1 Introduction
Knowledge extraction is a quintessential concept employed to argue the security of classical zero-knowledge systems and secure two-party and multi-party computation protocols. The seminal work of Feige, Lapidot and Shamir [19] shows how to leverage knowledge extraction to construct zero-knowledge protocols. The ideal world-real world paradigm necessarily requires the simulator to be able to extract the inputs of the adversaries to argue the security of secure computation protocols.
Typically, knowledge extraction is formalized by defining a knowledge extractor that given access to the adversarial machine, outputs the input of the adversary. The prototypical extraction technique employed in several cryptographic protocols is rewinding. In the rewinding technique, the extractor, with oracle access to the adversary, rewinds the adversary to a previous state to obtain more than one protocol transcript which in turn gives the ability to the extractor to extract from the adversary. While rewinding has proven to be quite powerful, it has several limitations [22]. Over the years, cryptographers have proposed novel extraction techniques to circumvent the barriers of rewinding. Each time a new extraction technique was invented, it has advanced the field of zero-knowledge and secure computation. As an example, the breakthrough work of Barak [7] proposed a non-black-box extraction technique – where the extractor crucially uses the code of the verifier for extraction – and used this to obtain the first feasibility result on constant-round public-coin zero-knowledge argument system for NP. Another example is the work of Pass [35] who introduced the technique of super-polynomial time extraction and presented the first feasibility result on 2-round concurrent ZK argument system albeit under a weaker simulation definition.
Extracting from Quantum Adversaries. The prospect of quantum computers introduces new challenges in the design of zero-knowledge and secure computation protocols. As a starting step towards designing these protocols, we need to address the challenge of knowledge extraction against quantum adversaries. So far, the only technique used to extract from quantum adversaries is quantum rewinding [42], which has already been studied by a few works [3, 27, 38, 40, 42] in the context of quantum zero-knowledge protocols.
Rewinding a quantum adversary, unlike its classical counterpart, turns out to be tricky due to two reasons, as stated in Watrous [42]: firstly, intermediate quantum states of the adversary cannot be copied (due to the universal no-cloning theorem) and secondly, if the adversary performs some measurements then this adversary cannot be rewound since measurements in general are irreversible processes. As a result, the existing quantum rewinding techniques tend to be “oblivious” [38], to rewind the adversary back to an earlier point, the extraction should necessarily forget all the information it has learnt from that point onwards. As a result of these subtle issues, the analysis of quantum rewinding turns out to be quite involved making it difficult to use it in the security proofs. Moreover, existing quantum rewinding techniques [38, 42] pose a bottleneck towards achieving a constant round extraction technique; we will touch upon this later.
In order to advance the progress of constructing quantum-secure (or post-quantum) cryptographic protocols, it is necessary that we look beyond quantum rewinding and explore new quantum extraction techniques.
1.1 Results
Extractability: An extractor, implemented as a quantum polynomial time algorithm, can extract a valid witness from an adversarial sender. We model the adversarial sender as a quantum polynomial time algorithm that follows the protocol but is allowed to choose its randomness; in the classical setting, this is termed as semi-malicious and we call this semi-malicious quantum adversaries1.
We also require indistinguishability of extraction: that is, the adversarial sender cannot distinguish whether it’s interacting with the honest receiver or an extractor. In applications, this property is used to argue that the adversary cannot distinguish whether it’s interacting with the honest party or the simulator.
Zero-Knowledge: A malicious receiver should not be able to extract a valid witness after interacting with the sender. The malicious receiver can either be a classical probabilistic polynomial time algorithm or a quantum polynomial time algorithm. Correspondingly, there are two notions of quantum extraction protocols we study: quantum extraction protocols secure against quantum adversarial receivers (qQEXT) and quantum extraction protocols secure against classical adversarial receivers (cQEXT).
There are two reasons why we only study extraction against semi-malicious adversaries, instead of malicious adversaries (who can arbitrarily deviate from the protocol): first, even extracting from semi-malicious adversaries turns out to be challenging and we view this as a first step towards extraction from malicious adversaries and second, in the classical setting, there are works that show how to leverage extraction from semi-malicious adversaries to achieve zero-knowledge protocols [9, 11] or secure two-party computation protocols [4].
Quantum extraction protocols are interesting even if we only consider classical adversaries, as they present a new method for proving zero-knowledge. For instance, to demonstrate zero-knowledge, we need to demonstrate a simulator that has a computational capability that a malicious prover doesn’t have. Allowing quantum simulators in the classical setting [28] is another way to achieve this asymmetry between the power of the simulator and the adversary besides the few mentioned before (rewinding, superpolynomial, or non-black-box). Furthermore, quantum simulators capture the notion of knowledge that could be learnt if a malicious verifier had access to a quantum computer.
Quantum-Lasting Security. A potential concern regarding the security of cQEXT protocols is that the classical malicious receiver participating in the cQEXT protocol could later, long after the protocol has been executed, use a quantum computer to learn the witness of the sender from the transcript of the protocol and its own private state. For instance, the transcript could contain an ElGamal encryption of the witness of the sender; while a malicious classical receiver cannot break it, after the protocol is completed, it could later use a quantum computer to learn the witness. This is especially interesting in the event (full-fledged) quantum computers might become available in the future. First introduced by Unruh [39], we study the concept of quantum-lasting security; any quantum polynomial time (QPT) adversary given the transcript and the private state of the malicious receiver, should not be able to learn the witness of the sender. Our construction will satisfy this security notion and thus our protocol is resilient against the possibility of quantum computers being accessible in the future.
Result #1: Constant Round qQEXT protocols. We show the following result.
(Informal). Assuming quantum hardness of learning with errors and a quantum fully homomorphic encryption scheme (for arbitrary poly-time computations)2, satisfying, (1) perfect correctness for classical messages and, (2) ciphertexts of poly-sized classical messages have a poly-sized classical description, there exists a constant round quantum extraction protocol secure against quantum poly-time receivers.
We clarify what we mean by perfect correctness. For every public key, every valid fresh ciphertext of a classical message can always be decrypted correctly. Moreover, we require that for every valid fresh ciphertext, of a classical message, the evaluated ciphertext can be decrypted correctly with probability negligibly close to 1. We note that the works of [14, 31] give candidates for quantum fully homomorphic encryption schemes satisfying both the above properties.
En route to proving the above theorem, we introduce a new non black extraction technique in the quantum setting building upon a classical non-black extraction technique of [11]. We view identifying the appropriate classical non-black-box technique to also be a contribution of our work. A priori it should not be clear whether classical non-black-box techniques are useful in constructing their quantum analogues. For instance, it is unclear how to utilize the well known non-black-box technique of Barak [7]; at a high level, the idea of Barak [7] is to commit to the code of the verifier and then prove using a succinct argument system that either the instance is in the language or it has the code of the verifier. In our setting, the verifier is a quantum circuit which means that we would require succinct arguments for quantum computations which we currently don’t know how to achieve.
Non-black-box extraction overcomes the disadvantage quantum rewinding poses in achieving constant round extraction; the quantum rewinding employed by [42] requires polynomially many rounds (due to sequential repetition) or constant rounds with non-negligible gap between extraction and verification error [38].
This technique was concurrently developed by Bitansky and Shmueli [12] (see “Comparison with [12]” paragraph) and they critically relied upon this to construct a constant-round zero-knowledge argument system for NP and QMA, thus resolving a long-standing open problem in the round complexity of quantum zero-knowledge.
Subsequent Work. Many followup works have used the non-black-box extraction technique we introduce in this work to resolve other open problems in quantum cryptography. For instance, our technique was adopted to prove that quantum copy-protection is impossible [6]; resolving a problem that was open for more than a decade. It was also used to prove that quantum VBB for classical circuits is impossible [2, 6]. In yet another exciting follow up work, this technique was developed further to achieve the first constant round post-quantum secure MPC protocol [1].
