1 Introduction
Quantum computing devices are expected to solve problems that are infeasible for classical computers. However, as significant progress is made toward constructing quantum computers, it is challenging to verify that they work correctly, particularly when devices reach scales where classical simulation is infeasible. This problem has been considered in various models, such as with multiple entangled quantum provers [18, 24, 25, 27, 30, 35, 37, 42] or with verifiers who have limited quantum resources [2, 13, 14, 36]. Such solutions are not ideal since they require assumptions about the ability of the provers to communicate or require the verifier to have some quantum abilities.
In a major breakthrough, Mahadev recently described the first secure protocol enabling a purely classical verifier to certify the quantum computations of a single untrusted quantum prover [34]. The Mahadev protocol uses a quantum-secure cryptographic assumption to give the classical verifier leverage over the quantum prover. The protocol is sound under the assumption that Learning with Errors (LWE) does not admit a polynomial-time quantum algorithm. This assumption is widely accepted, and underlies some of the most promising candidates for quantum-secure cryptography [3].
The Mahadev Protocol. Mahadev’s result settled a major open question concerning the power of quantum-prover interactive arguments (QPIAs). In a QPIA, two computationally-bounded parties (a quantum prover and a classical verifier
) interact with the goal of solving a decision problem. Mahadev’s result showed that there is a four-round1 QPIA for
with negligible completeness error and constant soundness error
. The goal of the protocol is for the verifier to decide whether an input Hamiltonian H from a certain class (which is
-complete) has a ground state energy that is low (YES) or high (NO).

