<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=88.163.172.250</id>
	<title>Quantum Protocol Zoo - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.veriqloud.fr/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=88.163.172.250"/>
	<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Special:Contributions/88.163.172.250"/>
	<updated>2026-04-16T11:34:47Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.6</generator>
	<entry>
		<id>https://wiki.veriqloud.fr/index.php?title=Copy_Protection&amp;diff=4375</id>
		<title>Copy Protection</title>
		<link rel="alternate" type="text/html" href="https://wiki.veriqloud.fr/index.php?title=Copy_Protection&amp;diff=4375"/>
		<updated>2021-09-13T16:38:41Z</updated>

		<summary type="html">&lt;p&gt;88.163.172.250: /* Use-cases */ add information on delta security&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Functionality Description ==&lt;br /&gt;
&lt;br /&gt;
Copy Protection is a functionality first defined by Aaronson [[Copy Protection #References|[1] ]] that enables a Vendor to send a program (a circuit) to a Client so that the Client cannot duplicate it.&lt;br /&gt;
&lt;br /&gt;
Classically, this functionality has been proven impossible. However, it is possible to copy protect some families of programs using quantum computation.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Tags:&#039;&#039;&#039; Quantum Functionality, Two Party Protocols, Universal Task, Computational Security&lt;br /&gt;
&lt;br /&gt;
== Use-cases ==&lt;br /&gt;
&lt;br /&gt;
* Any kind of software licence protection&lt;br /&gt;
&lt;br /&gt;
== Protocols ==&lt;br /&gt;
&lt;br /&gt;
Currently, protocols for Copy Protection are only known for a few families of circuits.&lt;br /&gt;
&lt;br /&gt;
* Quantum Copy Protection for Compute and Compare functions [[Copy Protection #References|[3] ]] [[Copy Protection #References|[4] ]]&lt;br /&gt;
* Quantum Copy Protection for Pseudo Random Number Generators [[Copy Protection #References|[5] ]]&lt;br /&gt;
&lt;br /&gt;
== Properties ==&lt;br /&gt;
&lt;br /&gt;
A Copy Protection protocol for a family of circuits is made of two algorithms:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Protect&#039;&#039;&#039;, which takes as input a classical description of a circuit &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;C&amp;lt;/math&amp;gt; and outputs a quantum encoding &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;\rho_C&amp;lt;/math&amp;gt; of this circuit.&lt;br /&gt;
* &#039;&#039;&#039;Eval&#039;&#039;&#039;, which takes as input a quantum state and an classical input, and returns a classical output.&lt;br /&gt;
&lt;br /&gt;
A Copy Protection scheme for a family of circuits has &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;\varepsilon&amp;lt;/math&amp;gt;-&amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;correctness&amp;lt;/math&amp;gt; if for any circuit &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;C&amp;lt;/math&amp;gt; of this family and for any input &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;x&amp;lt;/math&amp;gt; for this circuit, &amp;lt;math display=&amp;quot;block&amp;quot;&amp;gt;Pr[\mathbf{Eval}(\rho_C, x) = f(x);\ \rho_C \gets \mathbf{Protect}(C)] \geq 1 - \varepsilon&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Copy Protection scheme for a family of circuits has &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;\delta&amp;lt;/math&amp;gt;-&amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;security&amp;lt;/math&amp;gt; if no polynomially bounded quantum adversary can efficiently copy a protected program, more formally if for any such adversary, her probability of winning the following game is lower than &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;1 - \delta&amp;lt;/math&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
* A Challenger samples a circuit C in the family and sends Protect(C) to the Adversary&lt;br /&gt;
* The Adversary runs any polynomial computation she wants on Protect(C) and sends two quantum states, respectively &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;\psi_A&amp;lt;/math&amp;gt; and &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;\psi_B&amp;lt;/math&amp;gt; to two of her agents, respectively Alice and Bob&lt;br /&gt;
* The Challenger samples two inputs &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;x_A, x_B&amp;lt;/math&amp;gt; for the circuit and sends &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;x_A&amp;lt;/math&amp;gt; to Alice and &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;x_B&amp;lt;/math&amp;gt; to Bob.&lt;br /&gt;
* Alice sends &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;y_A&amp;lt;/math&amp;gt; to the Challenger and Bob sends &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;y_B&amp;lt;/math&amp;gt; to the Challenger.&lt;br /&gt;
* The Adversary wins iff &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;C(x_A) = y_A&amp;lt;/math&amp;gt; and &amp;lt;math display=&amp;quot;inline&amp;quot;&amp;gt;C(x_B) = y_B&amp;lt;/math&amp;gt;&lt;br /&gt;
&lt;br /&gt;
We assume that Alice and Bob cannot communicate with each other.&lt;br /&gt;
&lt;br /&gt;
== Further Information ==&lt;br /&gt;
&lt;br /&gt;
Even with quantum computation, Copy Protection is not possible for all families of circuits. Currently, it has been proven impossible for all &#039;&#039;learnable functions&#039;&#039; and &#039;&#039;de-quantumizable functions&#039;&#039; [[Copy Protection #References|[2] ]].&lt;br /&gt;
&lt;br /&gt;
==Knowledge Graph==&lt;br /&gt;
{{graph}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
#[https://doi.org/10.1109/ccc.2009.42 Aaronson (2009)] proposed a fist definition of Quantum Copy Protection.&lt;br /&gt;
#[http://arxiv.org/abs/2005.05289 Ananth, Prabhanjan, and La Placa (2020)] constructed a family of unlearnable circuits that cannot be copy protected.&lt;br /&gt;
#[http://arxiv.org/abs/2009.13865 Coladangelo et al. (2020)] proposed a copy protection construction for Compute and Compare functions in the QROM.&lt;br /&gt;
#[http://arxiv.org/abs/2101.12739 Broadbent et al. (2021)] proposed a copy protection construction for Compute and Compare functions without assumptions but with a weaker adversary model.&lt;br /&gt;
#[http://arxiv.org/abs/2107.05692 Coladangelo et al. (2021)] proposed a copy protection construction for PRNGs based on coset states.&lt;/div&gt;</summary>
		<author><name>88.163.172.250</name></author>
	</entry>
</feed>