Result #2: Constant Round cQEXT protocols. We also present a construction of quantum extraction protocols secure against classical adversaries (cQEXT). This result is incomparable to the above result; on one hand, it is a weaker setting but on the other hand, the security of this construction can solely be based on the hardness of learning with errors.
(Informal). Assuming quantum hardness of learning with errors, there exists a constant round quantum extraction protocol secure against classical PPT adversaries and satisfying quantum-lasting security.
Our main insight is to turn the “test of quantumness” protocol introduced in [15] into a quantum extraction protocol using cryptographic tools. In fact, our techniques are general enough that they might be useful to turn any protocol that can verify a quantum computer versus a classical computer into a quantum extraction protocol secure against classical adversaries; the transformation additionally assumes quantum hardness of learning with errors. Our work presents a new avenue for using “test of quantumness” protocols beyond using them just to test whether the server is quantum or not.
We note that it is conceivable to construct “test of quantumness” protocols from DDH (or any other quantum-insecure assumption). The security of the resulting extraction protocol would then be based on DDH and quantum hardness of learning with errors – the latter needed to argue quantum-lasting security. However, the security of our protocol is solely based on the quantum hardness of learning with errors.
Result #3: Constant Round QZK for NP with Classical Soundness. As an application, we show how to construct constant quantum zero-knowledge argument systems secure against quantum verifiers based on quantum hardness of learning with errors; however, the soundness is still against classical PPT adversaries.
Moreover, our protocol satisfies zero-knowledge against quantum verifiers with arbitrary quantum auxiliary state. Such protocols are also called auxiliary-input zero-knowledge protocols [24] and are necessary for composition. Specifically, our ZK protocol can be composed with other protocols to yield new protocols satisfying quantum security.
(Constant Round Quantum ZK with Classical Soundness; Informal). Assuming quantum hardness of learning with errors, there exists a constant round black box quantum zero-knowledge system with negligible soundness against classical PPT algorithms. Moreover, our protocol satisfies (quantum) auxiliary-input zero-knowledge property.
A desirable property from a QZK protocol is if the verifier is classical then the simulator is also classical. While our protocol doesn’t immediately satisfy this property, we show, nonetheless, that there is a simple transformation that converts into another QZK protocol that has this desirable property.
Application: Authorization with Quantum Cloud. Suppose Eva wants to convince the cloud services offered by some company that she has the authorization to access a document residing in the cloud. Since the authorization information could leak sensitive information about Eva, she would rather use a zero-knowlede protocol to prove to the cloud that she has the appropriate authorization. While we currently don’t have scalable implementations of quantum computers, this could change in the future when organizations (e.g. governments, IBM, Microsoft, etc.) could be the first ones to develop a quantum computer. They could in principle then use this to break the zero-knowledge property of Eva’s protocol and learn sensitive information about her. In this case, it suffices to use a QZK protocol but only requiring soundness against malicious classical users; in the nearby future, it is reasonable to assume that even if organizations with enough resources get to develop full-fledged quantum computers, it’ll take a while before everyday users will have access to one.
1.2 Related Work
Quantum Rewinding. Watrous [42] introduced the quantum analogue of the rewinding technique. Later, Unruh [38] introduced yet another notion of quantum rewinding with the purpose of constructing quantum zero-knowledge proofs of knowledge. Unruh’s rewinding does have extractability, but it requires that the underlying protocol to satisfy strict soundness. Furthermore, the probability that the extractor succeeds is not negligibly close to 1. The work of [3] shows that relative to an oracle, many classical zero-knowledge protocols are quantum insecure, and that the strict soundness condition from [38] is necessary in order for a sigma protocol to be a quantum proofs of knowledge.
Quantum and Classical Zero-Knowledge. Zero-knowledge against quantum adversaries was first studied by Watrous [42]. He showed how the GMW protocol [23] for graph 3-colorability is still zero-knowledge against quantum verifiers. Other works [18, 26, 27, 29, 33, 38] have extended the study of classical protocols that are quantum zero-knowledge, and more recently, Broadbent et al. [17] extended the notion of zero-knowledge to QMA languages. By using ideas from [32] to classically verify quantum computation, the protocol in [17] was adapted to obtained classical argument systems for quantum computation in [41]. All known protocols, with non-negligible soundness error, take non-constant rounds.
On the other hand, zero knowledge proof and argument systems have been extensively studied in classical cryptography. In particular, a series of recent works [8–11] resolved the round complexity of zero knowledge argument systems.
Comparison with [12]. In a recent exciting work, [12] construct a constant round QZK with soundness against quantum adversaries for NP and QMA.
The non-black-box techniques used in their work was concurrently developed and are similar to the techniques used in our QEXT protocol secure against quantum receivers3.
- Subsequent to their posting, using completely different techniques, we developed QEXT secure against classical receivers and used it to build a constant round QZK system with classical soundness. There are a few crucial differences between our QZK argument system and theirs:
- 1.
Our result is based on quantum hardness of learning with errors while their result is based on the existence of quantum fully homomorphic encryption for arbitrary polynomial computations and quantum hardness of learning with errors.
- 2.
The soundness of their argument system is against quantum polynomial time algorithms while ours is only against classical PPT adversaries.
1.3 Quantum Extraction with Security Against Classical Receivers: Overview
We start with the overview of quantum extraction protocols with security against classical receivers.
Starting Point: Noisy Trapdoor Claw-Free Functions. Our main idea is to turn the “test of quantumness” from [15] into an extraction protocol. Our starting point is a noisy trapdoor claw-free function (NTCF) family [15, 31, 32], parameterized by key space , input domain
and output domain
. Using a key
, NTCFs allows for computing the functions, denoted by
and
4, where
. Using a trapdoor
associated with a key
, any y in the support of
, can be efficiently inverted to obtain x. Moreover, there are “claw” pairs
such that
. Roughly speaking, the security property states that it is computationally hard even for a quantum computer to simultaneously produce
, values
and (d, u) such that
and
, where
is an efficienctly computable injective function mapping
into bit strings. What makes this primitive interesting is its quantum capability that we will discuss when we recall below the test of [15].
The classical client, who wants to test whether the server it’s interacting with is quantum or classical, first generates a key
along with a trapdoor
associated with a noisy trapdoor claw-free function (NTCF) family. It sends
to the server.
The server responds back with
.
The classical client then sends a challenge bit
to the server.
If
, the server sends a pre-image
along with bit b such that
. If
, the server sends a vector d along with a bit u satisfying the condition
, where
are such that
.
The client can check if the message sent by the server is either a valid pre-image or a valid d that is correlated with respect to both the pre-images.
Intuitively, since the (classical) server does not know, at the point when it sends y, whether it will be queried for or (d, u), by the security of NTCFs, it can only answer one of the queries. While the quantum capability of NTCFs allows for a quantum server to maintain a superposition of a claw at the time it sent y and depending on the query made by the verifier it can then perform the appropriate quantum operations to answer the client; thus it will always pass the test.
From Test of Quantumness to Extraction. A natural attempt to achieve extraction is the following: the sender takes the role of the client and the receiver takes the role of the server and if the test passes, the sender sends the witness to the receiver. We sketch this attempt below.
Sender on input instance-witness pair
and receiver on input instance y run a “test of quantumness” protocol where the receiver (taking the role of the server) needs to convince the sender (taking the role of the classical client) that it is a quantum computer.
If the receiver succeeds in the “test of quantumness” protocol then the sender
, else it aborts.
Note that a quantum extractor can indeed succeed in the test of quantumness protocol and hence, it would receive while a malicious classical adversary will not.
However, the above solution is not good enough for us. It does not satisfy indistinguishability of extraction: the sender can detect whether it’s interacting with a quantum extractor or an honest receiver.