- 1.
generates a private-public key pair (pk, sk) and sends pk to
;
- 2.
prepares the ground state of H and then coherently evaluates a certain classical function
. This yields a state of the form
where the ground state is in a subregister of X.
measures Y and sends the result y to
.
holds a superposition over the preimages of y.
- 3.
replies with a uniformly random challenge bit
.
- 4.
If
(“test round”),
measures X in the computational basis and sends the outcome. If
(“Hadamard round”),
measures X in the Hadamard basis and sends the outcome.
After the four message rounds above are completed, the verifier uses their knowledge of H and the secret key sk to either accept or reject the instance H.
Our Results. In this work, we show that the Mahadev protocol can be transformed into protocols with significantly more favorable parameters, and with additional properties of interest. Specifically, we show how to build non-interactive protocols (with setup) for the same task, with negligible completeness and soundness errors. One of our protocols enables a verifier to publish a single public “setup” string and then receive arbitrarily many proofs from different provers, each for a different instance. We also construct a non-interactive protocol that satisfies the zero-knowledge property [10].
In principle, one could ask for slightly less interaction: the prover and the verifier receive the instance from a third party, and then the prover simply sends a proof to the verifier, with no setup. While we cannot rule such a protocol out, constructing it seems like a major challenge (and may even be impossible). Such a proof must be independent of the secret randomness of the verifier, making it difficult to apply Mahadev’s “cryptographic leash.” Without cryptographic assumptions, such a protocol would imply
[1], which is unlikely.
All of our results are conditioned on the hardness of the problem for quantum computers; we call this the
assumption. This assumption is inherited from the Mahadev protocol. For the zero-knowledge protocol, we also require fully-homomorphic encryption (FHE) with circuit privacy [38]. Our security proofs hold in the Quantum Random Oracle Model (QROM) [11]. For simplicity, we assume that the relevant security parameters are polynomial in the input
instance size n, so that efficient algorithms run in time
and errors are (ideally) negligible in n.
- 1.
making the first message instance-independent (i.e., moving it to an offline setup phase);
- 2.
applying parallel repetition, via a new parallel repetition theorem;
- 3.
adding zero-knowledge, by means of classical NIZKs and classical FHE; and
- 4.
applying Fiat-Shamir (in the QROM [11]).
Establishing that these transformations satisfy desirable properties is challenging. For instance, since cheating provers can now be quantum, classical parallel repetition theorems do not apply.
Instance-Independent Setup. Our first transformation is relatively simple, at a high level. Instead of setting the basis choice depending on the 2-local term of that we want to measure, we can just pick the basis uniformly at random and the choice is correct with probability . When we consider multiple copies of the ground state, and each copy is assigned both a random choice of basis and a 2-local terms, then about
of the copies get a consistent assignment. Thus, we can make the initial message instance-independent (and move it to an offline setup phase) by increasing the number of parallel measurements by a constant factor. We explain this transformation in more detail in Sect. 3. We refer to the resulting protocol as “the three-round Mahadev protocol,” denoted by
.
Parallel Repetition. Parallel repetition of a protocol is a very desirable property since it decreases the soundness error exponentially, without increasing the number of rounds of interaction (as in serial repetition). Given the importance of the Mahadev protocol, parallel repetition could be a useful tool for applying it in practice. However, several complications arise when attempting to show this. First, the Mahadev protocol is clearly private-coin, which is precisely the category of protocol that is challenging even in the classical setting [6, 29]. Second, classical proofs of parallel repetition typically involve constructing a single-copy prover that uses many rounds of nested rejection sampling. The quantum analogue of such a procedure, quantum rewinding, can only be applied in special circumstances [5, 45] and seems difficult to apply to parallel repetition.
We establish our new parallel repetition theorem with alternative techniques, suited specifically for the Mahadev protocol. We show that, for NO instances, the accepting paths of the verifier for the two different challenges ( and
) correspond to two nearly (computationally) orthogonal projectors. We also show that this persists in k-fold parallel repetition, meaning that each pair of distinct challenge strings
corresponds to nearly orthogonal projectors. From there, a straightforward argument shows that the prover cannot succeed on a non-negligible fraction of challenge strings. We show that k-fold parallel repetition yields the same optimal soundness error
as sequential repetition.
Taken together with the first transformation, the result is a three-round (with offline setup) for verifying
. We denote the k-fold parallel repetition of
by
.
Under the assumption,
is a three-round protocol (with offline setup) for verifying
with completeness
and soundness error
.
Zero-Knowledge. Zero-knowledge is a very useful cryptographic property of proof systems. Roughly, a protocol is zero-knowledge if the verifier “learns nothing” from the interaction with the honest prover, except that they have a “yes” instance. This notion is formalized by requiring an efficient simulator whose output distribution is indistinguishable from the distribution of the protocol outcomes.
In our next result, we show how to modify the protocol of Theorem 1.1 to achieve zero-knowledge against arbitrary classical verifiers. Our approach is similar to that of [19], but uses a purely classical verifier. Instead of the prover providing the outcomes of the measurements to be checked by the verifier (as in
), a classical non-interactive zero-knowledge proof (NIZK) is provided. However, the
statement “the measurements will pass verification” depends on the inversion trapdoor of the verifier, which must remain secret from the prover. To overcome this obstacle, we use classical fully homomorphic encryption (FHE). In the setup phase, an encryption of the verifier’s secret keys is provided to the prover, enabling the prover to later compute the NIZK homomorphically. To establish the zero-knowledge property, we require the FHE scheme to have circuit privacy, which means that the verifier cannot learn the evaluated circuit from the ciphertext provided by the prover. To prove the zero-knowledge property, we also need the extra assumption that the setup phase is performed by a trusted third party, since we cannot rely on the verifier to perform it honestly anymore.
In classical zero-knowledge arguments, it is common to consider efficient provers who are provided an -witness of the statement to prove. In the quantum setting, if we assume that the quantum polynomial-time prover has access to a quantum proof of a
statement,2 we achieve the following.
(Informal). Under the assumption, if circuit-private FHE exists, then there exists a three-round zero-knowledge argument for
(with trusted setup) with negligible completeness and soundness error.
Fiat-Shamir Transformation. In the above protocols (both and its ZK-variant), the second message of the verifier is a uniformly random
. In the final transformation, we eliminate this “challenge” round via the well-known Fiat-Shamir transform [23]: the prover generates the challenge bits
themselves by evaluating a public hash function
on the transcript of the protocol thus far. In our case, this means that the prover selects3
. Of course, the verifier also needs to adapt their actions at the verdict stage, using
when deciding acceptance/rejection. The resulting protocols now only have a setup phase and a single message from the prover to the verifier.
Fiat-Shamir (FS) is typically used to establish security in the Random Oracle Model, in the sense that FS preserves soundness up to negligible loss provided has superpolynomially large range [7, 40]. It is straightforward to see that this last condition is required; it is also the reason we applied parallel repetition prior to FS. A well-known complication in the quantum setting is that quantum computers can evaluate any public classical function
in superposition via the unitary operator
This means we must use the Quantum Random Oracle Model (QROM) [11], which grants all parties oracle access to
