{"id":"https://openalex.org/W4399845697","doi":"https://doi.org/10.1145/3618260.3649673","title":"Quantum State Obfuscation from Classical Oracles","display_name":"Quantum State Obfuscation from Classical Oracles","publication_year":2024,"publication_date":"2024-06-10","ids":{"openalex":"https://openalex.org/W4399845697","doi":"https://doi.org/10.1145/3618260.3649673"},"language":"en","primary_location":{"id":"doi:10.1145/3618260.3649673","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3618260.3649673","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3618260.3649673","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 56th Annual ACM Symposium on Theory of Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3618260.3649673","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008375381","display_name":"James Bartusek","orcid":"https://orcid.org/0009-0000-9020-3589"},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"James Bartusek","raw_affiliation_strings":["University of California, Berkeley, Berkeley, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023852532","display_name":"Zvika Brakerski","orcid":"https://orcid.org/0000-0002-4867-7999"},"institutions":[{"id":"https://openalex.org/I53964585","display_name":"Weizmann Institute of Science","ror":"https://ror.org/0316ej306","country_code":"IL","type":"education","lineage":["https://openalex.org/I53964585"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Zvika Brakerski","raw_affiliation_strings":["Weizmann Institute of Science, Rehovot, Israel"],"affiliations":[{"raw_affiliation_string":"Weizmann Institute of Science, Rehovot, Israel","institution_ids":["https://openalex.org/I53964585"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000240220","display_name":"Vinod Vaikuntanathan","orcid":"https://orcid.org/0000-0002-2666-0045"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vinod Vaikuntanathan","raw_affiliation_strings":["Massachusetts Institute of Technology, Boston, USA"],"affiliations":[{"raw_affiliation_string":"Massachusetts Institute of Technology, Boston, USA","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008375381"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":5.4556,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.96286449,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1009","last_page":"1017"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8089351654052734},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.7261905074119568},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6612212657928467},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.6050390005111694},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.5833503007888794},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.5682887434959412},{"id":"https://openalex.org/keywords/quantum-circuit","display_name":"Quantum circuit","score":0.5633118152618408},{"id":"https://openalex.org/keywords/quantum-algorithm","display_name":"Quantum algorithm","score":0.49012383818626404},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4568234086036682},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.42242273688316345},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4206923246383667},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.30347856879234314},{"id":"https://openalex.org/keywords/quantum-network","display_name":"Quantum network","score":0.2775024175643921},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23650780320167542},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.19010788202285767},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1553773581981659},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14218205213546753},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1343841850757599}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8089351654052734},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.7261905074119568},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6612212657928467},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6050390005111694},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.5833503007888794},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.5682887434959412},{"id":"https://openalex.org/C124148022","wikidata":"https://www.wikidata.org/wiki/Q2122210","display_name":"Quantum circuit","level":5,"score":0.5633118152618408},{"id":"https://openalex.org/C137019171","wikidata":"https://www.wikidata.org/wiki/Q2623817","display_name":"Quantum algorithm","level":3,"score":0.49012383818626404},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4568234086036682},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.42242273688316345},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4206923246383667},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.30347856879234314},{"id":"https://openalex.org/C186468114","wikidata":"https://www.wikidata.org/wiki/Q836478","display_name":"Quantum network","level":4,"score":0.2775024175643921},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23650780320167542},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.19010788202285767},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1553773581981659},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14218205213546753},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1343841850757599}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3618260.3649673","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3618260.3649673","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3618260.3649673","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 