Achieving Indistinguishability of Extraction. To ensure indistinguishability of extraction, we rely upon a tool called secure function evaluation [9, 21] that satisfies quantum security. A secure function evaluation (SFE) allows for two parties and
to securely compute a function on their inputs in a such a way that only one of the parties, say
, receives the output of the function. In terms of security, we require that: (i)
doesn’t get information about
’s input beyond the output of the function and, (ii)
doesn’t get any information about
’s input (in fact, even the output of the protocol is hidden from
).
The hope is that by combining SFE and test of quantumness protocol, we can guarantee that a quantum extractor can still recover the witness by passing the test of quantumness as before but the sender doesn’t even know whether the receiver passed or not. To implement this, we assume a structural property from the underlying test of quantumness protocol: until the final message of the protocol, the client cannot distinguish whether it’s talking to a quantum server or a classical server. This structural property is satisfied by the test of quantumness protocol [15] sketched above.
Using this structural property and SFE, here is another attempt to construct a quantum extraction protocol: let the test of quantumness protocol be a k-round protocol.
Sender on input instance-witness pair
and receiver on input instance y run the first
rounds of the test of quantumness protocol where the receiver (taking the role of the server) needs to convince the sender (taking the role of the receiver) that it can perform quantum computations.
Sender and receiver then run a SFE protocol for the following functionality G: it takes as input
and the first
rounds of the test of quantumness protocol from the sender, the
round message from the receiver6 and outputs
if indeed the test passed, otherwise output
. Sender will take the role of
and the receiver will take the role of
and thus, only the receiver will receive the output of G.
Note that the security of SFE guarantees that the output of the protocol is hidden from the sender and moreover, the first messages of the test of quantumness protocol doesn’t reveal the information about whether the receiver is a quantum computer or not. These two properties ensure the sender doesn’t know whether the receiver passed the test or not. Furthermore, the quantum extractor still succeeds in extracting the witness
since it passes the test.
The only remaining property to prove is zero-knowledge.
Challenges in Proving Zero-Knowledge. How do we ensure that a malicious classical receiver was not able to extract the witness? The hope would be to invoke the soundness of the test of quantumness protocol to argue this. However, to do this, we need all the k messages of the test of quantumness protocol.
To understand this better, let us recall how the soundness of the test of quantumness works: the client sends a challenge bit to the server who responds back with
, then the client rewinds the server and instead sends the challenge bit
and it receives (d, u): this contradicts the security of NTCFs since a classical PPT adversary cannot simultaneously produce both a valid pre-image
and a valid correlation vector along with the prediction bit (d, u).
Since the last message is fed into the secure function evaluation protocol and inaccessible to the simulator, we cannot use this rewinding strategy to prove the zero-knowledge of the extraction protocol.
Final Template: Zero-Knowledge via Extractable Commitments [36, 37]. To overcome this barrier, we force the receiver to commit, using an extractable commitment scheme, to the round of the test of quantumness protocol before the SFE protocol begins. An extractable commitment scheme is one where there is an extractor who can extract an input x being committed from the party committing to x. Armed with this tool, we give an overview of our construction below.
Sender on input instance-witness pair
and receiver on input instance y run the first
rounds of the test of quantumness protocol where the receiver (taking the role of the server) needs to convince the sender (taking the role of the receiver) that it can perform quantum computations.
The
round of the test of quantumness protocol is then committed by the receiver, call it
, using the extractable commitment scheme7.
Finally, the sender and the receiver then run a SFE protocol for the following functionality G: it takes as input
and the first
rounds of the test of quantumness protocol from the sender, the decommitment of
from the receiver and outputs
if indeed the test passed, otherwise output
. Sender will take the role of
and the receiver will take the role of
and thus, only the receiver will receive the output of G.
Let us remark about zero-knowledge since we have already touched upon the other properties earlier. To argue zero-knowledge, construct a simulator that interacts honestly with the malicious receiver until the point the extraction protocol is run. Then, the simulator runs the extractor of the commitment scheme to extract the final message of the test of quantumness protocol. It then rewinds the test of quantumness protocol to the point where the simulator sends a different challenge bit (see the informal description of [15] given before) and then runs the extractor of the commitment scheme once again to extract the round message of the test of quantumness protocol. Recall that having final round messages corresponding to two different challenge bits is sufficient to break the security of NTCFs; the zero-knowledge property then follows.
A couple of remarks about our simulator. Firstly, the reason why our simulator is able to rewind the adversary is because the adversary is a classical PPT algorithm. Secondly, our simulator performs double rewinding – not only does the extractor of the commitment scheme perform rewinding but also the test of quantumness protocol is rewound.
1.4 Constant Round QZK Argument Systems with Classical Soundness
We show how to use the above quantum extraction protocol secure against classical receivers (cQEXT) to construct an interactive argument system satisfying classical soundness and quantum ZK.
From Quantum Extraction to Quantum Zero-Knowledge. As a starting point, we consider the quantum analogue of the seminal FLS technique [19] to transform a quantum extraction protocol into a quantum ZK protocol. A first attempt to construct quantum ZK is as follows: let the input to the prover be instance y and witness while the input to the verifier is y.
The verifier commits to some trapdoor
. Call the commitment
and the corresponding decommitment
.
The prover and verifier then execute a quantum extraction protocol with the verifier playing the role of the sender, on input
, while the prover plays the role of the receiver on input
.
The prover and the verifier then run a witness-indistinguishable protocol where the prover convinces the verifier that either y belongs to the language or it knows
.
At first sight, it might seem that the above template should already give us the result we want; unfortunately, the above template is insufficient. The verifier could behave maliciously in the quantum extraction protocol but the quantum extraction protocol only guarantees security against semi-malicious senders. Hence, we need an additional mechanism to protect against malicious receivers. Of course, we require witness-indistinguishability to hold against quantum verifiers and we do know candidates satisfying this assuming quantum hardness of learning with errors [13, 30].
Handling Malicious Behavior in QEXT. To check that the verifier behaved honestly in the quantum extraction protocol, we ask the verifier to reveal the inputs and random coins used in the quantum extraction protocol. At this point, the prover can check if the verifier behaved honestly or not. Of course, this would then violate soundness: the malicious prover upon receiving the random coins from the verifier can then recover and then use this to falsely convince the verifier to accept its proof. We overcome this by forcing the prover to commit (we again use the extractable commitment scheme of [36]) to some string
just before the verifier reveals the inputs and random coins used in the quantum extraction protocol. Then we force the prover to use the committed
in the witness-indistinguishable protocol; the prover does not gain any advantage upon seeing the coins of the verifier and thus, ensuring soundness.
One aspect we didn’t address so far is the aborting issue of the verifier: if the verifier aborts in the quantum extraction protocol, the simulator still needs to produce a transcript indistinguishable from that of the honest prover. Luckily for us, the quantum extraction protocol we constructed before already allows for simulatability of aborting adversaries.
To summarise, our ZK protocol consists of the following steps: (i) first, the prover and the verifier run the quantum extraction protocol, (ii) next the prover commits to a string using [36], (iii) the verifier then reveals the random coins used in the extraction protocol and, (iv) finally, the prover and the verifier run a quantum WI protocol where the prover convinces the verifier that it either knows a trapdoor
or that y is a YES instance.
1.5 Quantum Extraction with Security Against Quantum Receivers: Overview
We show how to construct extraction protocols where we prove security against quantum receivers. At first sight, it might seem that quantum extraction and quantum zero-knowledge properties are contradictory since the extractor has the same computational resources as the malicious receiver. However, we provide more power to the extractor by giving the extractor non-black-box access to the semi-malicious sender. There is a rich literature on non-black-box techniques in the classical setting starting with the work of [7].