. Proving the security of transformations like FS in the QROM is the subject of recent research, and newly developed techniques have largely shown that FS in the QROM preserves soundness for so-called
-protocols [22, 33]. Extending those results to our protocols is relatively straightforward. Applying FS to
then yields the following.
Let , and let
denote the protocol resulting from applying Fiat-Shamir to the k-fold parallel repetition of the three-round Mahadev protocol. Under the
assumption, in the QROM,
is a non-interactive protocol (with offline setup) for verifying
with negligible completeness and soundness errors.
If we instead apply the Fiat-Shamir transform to the zero-knowledge protocol from Theorem 1.2, we achieve the following.4
(Informal). Under the assumption, in the QROM, there exists a classical non-interactive zero-knowledge argument (with trusted offline setup) for
, with negligible completeness and soundness errors.
Related Results. After an initial version of our work was made public, showing how the Mahadev protocol can be reduced to four rounds using parallel repetition and the Fiat-Shamir transform, Chia, Chung, and Yamakawa posted a preprint [17] describing the same result, with an alternative proof of parallel repetition. They also showed how to make the verifier run in polylog time using indistinguishability obfuscation. Our work was performed independently, and we subsequently improved our result to make the protocol non-interactive with setup and zero-knowledge.
Radian and Sattath [41] recently established what they call “a parallel repetition theorem for NTCFs,” which are the aforementioned classical functions . However, the context of [41] is very different from ours and their parallel repetition theorem follows from a purely classical result.
Broadbent, Ji, Song, and Watrous [16] presented the first quantum zero-knowledge proofs for with efficient provers. Vidick and Zhang [44] combined this protocol with the Mahadev protocol [34] to make the communication classical. Broadbent and Grilo [15] showed a “quantum
” zero-knowledge proof for
(with a quantum verifier). In the non-interactive setting, Coladangelo, Vidick, and Zhang [19] constructed a non-interactive zero-knowledge argument with quantum setup and Broadbent and Grilo [15] showed a quantum statistical zero-knowledge proof in the secret parameter model.
Open Problems. This work raises several natural open questions. First, is it possible to prove the soundness of our protocol when the oracle is instantiated with a concrete (e.g., correlation-intractable [39]) hash function? Our current analysis only applies in an idealized model.
Another natural line of work is studying parallel repetition for other QPIAs such as [12, 26, 44], perhaps including small modifications such as “random termination” as needed in purely classical private-coin protocols [8, 29, 31].
Finally, a similar classical NIZK protocol can also be achieved using the techniques of locally simulatable proofs [15, 28]. We leave as an open problem understanding whether such a protocol could give us extra useful properties.
2 Preliminaries and Notation
Most algorithms we consider are efficient, meaning that they run in time polynomial in both the input size (typically n) and the security parameter (typically ). We assume that n and
are polynomially-related. The two main classes of algorithms of interest are PPT (probabilistic poly-time) and QPT (quantum poly-time). We say that
if
for every constant c. We denote by
the efficient map that coherently implements a classical function
, i.e.,
, when there exists an efficient deterministic circuit that computes f.
2.1 The Local Hamiltonian Problem and Verification for 
Any promise problem can be reduced to the local Hamiltonian problem such that for
, the Hamiltonian
has a low-energy ground state
, and for
, all quantum states have large energy [32]. While the quantum witness
may be hard to prepare for general
, it can be prepared efficiently if
. Furthermore, the problem remains QMA-complete even with a Hamiltonian that can be measured by performing standard (Z) and Hadamard (X) basis measurements [9, 20, 36].
The 2-local ZX-Hamiltonian promise problem , with parameters
,
and gap
, is defined as follows. An instance is a local Hamiltonian
, where
with
and each
(resp.
) is a Pauli X (resp. Pauli Z) gate acting on the ith qubit. For
, the smallest eigenvalue of H is at most a, while if
, the smallest eigenvalue of H is at least b.
Note that given the normalization factors, we can see that each term ( or
) is associated with the probability
. When working with Hamiltonian terms S, we overload the notation for convenience. First, we write
to denote the Pauli operator assigned by S to qubit j, so that
. Second, we write
to indicate that i is a qubit index for which S does not act as the identity, i.e.,
. We let
for
and
be the sign of
.
Morimae and Fitzsimons present a protocol (the “MF protocol”) with a quantum prover and a limited verifier
who only needs to perform single-qubit X and Z basis measurements [36].
prepares the ground state of the Hamiltonian and sends it to
, who then samples a term S with probability
and performs the corresponding measurement
. Notice that Z or X basis measurements suffice to estimate the energy of S. The success probability with input state
is
, and negligible error can be achieved with parallel repetition.5
In the following discussion, we encode S by an n-bit string h(S): for each , set
(resp. 1) for a Z (resp. X) basis measurement. For other qubits, the choice is irrelevant but we set
for concreteness. We let
denote the success probability of the MF protocol described above with the state
, conditioned on the event that
is sampled. Thus the success probability with
is
.
2.2 The Mahadev Protocol for
Verification
The Mahadev protocol relies crucially on two special classes of functions: Noisy Trapdoor Claw-free Functions (NTCFs) and Noisy Trapdoor Injective Functions (NTIFs)
. Both can be constructed based on the LWE assumption [12, 34] and come with four polynomial-time algorithms
and
. For complete details, and for the LWE construction, see [12, 34].
The Mahadev protocol [34] for verification allows
to request an X or Z basis measurement outcome without revealing the basis to
. The aim of the protocol is to verify that the prover’s response, when appropriately decoded, is close to the measurement outcomes of some n-qubit quantum state
. Crucially, this guarantee holds simultaneously for all basis choices
, where 0 (resp. 1) denotes a Z (resp. X) basis measurement. With this guarantee, the verifier can then apply the verification procedure of the MF protocol to the decoded responses of the prover in order to decide acceptance or rejection.
In the following protocol, for each qubit, if Z (resp. X) basis measurement is desired, then an NTIF (resp. NTCF) key is sent. Since and
(resp.
and
) are identical [34], we denote them by
(resp.
). We let
for
denote the following key generation algorithm: for every bit i of h, run
if
and
if
. Set
and
and output the key pairs (pk, sk).
Setup Choose a security parameter
. Both
and
receive an instance of Problem 2.1, namely
.
Round
.
samples r terms
and computes
, the concatenation of
.
generates the key pair
and sends pk to
.
Round
.
prepares
, r copies of the n-qubit ground state of H. For
and each qubit
in W,
performs
on input the key
coherently and yields a state negligibly close to
, where
. Next,
measures Y and sends the outcome y to
.
Round
.
responds with a uniformly random “challenge” bit
. We call
a “test round” and
a “Hadamard round.”
Round
. If
,
measures WX in the computational basis. If
,
measures WX in the Hadamard basis. In either case,
sends the measurement outcome (w, t) to
.
- Verdict If
,
accepts if
. If
,
performs the following: for each copy j and qubit
,
Finally,
accepts if
.
3 Instance-Independent Key Generation
We now show how to generate the keys in the Mahadev protocol before the parties receive the input Hamiltonian, in an offline setup phase. To that end, we modify the MF protocol so the sampling of the Hamiltonian term is independent of the performed measurements. In our variant, for some ,
samples n-bit strings
uniformly and independent 2-local terms
according to distribution
(in which S is sampled with the probability
from Sect. 2.1). We say the bases
and the terms
are consistent if, when the observable for the jth qubit in
is Z (resp., X) then the jth bit of
is 0 (resp., 1). Since
is uniformly sampled and
is 2-local, they are consistent with probability at least
.
In an r-copy protocol, we let and denote
. For each
,
decides as in the MF protocol: if
, then
accepts. Thus we consider the following protocol.

