Less is More: On Copy Complexity in Quantum Cryptography

This paper introduces a generic framework to elevate single-copy security to multi-copy security in quantum cryptography, demonstrating that under mild assumptions, single-copy pseudorandom states and unitaries imply their multi-copy counterparts and enabling the construction of identical-copy secure unclonable primitives like public-key quantum money and copy-protection.

Prabhanjan Ananth, Eli Goldin

Published Tue, 10 Ma
📖 5 min read🧠 Deep dive

Less is More: How One Copy Can Be Enough to Secure the Quantum Future

Imagine you are trying to protect a secret recipe. In the classical world, if you give a thief a photocopy of the recipe, they can make a million more copies. But in the quantum world, there is a fundamental law called the No-Cloning Theorem. It says you cannot make a perfect copy of a mysterious quantum object. If you try, you ruin it.

This paper tackles a tricky problem in quantum cryptography: How many copies of a secret quantum state can we safely give to a hacker before the whole system breaks?

The Problem: The "Copy" Confusion

In quantum security, definitions matter a lot.

  • Scenario A (One Copy): You give the hacker one quantum coin. They try to copy it. They fail. The system is secure.
  • Scenario B (Many Copies): You give the hacker ten, a hundred, or a thousand copies of that same coin. Suddenly, the hacker might be able to use "shadow tomography" (a fancy way of looking at the coin from many angles) to figure out how to fake it.

For years, cryptographers worried that if a system was safe with one copy, it might be totally useless if the hacker got many copies. This made designing secure quantum money or copy-protected software very difficult.

The Big Discovery: "The Magic Purification"

The authors of this paper, Prabhanjan Ananth and Eli Goldin, found a clever trick. They proved that if a system is secure against one copy, it is automatically secure against many copies (up to a reasonable number), provided you use a specific "magic" construction.

They call this a "Purification Compiler."

The Analogy: The Secret Recipe and the "Ghost" Ingredients

Imagine you have a secret recipe (the Mixed State).

  • The Problem: If you give the recipe to a chef (the hacker) as a blurry photocopy (a mixed state), and they get 100 blurry photocopies, they might be able to piece together the original ingredients.
  • The Solution: Instead of giving them the blurry photocopy, you give them a perfect, high-definition original (a Pure State) that looks exactly like the blurry photocopy when you squint at it.

Here is the magic:

  1. You create a special "master version" of the recipe that includes some hidden, random "ghost ingredients" (ancilla registers) that the hacker can't see.
  2. When the hacker looks at this master version, it looks exactly like the blurry photocopy.
  3. The Twist: Even if the hacker gets 100 copies of this master version, they still can't figure out the secret recipe. Why? Because the "ghost ingredients" are randomized in a way that scrambles the information across all 100 copies.

The authors proved mathematically that giving the hacker 100 copies of the "master version" is no better for them than giving them 100 copies of the original "blurry photocopy."

If the blurry photocopy was secure against 100 copies, then the master version is also secure.

What This Means for Real Life

This discovery is a game-changer because it allows us to build stronger quantum tools using weaker, easier-to-build foundations.

1. Quantum Money (The Unfakeable Bill)

  • Old Problem: We could make quantum bills that were hard to fake if the bank only gave you one. But if a criminal got a stack of 100 bills, they might be able to forge a new one.
  • New Result: Using this paper's method, we can now build Public-Key Quantum Money that is secure even if the criminal has a truckload of identical bills. The "ghost ingredients" ensure that having more bills doesn't help the criminal.

2. Copy Protection (The Un-copyable Software)

  • Old Problem: Imagine you buy a video game on a quantum chip. If the game is "copy-protected," you can play it, but you can't share it. But what if the hacker gets 10 copies of the game chip? Maybe they can combine them to make a 11th copy.
  • New Result: The authors show how to take a game that is safe against 1 copy and turn it into a game that is safe against 100 copies. The hacker can't combine the copies to break the protection.

3. Pseudorandomness (The Fake Randomness)

  • Old Problem: Cryptographers use "fake random" numbers (pseudorandomness) to hide data. Some generators were only safe if you used them once.
  • New Result: Now, we can take a generator that is safe for one use and "stretch" it to be safe for thousands of uses without making the keys any bigger or the math any harder.

The "Less is More" Takeaway

The title of the paper, "Less is More," is a bit ironic. Usually, having more copies of a secret makes it less secure.

But this paper shows that if you design your system correctly (using their "Purification Compiler"), having more copies of the new version doesn't help the hacker at all. You can start with a simple, "one-copy" secure system and magically upgrade it to be "many-copy" secure.

In short: You don't need to invent a whole new type of quantum lock to stop hackers with a warehouse full of copies. You just need to wrap your existing lock in a special quantum "scrambler" that makes having extra copies useless.

This bridges the gap between theoretical security and practical reality, paving the way for unbreakable quantum money and un-copyable software in the future.