Later, we show how to get rid of 2-circular insecurity property by using lockable obfuscation [25, 43]. Here is our first attempt to construct the extraction protocol:Given
(i.e., encryption of
under
),
, where
and
are independently generated public key-secret key pairs, we can efficiently recover
and
.
The sender, on input instance y and witness
, sends three ciphertexts:
,
and
.
The receiver sends
.
If
then the sender sends
.
It first encrypts the private (quantum) state of S under public key
.
Here is our main insight: the extractor can homomorphically evaluate the next message function of S on
and the encrypted state of S. The result is
. But note that
is nothing but
; note that S upon receiving
outputs
. Thus, we have
.
Now, the extractor has both
and
. It can then use the circular insecurity of
to recover
.
Finally, it decrypts
to obtain the witness
!
The correctness of extraction alone is not sufficient; we need to argue that the sender cannot distinguish whether it’s interacting with the honest receiver or the extractor. This is not true in our protocol since the extractor will always compute the next message function of S on whereas an honest receiver will send
only with negligible probability.
Indistinguishability of Extraction: SFE Strikes Again. We already encountered a similar issue when we were designing extraction protocols with security against classical receivers and the tool we used to solve that issue was secure function evaluation (SFE); we will use the same tool here as well.
Using SFE, we make another attempt at designing the quantum extraction protocol.
The sender, on input instance y and witness
, sends three ciphertexts:
,
and
.
The sender and the receiver executes a secure two-party computation protocol, where the receiver feeds
and the sender feeds in
. After the protocol finishes, the receiver recovers
if
, else it recovers
. The sender doesn’t receive any output.
The above template guarantees indistinguishability of extraction property9.
We next focus on zero-knowledge. To do this, we need to argue that the input by the malicious receiver can never be equal to
. One might falsely conclude that the semantic security of
would imply that
is hidden from the sender and hence the argument follows. This is not necessarily true; the malicious receiver might be able to “maul” the ciphertext
into the messages of the secure function evaluation protocol in such a way that the implicit input committed by the receiver is
. We need to devise a mechanism to prevent against such mauling attacks.
Preventing Mauling Attacks. We prevent the mauling attacks by forcing the receiver to commit to random strings in the first round, where
, even before it receives the ciphertexts
from the sender. Once it receives the ciphertexts, the receiver is supposed to commit to every bit of the trapdoor using the randomness
; that is, the
bit of
is committed using
.
Using this mechanism, we can then provably show that if the receiver was able to successfully maul the ciphertext then it violates the semantic security of
using a non-uniform adversary.
Replacing Circular Insecurity with Lockable Obfuscation [25, 43]. While the above protocol is a candidate for quantum extraction protocol secure against quantum receivers; it is still unsatisfactory since we assume a quantum FHE scheme satisfying 2-circular insecurity. We show how to replace 2-circular insecure QFHE with any QFHE scheme (satisfying some mild properties already satisfied by existing candidates) and lockable obfuscation for classical circuits. A lockable obfuscation scheme is an obfuscation scheme for a specific class of functionalities called compute-and-compare functionalities; a compute-and-compare functionality is parameterized by (lock),
such that on input x, it outputs
if
. As long as
is sampled uniformly at random and independently of C, lockable obfuscation completely hides the circuit C,
and
. The idea to replace 2-circular insecure QFHE with lockable obfuscation10 is as follows: obfuscate the circuit, with secret key
, ciphertext
hardwired, that takes as input
, decrypts it to obtain
, then decrypts
to obtain
and outputs
if
. If the adversary does not obtain
then we can first invoke the security of lockable obfuscation to remove
from the obfuscated circuit and then it can replace
with
. The idea of using fully homomorphic encryption along with lockable obfuscation to achieve non-black-box extraction was first introduced, in the classical setting, by [11].
Unlike our cQEXT construction, the non-black-box technique used for qQEXT does not directly give us a constant round quantum zero-knowledge protocol for NP. This is because an adversarial verifier that aborts can distinguish between the extractor or the honest prover (receiver in qQEXT). The main issue is that the extractor runs the verifier homomorphically, so it cannot detect if the verifier aborted at any point in the protocol without decrypting. But if the verifier aborted, the extractor wouldn’t be able to decrypt in the first place – it could attempt to rewind but then this would destroy the initial quantum auxiliary state.
2 Preliminaries
We denote the security parameter by . We denote (classical) computational indistiguishability of two distributions
and
by
. In the case when
is negligible, we drop
from this notation.