Setup.
samples the bases
uniformly.
Round 1.
sends the witness state
(r copies of the ground state).
Round 2.
measures the quantum state
in the bases
. For each copy
,
samples terms
.
records the subset
of consistent copies. For each copy
,
sets
if the outcome satisfies
and 0 otherwise.
accepts if
.
For sufficiently large r, with high probability, there are around r/4 consistent copies. Thus to achieve the same completeness and soundness, it suffices to increase the number of copies by a constant factor. We thus have the following fact.
The completeness error and soundness error of Protocol 2 are negligible, provided copies are used.
First we observe that for each copy, with probability 1/4, measures the quantum state with a term sampled from the distribution
; otherwise
accepts. Thus for an instance H, the effective Hamiltonian to verify is
where
. Following the standard parallel repetition theorem for
, we know that
’s optimal strategy is to present the ground state of
, which is also the ground state of H.









![$$x\in [0,1]$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_IEq283.png)








The terms are sampled independently of the interaction in the protocol. We let
denote the deterministic algorithm that outputs a term from H according to distribution
when provided the randomness
for sufficiently large polynomial p. For bases
and
,
denotes the success probability when
sends the quantum state
.
We refer to this variant of Protocol 1 as “the three-round Mahadev protocol”, and denote it by .
4 A Parallel Repetition Theorem for the Mahadev Protocol
In a k-fold parallel repetition of , an honest prover runs the honest single-fold prover independently for each copy of the protocol. Meanwhile, the honest verifier runs the single-fold verifier independently for each copy, accepting if and only if all k verifiers accept. The completeness error clearly remains negligible. To control soundness error, we establish a parallel repetition theorem.
In preparation, we fix the following notation related to the Verdict stage of . We refer frequently to the notation from our description of Protocol 1 above, which applies to
as well. First, the check
in a test round is represented by a projection
acting on registers WXY. Specifically, this is the projector whose image is spanned by all inputs (w, t, y) that are accepted by the verifier in the Verdict stage. Note that running
does not require the trapdoor sk, but the relation implicitly depends on it. For notational convenience, we also denote
as
, though the projector does not depend on s (defined in Remark 3.1). Second, the two Hadamard round checks 1 and 2 of the Verdict stage are represented by a projector
.
4.1 A Lemma for the Single-Copy Protocol
We begin by showing an important fact about the single-copy protocol: the verifier’s accepting paths associated to the two challenges correspond to nearly orthogonal8 projectors. Moreover, in a certain sense this property holds even for input states that are adaptively manipulated by a dishonest prover after they have learned which challenge will take place. This fact is essential in our analysis of the parallel repetition of many copies in the following sections.
The Setup. As discussed in [34], any prover can be characterized as follows. First, pick a state family
; this state is prepared on registers WXYE after receiving pk. Here Y is the register that will be measured in Round
, W and X are the registers that will be measured in Round
, and E is the private workspace of
. Then, choose two unitaries
and
to describe the Round
actions of
before any measurements, in the test round and Hadamard round, respectively. Both
and
act on WXYE, but can only be classically controlled on Y, as they must be implemented after
has measured Y and sent the result to the verifier. (Of course, a cheating prover is not constrained to follow the honest protocol, but we can nevertheless designate a fixed subsystem Y that carries their message.) We will write
, where it is implicit that
is a family of states parameterized by pk.







A Key Lemma. We now prove a fact about the single-copy protocol. The proof is largely a matter of making some observations about the results from [34], and then combining them in the right way.
Recall that, after the setup phase, for any instance H of the ZX-Hamiltonian problem (Problem 2.1), begins with the verifier
making a measurement basis choice
for all the qubits. After interacting with a prover
, the verifier either rejects or produces a candidate measurement outcome, which is then tested as in Protocol 2. We let
denote the distribution of this candidate measurement outcome for a prover
and basis choice h, averaged over all measurements and randomness of
and
. It is useful to compare
with an “ideal” distribution
obtained by simply measuring some (nr)-qubit quantum state
(i.e., a candidate ground state) according to the basis choices specified by h, with no protocol involved. Formally, we state the following lemma.









Up to negligible terms, (2) means that is what Mahadev calls a perfect prover. She establishes two results ([34, Claim 7.3] and [34, Claim 5.7]) which, when taken together, directly imply the following fact about perfect provers. For every perfect prover
, there exists an efficiently preparable quantum state
such that
is computationally indistinguishable from
for all basis choices
. In particular, the proof is obtained in two steps. First, for every perfect prover, there exists a nearby “trivial prover” whose attack in a Hadamard round commutes with standard basis measurement on the committed state [34, Claim 5.7]. Second, for every trivial prover, the distribution is computationally indistinguishable from measuring a consistent quantum state
in any basis h [34, Claim 7.3]. Mahadev shows this for exactly perfect provers, but the proofs can be easily adapted to our “negligibly-far-from-perfect” case.
Now consider two ways of producing a final accept/reject output of the verifier. In the first case, an output is sampled from the distribution and the verifier applies the final checks in
. In this case, the final outcome is obtained by performing the measurement
on the state
, and accepting if the first outcome is observed. In the second case, an output is sampled from the distribution
and the verifier applies the final checks in the MF protocol. In this case, the acceptance probability is
simply by definition. The result then follows directly.



4.2 The Parallel Repetition Theorem
Characterization of a Prover in the k-Fold Protocol. We now discuss the behavior of a general prover in a k-fold protocol. We redefine some notation, and let be the verifier and
an arbitrary prover in the k-fold protocol.
In the Setup phase, the key pairs are sampled according to the correct NTCF/NTIF distribution.9 The secret keys
10 are given to
, whereas
is given to
.
In Round , without loss of generality, the action of
prior to measurement is to apply a unitary
on the zero state
, producing the state
. Each of W, X, Y is now a k-tuple of registers, and E is the prover’s workspace. To generate the “commitment” message to
,
performs standard basis measurement on Y. We write
. When the measurement outcome is y, the side state
holds is then
. In the following analysis of the success probability of
, we consider the superposition
instead of a classical mixture of the states
using the principle of deferred measurement.
In Round , without loss of generality, the action of
consists of a general operation (that can depend on c), followed by the honest action. The general operation is some efficient unitary
on WXYE. The honest action is measurement in the right basis, i.e., for each i,
is measured in the standard basis (if
) or the Hadamard basis (if
). Equivalently, the honest action is (i.) apply
, i.e., for each
apply a Hadamard to every qubit of
, and then (ii.) apply standard basis measurement.








