Info-Theoretic Secure Instruction Sequence
- The paper introduces an instruction sequence that delivers one-time programmable functionality using statistical security rather than computational assumptions.
- It leverages random linear codes and quantum random access codes (QRACs) to encode messages, enabling recovery of one bitstring while protecting the other.
- The security model enforces constant-depth, geometrically-local quantum circuit restrictions, ensuring simulation-based security against advanced adversaries.
An information-theoretically secure instruction sequence is a cryptographic construct that enables the execution of one-time programmable functionalities with statistical (rather than computational) security, contingent on constraints imposed on quantum hardware. The principal instantiation—information-theoretically secure one-time memory (OTM)—realizes a mechanism that allows the retrieval of one out of two stored strings, while leaking negligible information about the other, even against adversaries with unlimited classical resources but limited quantum circuit depth and locality. By leveraging random linear codes and quantum random access codes (QRACs), and enforcing geometrically-local, non-adaptive, constant-depth quantum circuit restrictions on the adversary, this approach achieves simulation-based security without computational assumptions (Stambler, 27 Mar 2025).
1. Formal Definitions and Security Model
The OTM functionality accepts two bitstrings , producing a quantum token and auxiliary classical data . A holder of may select a bit and reconstruct with negligible decoding error, while statistically learning almost nothing about . Extension to one-time programs (OTP) provides single-use evaluation for a classical circuit —permitting output on one chosen input before self-destruction.
Security adopts a simulation-based paradigm: for any adversary restricted to one invocation of a non-adaptive, constant-depth, geometrically-local quantum circuit (formally, C-GQNC), there exists a simulator making a single ideal query such that 's view in the real protocol is -indistinguishable (in trace or statistical distance) from its view in the idealized execution.
The C-GQNC adversarial model permits arbitrary classical computation but exactly one execution of a quantum circuit of depth over qubits placed on a -dimensional grid, acting only on -neighboring qubits, with deferred measurement and fixed gate layout.
2. Cryptographic Building Blocks
2.1 Random Linear Codes
An binary linear code is constructed from a random generator matrix , with codewords . The parity-check matrix supports error correction. Selecting enables the code to correct a constant fraction of errors, with decoding failure probability under the channel corresponding to QRAC noise.
2.2 Quantum Random Access Codes (QRACs)
The optimal QRAC encoding maps a pair of bits to a single qubit state such that measuring in basis yields bit with probability . The bases and ensure high recoverability rates.
Collision-Entropy Leakage Bounds
Defining collision (order-2 Rényi) mutual information: where
For QRAC states :
3. Construction of Information-Theoretically Secure OTM
Fix a large security parameter . To encode messages :
3.1 Encoding Procedure (prepState)
- Sample for a random code.
- Compute codewords: , .
- For each , prepare .
- Place these qubits on a -dimensional grid in disjoint hypercubes (side ), surrounded by negligible shell regions.
- Dispatch quantum state with classical descriptors .
3.2 Reading and Decoding (readState)
Upon selection of :
- Measure each in basis , obtaining noisy bits .
- Classically decode to recover .
- Output ; successful recovery with probability .
3.3 Security Rationale
Security against C-GQNC adversaries is underpinned by quantum and statistical limitations:
- Adversarial measurements decompose into disjoint block operations (by non-adaptivity) plus shell qubits.
- Blockwise independence ensures per-block information leakage is bounded by via QRAC properties.
- With sufficiently large (block size constant, ), a progress bound leverages the chain rule for and the leftover-hash lemma for collision entropy, guaranteeing that learning does not significantly reduce uncertainty about : collision entropy remains , precluding practical recovery of both messages.
3.4 Technical Lemmas
- Collision entropy chain rule (Stambler Lemma 3.1): Conditioned mutual information increment is capped.
- Progress bound: Each hypercube operation increases adversary's knowledge by at most .
- Leftover-hash lemma (collision entropy): If residual collision entropy exceeds block length, unread codeword bits remain statistically hidden.
3.5 Simulator Construction
For any C-GQNC adversary , the simulator runs on dummy codewords, detects the basis measurement choice , queries the ideal functionality for , relabels accordingly, and outputs. Indistinguishability derives from the adversary’s inability to distinguish unsampled branches.
4. Extension to One-Time Programs
The OTM construction generalizes to OTPs via Yao-garbling with OTM-based one-time oblivious transfers. Each input wire to the garbled circuit receives two OTM tokens; evaluation requires one token per wire. Upon completion, only one input can be executed successfully, enforcing single-use semantics.
Correctness and security compile from Yao's composition theorems and the information-theoretic properties of the underlying OTM. The complete OTP construction yields total quantum token size polynomial in the circuit gate count ( for a circuit of size ), while each OTM employs physical qubits with exponential-time decoding.
5. Main Theorem and Security Guarantees
For any constant , parameters can be chosen to establish the following for the OTM protocol:
- Correctness: The intended recipient recovers except with probability ().
- Simulation-Based Security: For all C-GQNC adversaries, the real versus ideal execution views are within trace distance .
Augmenting Yao garbling with these OTMs achieves OTPs for any Boolean circuit, with the combined token size and negligible insecurity .
6. Limitations and Open Problems
Current implementation demands exponential-time decoding for random linear codes; potential directions include identifying polynomial-time decodable codes compatible with the protocol's information-theoretic security. Removing adversary constraints (non-adaptivity, geometric locality) remains open. Optimization of constants may affect practical feasibility. The fundamental security relies on the quantified and bounded leakage inherent in QRACs and the collision entropy framework; alterations to the adversarial or noise model could significantly impact protocol soundness (Stambler, 27 Mar 2025).
| Component | Primitive Used | Notable Parameter |
|---|---|---|
| Memory encoding | QRAC + linear code | , |
| Adversary model | C-GQNC | depth , grid dim. |
| Security metric | Collision entropy, |
References to all technical lemmas, entropy facts, and further mathematical details can be found in Sections 3–6 of "Information Theoretic One-Time Programs from Geometrically Local QNC₀ Adversaries" (Stambler, 2024) (Stambler, 27 Mar 2025).