Suppose
is a relation. We define
to be efficiently decidable if there exists an algorithm A and fixed polynomial p such that
if and only if
and the running time of A is upper bounded by p(|x|, |w|).
Suppose
is an efficiently decidable relation. We say that
is a NP relation if
is a NP language, where
is defined as follows:
if and only if there exists w such that
and
for some fixed polynomial p.
2.1 Learning with Errors
In this work, we are interested in the decisional learning with errors (LWE) problem. This problem, parameterized by , where
, and for a distribution
supported over
is to distinguish between the distributions
and
, where
and
. Typical setting of m is
, but we also consider
.
We base the security of our constructions on the quantum hardness of learning with errors problem.
2.2 Notation and General Definitions
For completeness, we present some of the basic quantum definitions, for more details see [34]. Quantum States and Channels. Let be any finite Hilbert space, and let
be the set of all linear operators from
to itself (or endomorphism). Quantum states over
are the positive semidefinite operators in
that have unit trace. Quantum channels or quantum operations acting on quantum states over
are completely positive trace preserving (CPTP) linear maps from
to
where
is any other finite dimensional Hilbert space.
A state over is called a qubit. For any
, we refer to the quantum states over
as n-qubit quantum states. To perform a standard basis measurement on a qubit means projecting the qubit into
. A quantum register is a collection of qubits. A classical register is a quantum register that is only able to store qubits in the computational basis.
A unitary quantum circuit is a sequence of unitary operations (unitary gates) acting on a fixed number of qubits. Measurements in the standard basis can be performed at the end of the unitary circuit. A (general) quantum circuit is a unitary quantum circuit with 2 additional operations: (1) a gate that adds an ancilla qubit to the system, and (2) a gate that discards (trace-out) a qubit from the system. A quantum polynomial-time algorithm (QPT) is a uniform collection of quantum circuits .
Quantum Computational Indistinguishability. When we talk about quantum distinguishers, we need the following definitions, which we take from [42].