![$$\mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h),h,s,c}\bigl [\langle \varPsi _{pk} \vert \varPi _{s,sk,c}^{U_c}\vert \varPsi _{pk} \rangle \bigr ]$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_IEq406.png)
The Proof of Parallel Repetition. Recall that Lemma 4.1 states that the projectors corresponding to the two challenges in are nearly orthogonal, even when one takes into account the prover’s adaptively applied unitaries. We show that this property persists in the k-copy protocol. Specifically, we show that all
challenges are nearly orthogonal (in the same sense as in Lemma 4.1) with respect to any state
and any post-commitment unitaries
of the prover.
This can be explained informally as follows. For any two distinct challenges , there exists a coordinate i such that
, meaning that one enters a test round in that coordinate while the other enters a Hadamard round. In coordinate i, by the single-copy result (Lemma 4.1), the prover who succeeds with one challenge should fail with the other. A complication is that, since we are dealing with an interactive argument, we must show that a violation of this claim leads to an efficient single-copy prover that violates the single-copy result. Once we have shown this, we can then apply it to any distinct challenge pairs
. It then follows that we may (approximately) decompose
into components accepted in each challenge, each of which occurs with probability
. We can then use this decomposition to express the overall success probability of
in terms of this decomposition. As
is of course a normalized state, it will follow that the overall soundness error is negligibly close to
.
The “adaptive orthogonality” discussed above is formalized in Lemma 4.2. Recall that any prover in the k-fold parallel repetition of can be characterized by a state family
that is prepared in Round
and a family of unitaries
that are applied in Round
.










![$$\begin{aligned} \mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}\left[ \langle \varPsi _{pk} \vert \varPi _{s,sk,b}^{U_b}\varPi _{s,sk,a}^{U_{a}}+\varPi _{s,sk,a}^{U_{a}}\varPi _{s,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] \le 2\alpha _{h_i,s_i,\rho }^{1/2}+{{\,\mathrm{negl}\,}}(n)\,, \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ9.png)



Since we are proving an upper bound for a quantity that is symmetric under the interchange of b and a, we can assume that and
without loss of generality.

![$$\begin{aligned} \mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}\left[ \langle \varPsi _{pk} \vert \varPi _{s,sk,b}^{U_b}\varPi _{s,sk,a}^{U_a}\varPi _{s,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] \le \alpha _{h_i,s_i,\rho }+{{\,\mathrm{negl}\,}}(n) \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ4.png)




![$$\begin{aligned} \mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h^*)}\left[ \langle \varPsi _{pk} \vert \varPi _{s^*,sk,b}^{U_b}\varPi _{s^*,sk,a}^{U_{a}}\varPi _{s^*,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] >\alpha _{h_i^*,s_i^*,\rho }+1/\eta (n)\,. \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ10.png)










![$$\begin{aligned} \nonumber&\mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h^*)}\left[ \langle \varPsi _{pk} \vert \varPi _{s^*,sk,b}^{U_b}\varSigma _a\varPi _{s^*,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] \\\nonumber&\qquad \ge \mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h^*)}\left[ \langle \varPsi _{pk} \vert \varPi _{s^*,sk,b}^{U_b}\varPi _{s^*,sk,a}^{U_{a}}\varPi _{s^*,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] \\&\qquad >\alpha _{h^*_i,s_i^*,\rho }+1/\eta . \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ5.png)


In the Setup phase, after receiving the public key
, initialize
internally simulated verifiers, and set pk to be the list of their keys, with
inserted in the ith position. Let
be the basis choices, and note that all but
are known to
.
Using the algorithms of
, perform the following repeat-until-success (RUS) procedure for at most
steps.
- 1.
Prepare the state
on registers WXYE, and then apply the unitary
.
- 2.
Apply the measurement determined by
(defined in (3)); for index i we can use
because
; for the rest we know the secret keys.
- 3.
If the measurement rejects, go to step (1.), and otherwise apply
and output the state.
For the Round
message, measure the
register of
and send the result to
.
When
returns the challenge bit w in Round 3, if
, apply
(resp.
) to
(resp.
), and otherwise apply
. Then behave honestly, i.e., measure
in computational or Hadamard bases as determined by w, and send the outcomes.
By the RUS construction and the fact that , the state
or
is in the image of the test-round acceptance projector in the ith coordinate. This means that, when
enters a test round, i.e.,
,
is accepted perfectly. In other words,
is a perfect prover12 and thus satisfies the hypotheses of Lemma 4.1.







