</math>-<math display="inline">security</math> if no polynomially bounded quantum adversary can efficiently copy a protected program, more formally if | A Copy Protection scheme for a family of circuits has <math display="inline">\delta</math>-<math display="inline">security</math> if no polynomially bounded quantum adversary can efficiently copy a protected program, more formally if for any such adversary, her probability of winning the following game is lower than <math display="inline">1 - \delta</math>: | ||
* A Challenger samples a circuit C in the family and sends Protect(C) to the Adversary | * A Challenger samples a circuit C in the family and sends Protect(C) to the Adversary |
Latest revision as of 17:38, 13 September 2021
Functionality Description[edit]
Copy Protection is a functionality first defined by Aaronson [1] that enables a Vendor to send a program (a circuit) to a Client so that the Client cannot duplicate it.
Classically, this functionality has been proven impossible. However, it is possible to copy protect some families of programs using quantum computation.
Tags: Quantum Functionality, Two Party Protocols, Universal Task, Computational Security
Use-cases[edit]
- Any kind of software licence protection
Protocols[edit]
Currently, protocols for Copy Protection are only known for a few families of circuits.
- Quantum Copy Protection for Compute and Compare functions [3] [4]
- Quantum Copy Protection for Pseudo Random Number Generators [5]
Properties[edit]
A Copy Protection protocol for a family of circuits is made of two algorithms:
- Protect, which takes as input a classical description of a circuit and outputs a quantum encoding of this circuit.
- Eval, which takes as input a quantum state and an classical input, and returns a classical output.
A Copy Protection scheme for a family of circuits has - if for any circuit of this family and for any input for this circuit,
A Copy Protection scheme for a family of circuits has - if no polynomially bounded quantum adversary can efficiently copy a protected program, more formally if for any such adversary, her probability of winning the following game is lower than :
- A Challenger samples a circuit C in the family and sends Protect(C) to the Adversary
- The Adversary runs any polynomial computation she wants on Protect(C) and sends two quantum states, respectively and to two of her agents, respectively Alice and Bob
- The Challenger samples two inputs for the circuit and sends to Alice and to Bob.
- Alice sends to the Challenger and Bob sends to the Challenger.
- The Adversary wins iff and
We assume that Alice and Bob cannot communicate with each other.
Further Information[edit]
Even with quantum computation, Copy Protection is not possible for all families of circuits. Currently, it has been proven impossible for all learnable functions and de-quantumizable functions [2] .
Knowledge Graph[edit]
References[edit]
- Aaronson (2009) proposed a fist definition of Quantum Copy Protection.
- Ananth, Prabhanjan, and La Placa (2020) constructed a family of unlearnable circuits that cannot be copy protected.
- Coladangelo et al. (2020) proposed a copy protection construction for Compute and Compare functions in the QROM.
- Broadbent et al. (2021) proposed a copy protection construction for Compute and Compare functions without assumptions but with a weaker adversary model.
- Coladangelo et al. (2021) proposed a copy protection construction for PRNGs based on coset states.