![$$\left| \Pr \left[ \mathcal {E}(\rho _x\otimes \nu )=1\right] -\Pr \left[ \mathcal {E}(\sigma _x \otimes \nu )=1\right] \right| \le \epsilon (|x|) $$](../images/508076_1_En_5_Chapter/508076_1_En_5_Chapter_TeX_Equ1.png)
![$$\epsilon :\mathbb {N}\rightarrow [0,1]$$](../images/508076_1_En_5_Chapter/508076_1_En_5_Chapter_TeX_IEq221.png)












![$$ \left| \Pr \left[ \mathcal {E}\left( (\mathcal {D}_x\otimes \mathsf {Id})(\rho )\right) =1\right] -\Pr \left[ \mathcal {E}\left( (\mathcal {F}_x\otimes \mathsf {Id})(\rho )\right) =1\right] \right| \le \epsilon (|x|) $$](../images/508076_1_En_5_Chapter/508076_1_En_5_Chapter_TeX_Equ3.png)
![$$\epsilon :\mathbb {N}\rightarrow [0,1]$$](../images/508076_1_En_5_Chapter/508076_1_En_5_Chapter_TeX_IEq233.png)


Interactive Models. We model an interactive protocol between a prover, , and a verifier,
, as follows. There are 2 registers
and
corresponding to the prover’s and the verifier’s private registers, as well as a message register,
, which is used by both
and
to send messages. In other words, both prover and verifier have access to the message register. We denote the size of a register
by
– this is the number of bits or qubits that the register can store. We will have 2 different notions of interactive computation. Our honest parties will perform classical protocols, but the adversaries will be allowed to perform quantum protocols with classical messages.
- 1.
Classical protocol: An interactive protocol is classical if
,
, and
are classical, and
and
can only perform classical computation.
- 2.
Quantum protocol with classical messages: An interactive protocol is quantum with classical messages if either one of
or
is a quantum register, and
is classical.
and
can perform quantum computations if their respective private register is quantum, but they can only send classical messages.
When a protocol has classical messages, we can assume that the adversarial party will also send classical messages. This is without loss of generality, because the honest party can enforce this condition by always measuring the message register in the computational basis before proceeding with its computations.
Non-Black-Box Access. Let S be a QPT party (e.g. either prover or verifier in the above descriptions) involved in specific quantum protocol. In particular, S can be seen as a collection of QPTs, , where
is the number of rounds of the protocol, and
is the quantum operation that S performs on the ith round of the protocol.
We say that a QPT Q has non-black-box access to S, if Q has access to an efficient classical description for the operations that S performs in each round, , as well as access to the initial auxiliary inputs of S.