![$$\begin{aligned} \mathop {\mathbb {E}}\limits _{sk|\varOmega }[\langle \varPhi _{pk} \vert \varSigma _a\vert \varPhi _{pk} \rangle ]\Pr [\varOmega ] \le \alpha _{h_i^*,s_i^*,\rho }+{{\,\mathrm{negl}\,}}(n) \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ14.png)
![$$\mathop {\mathbb {E}}\limits _{X|E}[f(X)]:=\frac{1}{\Pr [E]}\sum _{x\in E}p(x)f(x)$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_IEq504.png)

![$$f:\mathcal {X}\rightarrow [0,1]$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_IEq506.png)
![$$\begin{aligned} \alpha _{h_i^*,s_i^*,\rho }+\eta ^{-1}&< \mathop {\mathbb {E}}\limits _{(pk,sk)}\left[ \langle \varPsi _{pk} \vert \varPi _{s^*,sk,b}^{U_b}\varSigma _a\varPi _{s^*,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] \\&= \Pr [\varOmega ] \mathop {\mathbb {E}}\limits _{(pk,sk)|\varOmega }\left[ \langle \varPsi _{pk} \vert \varPi _{s^*,sk,b}^{U_b}\varSigma _a\varPi _{s^*,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] \\&\qquad + \Pr [\overline{\varOmega }] \mathop {\mathbb {E}}\limits _{(pk,sk)|\overline{\varOmega }}\left[ \langle \varPsi _{pk} \vert \varPi _{s^*,sk,b}^{U_b}\varSigma _a\varPi _{s^*,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] \\&\le \Pr [\varOmega ] \mathop {\mathbb {E}}\limits _{(pk,sk)|\varOmega }\left[ \langle \varPsi _{pk} \vert \varPi _{s^*,sk,b}^{U_b}\varSigma _a\varPi _{s^*,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] + q^{-1/2} \\&\le \alpha _{h_i^*,\rho } + {{\,\mathrm{negl}\,}}(n) + q^{-1/2}. \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ15.png)

![$$ \mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}[\langle \varPsi _{pk} \vert \varPi _{s,sk,b}^{U_b}\varPi _{s,sk,a}^{U_a}\varPi _{s,sk,b}^{U_b}\vert \varPsi _{pk} \rangle ]\le \alpha _{h_i,s_i,\rho }+{{\,\mathrm{negl}\,}}(n). $$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ16.png)
![$$\begin{aligned}&\mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}\left[ \langle \varPsi _{pk} \vert \varPi _{h,sk,b}^{U_b}\varPi _{h,sk,a}^{U_{a}}+\varPi _{h,sk,a}^{U_{a}}\varPi _{h,sk,b}^{U_{b}}\vert \varPsi _{pk} \rangle \right] \\&\qquad =2\mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}\left[ \mathop {\mathrm {Re}}(\langle \varPsi _{pk} \vert \varPi _{h,sk,b}^{U_b}\varPi _{h,sk,a}^{U_{a}}\vert \varPsi _{pk} \rangle )\right] \\&\qquad \le 2\mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}\left[ |\langle \varPsi _{pk} \vert \varPi _{h,sk,b}^{U_b}\varPi _{h,sk,a}^{U_{a}}\vert \varPsi _{pk} \rangle |\right] \\&\qquad \le 2\mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}\left[ \langle \varPsi _{pk} \vert \varPi _{h,sk,b}^{U_b}\varPi _{h,sk,a}^{U_{a}}\varPi _{h,sk,b}^{U_b}\vert \varPsi _{pk} \rangle ^{1/2}\right] \\&\qquad \le 2\mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}\left[ \langle \varPsi _{pk} \vert \varPi _{h,sk,b}^{U_b}\varPi _{h,sk,a}^{U_{a}}\varPi _{h,sk,b}^{U_b}\vert \varPsi _{pk} \rangle \right] ^{1/2} \le 2\alpha _{h_i,s_i,\rho }^{1/2}+{{\,\mathrm{negl}\,}}(n) \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ17.png)

We remark that this adaptive orthogonality is guaranteed under a computational assumption. Assuming that no efficient quantum adversary can break the underlying security properties based on plain , the projections are pairwise orthogonal in the sense of averaging over the key pairs (pk, sk) and with respect to any quantum state
prepared by an efficient quantum circuit.
We also emphasize that, in Lemma 4.2, for each pair the left-hand side is upper-bounded by the acceptance probability of measuring some state
in the basis
, and the quantum state
may be different among distinct choices of (a, b) and i. This implies that if
succeeds with one particular challenge perfectly13 when we average over h and s, Lemma 4.2 and standard amplification techniques (see Sect. 3) imply that it succeeds on challenge
with probability at most
. We note that this strategy leads to acceptance probability at most
.
Since pairwise orthogonality holds with respect to any efficiently preparable quantum state by Lemma 4.2, our parallel repetition theorem follows.
First, we state a key technical lemma.
Let be projectors and
be a quantum state. Suppose there are real numbers
such that
for all
. Then
.











Observe that when the projectors are mutually orthogonal, we have and the bound clearly holds. Lemma 4.3 describes a relaxed version of this fact. In our application, the projectors and the state are parameterized by the key pair, and we use this bound to show that the average of pairwise overlaps is small. We are now ready to establish our parallel repetition theorem.
Let k be a positive integer and let be any set of unitaries that may be implemented by
after the challenge coins are sent. Let
be any state
holds in the commitment round, and suppose
applies
followed by honest measurements when the coins are c. Then there exists a negligible function
such that
accept
with probability at most
.
![$$\begin{aligned} \Pr [\text {success}]&= 2^{-k}\mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h),h,s}[\langle \varPsi _{pk} \vert \sum _c\varPi _{s,sk,c}^{U_c}\vert \varPsi _{pk} \rangle ] \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ20.png)




![$$\begin{aligned} \Pr [\text {success}]&\le 2^{-k} + 2^{-k}\mathop {\mathbb {E}}\limits _{h,s}\left[ \sum _{a<b} \mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}[\langle \varPsi _{pk} \vert \varPi _{s,sk,a}^{U_a}\varPi _{s,sk,b}^{U_b}+\varPi _{s,sk,b}^{U_b}\varPi _{s,sk,a}^{U_a}\vert \varPsi _{pk} \rangle ]\right] ^{1/2}. \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ21.png)