![$$ \mathsf {View}_{\mathsf {Verifier}}\left( \left\langle \mathsf {Prover}\left( \mathbf{y}, \rho _\mathsf {Prover}\right) ,\mathsf {Verifier}\left( \mathbf{y}, \sigma _{\mathsf {Verifier}}\right) \right\rangle \right) :=\mathsf {Tr}_{\mathrm {R}_\mathsf {Prover}} \left[ \mathcal {E}_{\mathbf{y}}\left( \rho _\mathsf {Prover}\otimes \sigma _\mathsf {Verifier}\right) \right] . $$](../images/508076_1_En_5_Chapter/508076_1_En_5_Chapter_TeX_Equ6.png)

3 Secure Quantum Extraction Protocols
We define the notion of quantum extraction protocols below. An extraction protocol, associated with an NP relation, is a classical interactive protocol between a sender and a receiver. The sender has an NP instance and a witness; the receiver only has the NP instance.
In terms of properties, we require the property that there is a QPT extractor that can extract the witness from a semi-malicious sender (i.e., follows the protocol but is allowed to choose its own randomness) even if the sender is a QPT algorithm. Moreover, the semi-malicious sender should not be able to distinguish whether it’s interacting with the extractor or the honest receiver.
In addition, we require the following property (zero-knowledge): the interaction of any malicious receiver with the sender should be simulatable without the knowledge of the witness. The malicious receiver can either be classical or quantum and thus, we have two notions of quantum extraction protocols corresponding to both of these cases.
Firstly, we do not impose any completeness requirement on our extraction protocol.
In ZKAoK systems, the prover can behave maliciously (i.e., deviates from the protocol) and the argument of knowledge property states that the probability with which the extractor can extract is negligibly close to the probability with which the prover can convince the verifier. In our definition, there is no guarantee of extraction if the sender behaves maliciously.









- Quantum Zero-Knowledge: Let
be any polynomially bounded function. For every
, for any QPT algorithm
with private quantum register of size
, for any large enough security parameter
, there exists a QPT simulator
such that,
- Semi-Malicious Extractability: Let
be any polynomially bounded function. For any large enough security parameter
, for every
, for every semi-malicious11 QPT
with private quantum register of size
, there exists a QPT extractor
(possibly using the code of
in a non-black box manner), the following holds:
Indistinguishability of Extraction:
The probability that
outputs
such that
is negligibly close to 1.


- Classical Zero-Knowledge: Let
be any polynomially bounded function. For any large enough security parameter
, for every
, for any classical PPT algorithm
with auxiliary information
, there exists a classical PPT simulator
such that
Quantum-Lasting Security. A desirable property of cQEXT protocols is that a classical malicious receiver, long after the protocol has been executed cannot use a quantum computer to learn the witness of the sender from the transcript of the protocol along with its own private state. We call this property quantum-lasting security; first introduced by Unruh [39]. We formally define quantum-lasting security below.







4 QEXT Secure Against Classical Receivers
In this section, we show how to construct quantum extraction protocols secure against classical adversaries based solely on the quantum hardness of learning with errors.
Quantum-secure computationally-hiding and perfectly-binding non-interactive commitments,
.
We instantiate the underlying commitment scheme in [36] using
to obtain a quantum-secure extractable commitment scheme. Instead of presenting a definition of quantum-secure extractable commitment scheme and then instantiating it, we directly incorporate the construction of [36] in the construction of the extraction protocol.
Noisy trapdoor claw-free functions
.
Quantum-secure secure function evaluation protocol
.



Description of the function associated with the
.