![$$\begin{aligned} \mathop {\mathbb {E}}\limits _{(pk,sk)\leftarrow \mathsf {Gen}(1^\lambda ,h)}[\langle \varPsi _{pk} \vert \varPi _{s,sk,a}^{U_a}\varPi _{s,sk,b}^{U_b}+\varPi _{s,sk,b}^{U_b}\varPi _{s,sk,a}^{U_a}\vert \varPsi _{pk} \rangle ]\le 2\alpha _{h_{i(a,b)},\rho _{ab}}^{1/2}+\delta \, \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ22.png)



![$$\begin{aligned} \Pr [\text {success}]&\le 2^{-k} + 2^{-k} \mathop {\mathbb {E}}\limits _{h,s}\left[ \sum _{a<b} \left( 2\alpha _{h_{i(a,b)},s_{i(a,b)},\rho _{ab}}^{1/2}+\delta \right) \right] ^{1/2} \\&\le 2^{-k} + 2^{-k} \mathop {\mathbb {E}}\limits _{h,s}\left[ \sum _{a<b} 2\alpha _{h_{i(a,b)},s_{i(a,b)},\rho _{ab}}^{1/2}\right] ^{1/2} + 2^{-k}\sqrt{\left( {\begin{array}{c}2^k\\ 2\end{array}}\right) }\delta ^{1/2} \\&\le 2^{-k} + 2^{-k} \left[ \sum _{a<b} 2\left( \mathop {\mathbb {E}}\limits _{h,s}[\alpha _{h_{i(a,b)},s_{i(a,b)},\rho _{ab}}]\right) ^{1/2}\right] ^{1/2} + \delta ^{1/2} \\&\le 2^{-k} + 2^{-k} \left[ \sum _{a<b} 2\mu ^{1/2}\right] ^{1/2} + \delta ^{1/2} \\&\le 2^{-k} + 2^{-k} \left[ 2^k(2^k-1)\mu ^{1/2}\right] ^{1/2} + \delta ^{1/2} \\&\le 2^{-k} + \mu ^{1/4} + \delta ^{1/2} \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ23.png)



We note that Mahadev shows the soundness error for a single-copy protocol is negligibly close to 3/4 [34], whereas Lemma 4.4 implies the error can be upper bounded by . Mahadev obtains soundness error
by considering a general prover
who, for each basis h, succeeds in the test round (characterized by
) with probability
, in the first stage of the Hadamard round with probability
, and in the second stage of the Hadamard round with probability at most
for some state
[34, Claim 7.1]. These contributions are combined by applying the triangle inequality for trace distance. This analysis is loose since the two stages are both classical, and
must pass both stages to win the Hadamard round.
Finally, Lemma 4.4 immediately implies the following theorem.
Let be the k-fold parallel repetition of the three-round Mahadev protocol
. Under the
assumption, the soundness error of
is at most
.
For completeness, we present the three-round protocol .
Setup
samples random bases
and runs the key generation algorithm
.
samples a string
uniformly.
sends the public keys pk to
.
Round
.
queries
coherently on the witness state
, followed by a standard basis measurement on register Y. The outcome is sent to
.
Round
.
samples
and sends
to
.
- Round
. For each
,
,
,
- 1.
if
,
performs a standard basis measurement and gets
;
- 2.
if
,
performs a Hadamard basis measurment and gets
.
sends u to
.
- Verdict For each
,
- 1.
If
,
accepts iff
.
- 2.If
,
records the set
of consistent copies. For each
and
:
- (a)
If
, run
. Set
; if
, compute
and
. If any of the algorithms rejects or any of
is trivial (e.g.,
, see [34]),
sets
; otherwise enters the next step.
- (b)
computes the terms
for each
. Set
if
satisfies
and
otherwise.
Then
sets
if
and 0 otherwise.
accepts iff
for every
. The verdict function is
.
For and
, Protocol 3 is a quantum prover interactive argument for
with negligible completeness error and soundness error.
5 A Classical Zero-Knowledge Argument for 
































(Setup phase ). The algorithm
takes two integers N, M as input, and outputs two strings
with the following steps.
- 1.
Run
.
- 2.
Sample uniform bases
and run
.
- 3.
Run the FHE key generation algorithm
.
- 4.
Run encryption on the secret key
.
- 5.
Choose keys
and randomness
uniformly and compute
.
- 6.
Sample a random string
(see Remark 3.1) uniformly and compute its encryption
.
Output and
.
Setup Run
. Send
to
and
to
.
Round
.
aborts if pk is invalid.
queries
coherently on the witness state
.
Round
.
samples
and sends
to
.
- Round
. For each
,
,
,
- 1.
if
,
performs a standard basis measurement and gets
.
- 2.
if
,
performs a Hadamard basis measurement and gets
.
sends
and
where cc, cx andare the encryptions of
, x and
respectively.
Verdict.
accepts if
.
We show Protocol 5 is complete, sound, and zero-knowledge. For the detailed proofs, see the full version [4].
Protocol 5 has negligible completeness and soundness errors.
Assuming the existence of a non-interactive bit commitment scheme with perfect binding and computational hiding, Protocol 5 is zero-knowledge.
6 Round Reduction by Fiat-Shamir Transformation
In this section we show that the Fiat-Shamir transformation can be used make the k-fold parallel three-round Mahadev protocol non-interactive with a setup phase, while keeping both the completeness and the soundness errors negligible. This will also be the case for the zero-knowledge variant of the same, i.e., Protocol 5.
6.1 Fiat-Shamir for
-protocols in the QROM





We make use of the following theorem of [22]; we describe the underlying reduction in the full version [4].



![$$\begin{aligned}\nonumber&\Pr _\varTheta [V(x,y,\varTheta ,m)=1:(y,m)\leftarrow \langle \mathcal {S}^\mathcal {A},\varTheta \rangle ] \\&\ge \frac{1}{2(2q+1)(2q+3)} \Pr _\mathcal {H}[V(x,y,\mathcal {H}(x,y),m)=1,~(y,m)\leftarrow \mathcal {A}^\mathcal {H}(x)] - \frac{1}{(2q+1)|\mathcal {Y}|}. \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ28.png)
In the above, indicates that y and m are the first-round and third-round (respectively) messages of
, when it is given the random challenge
in the second round.
6.2 Extension to Generalized
-protocols
In this section, we show that Fiat-Shamir also preserves soundness for a more general family of protocols, which we call “generalized -protocols.” In such a protocol,
can begin the protocol by sending an initial message to
.
(Generalized -protocol). Select a public function
, a finite set
, and a distribution D over
. The protocol begins with
and
receiving an input x.
Round 1.
samples randomness
from distribution D and computes message
, which is sent to
.
Round 2.
sends a message y to
.
Round 3.
responds with a uniformly random classical challenge
.
Round 4.
sends a response m to
.
Verdict.
outputs a bit computed by a Boolean function V(r, x, y, c, m).
Notice that the original Mahadev protocol [34] is a generalized -protocol: the distribution D describes the distribution for the secret key, and f computes the public key. Similarly, the k-fold parallel repetition of our instance-independent protocol is also a generalized
-protocol since our trusted setup phase can be seen as a message from the verifier.
Fiat-Shamir for generalized protocols. The FS transformation for generalized
-protocols is similar to standard ones: in the Verdict stage,
computes
and accepts if and only if
.
(FS-transformed generalized -protocol). Select a public function
, a finite set
, and a distribution D over
.
and
receive an input x and are given access to a random oracle
.
Round 1.
samples randomness
from distribution D, and computes message
, which is sent to
.
Round 2.
sends a message (y, m) to
.
Verdict.
computes
and then outputs a bit computed by a Boolean function V(r, x, y, c, m).
To show that generalized -protocols remain secure under the FS transformation, similarly to the idea for
-protocols, we give a reduction. Conditioned on any randomness r, the prover is
.14 The prover
in the
-protocol runs
and outputs its decision. Given the success probability of
, we establish a lower bound on that of
, as follows. For the proof, see the full version [4].

![$$\begin{aligned} \Pr _{r,\mathcal {H}}[V(r,x,y,\mathcal {H}(x,f(r,x),y),m)=1:~(y,m)\leftarrow \mathcal {A}^\mathcal {H}(x,f(r,x))] = \epsilon . \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ29.png)
![$$\begin{aligned} \Pr _{r,\varTheta }[V(r,x,y,\varTheta ,m)=1:~(y,m)\leftarrow \langle \mathcal {B},\varTheta \rangle ] \ge \frac{\epsilon }{2(2q+1)(2q+3)}-\frac{1}{(2q+1)|\mathcal {Y}|}. \end{aligned}$$](../images/508076_1_En_6_Chapter/508076_1_En_6_Chapter_TeX_Equ30.png)
Lemma 6.1 immediately gives the following theorem.
If a language L admits a generalized -protocol with soundness error s, then after the Fiat-Shamir transformation, the soundness error against provers who make up to q queries to a random oracle is
.
Suppose there is a prover who succeeds in the transformed protocol with success probability . Then by Lemma 6.1, we may construct a prover who succeeds with probability at least
. By the soundness guarantee, we have
and thus
.
By Theorem 6.2, if both s and are negligible in security parameter
, the soundness error of the transformed protocols remains negligible against an efficient prover who makes
queries. Theorem 1.3 follows directly from Theorem 6.2.
6.3 Non-interactive Zero-Knowledge for 
We now show that, using the Fiat-Shamir transformation, our three-round protocol proposed in Protocol 5 can be converted into a non-interactive zero-knowledge argument (with trusted setup) for in the Quantum Random Oracle model. The resulting protocol is defined exactly as Protocol 5, with two modifications: (i.) instead of Round
, the prover
computes the coins c by evaluating the random oracle
on the protocol transcript thus far, and (ii.) the NIZK instance x is appropriately redefined using these coins.
We remark that since the setup in this protocol is trusted, it follows from Theorem 6.2 that the compressed protocol is complete and sound, and therefore we just need to argue about the zero-knowledge property.
The Fiat-Shamir transformation of Protocol 5 is zero-knowledge.
The simulator can sample the trapdoor keys for NTCF/NTIF functions and private keys for the FHE scheme, enabling simulation of the transcript for every challenge sent by the verifier. In particular, one can run the same proof with the variant
that queries the random oracle
for the challenges instead of receiving it from a malicious verifier
.
We thank Kai-Min Chung, Andrea Coladangelo, Bill Fefferman, Serge Fehr, Christian Majenz, Christian Schaffner, Umesh Vazirani, and Thomas Vidick for helpful discussions.
AMC and SHH acknowledge support from NSF grant CCF-1813814 and from the U.S. Department of Energy, Office of Science, Office of Advanced Scientific Computing Research, Quantum Testbed Pathfinder program under Award Number DE-SC0019040. GA acknowledges support from the NSF under grant CCF-1763736, from the U.S. Army Research Office under Grant Number W911NF-20-1-0015, and from the U.S. Department of Energy under Award Number DE-SC0020312. Part of this work was completed while GA was supported by the Dutch Research Council (NWO) through travel grant 040.11.708. Part of this work was completed while AG was visiting the Joint Center for Quantum Information and Computer Science, University of Maryland and the Simons Institute for the Theory of Computing.