Quantum extraction protocol secure against classical receivers.
We prove the following lemma in the full version.
Assuming the quantum security of and NTCFs, the protocol
is a quantum extraction protocol secure against classical adversaries for NP. Moreover,
satisfies quantum-lasting security.
5 Application: Classical ZK Arguments Secure Against Quantum Verifiers
In this section, we show how to construct a quantum zero-knowledge, classical prover, argument system for NP secure against quantum verifiers; that is, the protocol is classical, the malicious prover is also a classical adversary but the malicious verifier can be a polynomial time quantum algorithm. To formally define this notion, consider the following definition.



Completeness: For any
, we have that
for some negligible function
.
Soundness: For any
, any classical PPT adversary
, and any polynomial-sized auxiliary information
, we have that
, for some negligible function
.
We say that a classical argument system for NP is a QZK (quantum zero-knowledge) classical argument system for NP if in addition to the above properties, a classical interactive protocol satisfies zero-knowledge against malicious receivers.
(QZK classical argument system for NP). A classical interactive protocol is a quantum zero-knowledge classical argument system for a language
, associated with an NP relation
if both of the following hold.
is a classical argument for
(Definition 6).
- Quantum Zero-Knowledge: Let
be any polynomially bounded function. For any QPT
that on instance
has private register of size
, there exist a QPT
such that the following two collections of quantum channels are quantum computationally indistinguishable,
.
In other words, that for every
, for any bounded polynomial
, for any QPT distinguisher
that outputs a single bit, and any
-qubits quantum state
,
![$$ \big |\Pr \left[ \mathcal {D}\left( \mathsf {Sim}(\mathbf{y},\mathsf {Verifier}^*, \cdot )\otimes I)(\rho )\right) =1\right] \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ $$](../images/508076_1_En_5_Chapter/508076_1_En_5_Chapter_TeX_Equ10.png)
![$$\ \ \ \ \ \ \ \ \ \ \ \ -\Pr \left[ \mathcal {D}\left( (\mathsf {View}_{\mathsf {Verifier}^*}( \langle \mathsf {Prover}(\mathbf{y},\mathsf {aux}_1),\mathsf {Verifier}^*(\mathbf{y},\cdot )\rangle )\otimes I)(\rho )\right) =1\right] \big |\le \epsilon (|\mathbf{y}|) $$](../images/508076_1_En_5_Chapter/508076_1_En_5_Chapter_TeX_Equ11.png)
Witness-Indistinguishability Against Quantum Verifiers. As a building block, we also consider witness indistinguishable (WI) argument systems for NP languages secure against quantum verifiers. We define this formally below.
(Quantum WI for an ). A classical protocol
is a quantum witness indistinguishable argument system for an NP language
if both of the following hold.
is a classical argument for
(Definition 6).
- Quantum WI: Let
be any polynomially bounded function. For every
, for any two valid witnesses
and
, for any QPT
that on instance y has private quantum register of size
, we require that
If is a quantum proof system (sound against unbounded provers), we say that
is a quantum witness indistinguishable proof system for
.
Instantiation. By suitably instantiating the constant round WI argument system of Blum [13] with perfectly binding quantum computational hiding commitments, we achieve a constant round quantum WI classical argument system assuming quantum hardness of learning with errors.
Construction.
We present a construction of constant round quantum zero-knowledge classical argument system for NP.
Perfectly-binding and quantum-computational hiding non-interactive commitments
.
Quantum extraction protocol secure against classical adversaries
associated with the relation
as constructed in Sect. 6.
Quantum witness indistinguishable classical argument system
(Definition 8) for the relation
(Fig. 3).

Relation associated with
.




(Classical Prover) Quantum zero-knowledge argument systems for NP.
We prove following lemma in the full version.
Assuming the security of ,
and
, the classical interactive protocol
is a quantum zero-knowledge classical argument system for NP.
6 QEXT Secure Against Quantum Adversaries
6.1 Construction of 
We present a construction of quantum extraction protocols secure against quantum adversaries, denoted by . First, we describe the tools used in this construction.
Quantum-secure computationally-hiding and perfectly-binding non-interactive commitments
.
Quantum fully homomorphic encryption scheme with some desired properties,
.
It admits homomorphic evaluation of arbitrary computations,
It admits perfect correctness,
The ciphertext of a classical message is also classical.
We show in the full version that there are
schemes satisfying the above properties.
- Quantum-secure two-party secure computation
with the following properties:
Only one party receives the output. We designate the party receiving the output as the receiver
and the other party to be
.
Security against quantum passive senders.
IND-Security against quantum malicious receivers.
Quantum-secure lockable obfuscation
for
, where every circuit
, parameterized by
, in
is defined in Fig. 5. Note that
is a compute-and-compare functionality.

Circuits used in the lockable obfuscation

Description of the function f associated with the .

Quantum extraction protocol
Construction. We construct a protocol in Fig. 7 for a NP language
, and the following lemma shows that
is a quantum extraction protocol.
We prove the following lemma in the full version.
Assuming the quantum security of ,
,
and
,
is a quantum extraction protocol for
secure against quantum adversaries.
We are grateful to Kai-Min Chung for many clarifications regarding quantum zero-knowledge proof and argument systems. We thank Thomas Vidick and Urmila Mahadev for answering questions about noisy trapdoor claw-free functions. We thank Abhishek Jain for helpful discussions and pointing us to the relevant references.