56th Annual ACM Symposium on Theory of Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3618260.3649673","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3618260.3649673","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3618260.3649673","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 56th Annual ACM Symposium on Theory of Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399845697.pdf"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W57039937","https://openalex.org/W1826277484","https://openalex.org/W1870111070","https://openalex.org/W1984153141","https://openalex.org/W2054904172","https://openalex.org/W2076168063","https://openalex.org/W2084641398","https://openalex.org/W2085983185","https://openalex.org/W2088492763","https://openalex.org/W2159924820","https://openalex.org/W2162106291","https://openalex.org/W2168676717","https://openalex.org/W2186160814","https://openalex.org/W2336770924","https://openalex.org/W2509132065","https://openalex.org/W2807695933","https://openalex.org/W2888580382","https://openalex.org/W2899995952","https://openalex.org/W2963124215","https://openalex.org/W2963589292","https://openalex.org/W2968763694","https://openalex.org/W3011699807","https://openalex.org/W3034782340","https://openalex.org/W3082860856","https://openalex.org/W3089736144","https://openalex.org/W3091449757","https://openalex.org/W3097730273","https://openalex.org/W3118434288","https://openalex.org/W3167778596","https://openalex.org/W3193498469","https://openalex.org/W3197654010","https://openalex.org/W3207745027","https://openalex.org/W3208204668","https://openalex.org/W4285208320","https://openalex.org/W4312850514","https://openalex.org/W4376639567","https://openalex.org/W4376639600","https://openalex.org/W4399521738","https://openalex.org/W4399845697","https://openalex.org/W6600366268","https://openalex.org/W6632726999"],"related_works":["https://openalex.org/W4281550036","https://openalex.org/W1641472573","https://openalex.org/W4375959436","https://openalex.org/W2906136444","https://openalex.org/W2037426566","https://openalex.org/W4388032411","https://openalex.org/W4289799474","https://openalex.org/W4310985960","https://openalex.org/W4390104858","https://openalex.org/W4247841087"],"abstract_inverted_index":{"A":[0],"major":[1],"unresolved":[2],"question":[3,222],"in":[4,31,78,204,300],"quantum":[5,15,28,65,96,101,111,118,142,202,232,240,257,285,301,309,328,336],"cryptography":[6],"is":[7,10,19,38,160],"whether":[8],"it":[9],"possible":[11,125],"to":[12,22,44,62,90,139,163,199,238,296],"obfuscate":[13,45,200],"arbitrary":[14],"computation.":[16],"Indeed,":[17,255],"there":[18],"much":[20,123],"yet":[21],"understand":[23],"about":[24,126],"the":[25,32,42,91,132,184,205,244,264],"feasibility":[26],"of":[27,57,81,93,99,134,187,223,231,246,268,341],"obfuscation":[29,88,176,235],"even":[30],"classical":[33,47,106,151,154,166,178,206,215],"oracle":[34,207],"model,":[35,208],"where":[36],"one":[37,145],"given":[39],"for":[40,177,273,325],"free":[41],"ability":[43],"any":[46,140,327],"circuit.":[48],"In":[49],"this":[50],"work,":[51],"we":[52,60,294,317],"develop":[53,288],"a":[54,64,68,95,100,105,115,148,213,221,229,239,247,269,306,323,331],"new":[55],"array":[56],"techniques":[58,278],"that":[59,120,146],"use":[61],"construct":[63],"state":[66,87,112,233,258],"obfuscator,":[67],"powerful":[69],"notion":[70],"formalized":[71],"recently":[72],"by":[73],"Coladangelo":[74,224],"and":[75,108,128,191,225,322,344],"Gunn":[76],"(arXiv:2311.07794)":[77],"their":[79],"pursuit":[80],"better":[82],"software":[83],"copy-protection":[84,271],"schemes.":[85],"Quantum":[86],"refers":[89],"task":[92],"compiling":[94,326],"program,":[97,143],"consisting":[98],"circuit":[102,329],"C":[103,127],"with":[104,161,212,236,261,312],"description":[107],"an":[109,164,252,338],"auxiliary":[110],"\u03c8,":[113],"into":[114,330],"functionally-equivalent":[116],"obfuscated":[117],"program":[119],"hides":[121],"as":[122,124,251],"\u03c8.":[129],"We":[130,287],"prove":[131],"security":[133,158],"our":[135,218,256],"obfuscator":[136,259],"when":[137],"applied":[138],"pseudo-deterministic":[141,201],"i.e.":[144],"computes":[147],"(nearly)":[149],"deterministic":[150],"input":[152],"/":[153],"output":[155],"functionality.":[156],"Our":[157,180,277],"proof":[159],"respect":[162,237],"efficient":[165],"oracle,":[167,241],"which":[168,293],"may":[169],"be":[170,297],"heuristically":[171],"instantiated":[172],"using":[173],"quantum-secure":[174],"indistinguishability":[175,234],"circuits.":[179],"result":[181,219],"improves":[182],"upon":[183],"recent":[185],"work":[186],"Bartusek,":[188],"Kitagawa,":[189],"Nishimaki":[190],"Yamakawa":[192],"(STOC":[193],"2023)":[194],"who":[195,227],"also":[196],"showed":[197],"how":[198],"circuits":[203],"but":[209,242],"only":[210],"ones":[211],"completely":[214],"description.":[216],"Furthermore,":[217],"answers":[220],"Gunn,":[226],"provide":[228],"construction":[230],"leave":[243],"existence":[245],"concrete":[248],"real-world":[249],"candidate":[250,266],"open":[253],"problem.":[254],"together":[260],"Coladangelo-Gunn":[262],"gives":[263],"first":[265],"realization":[267],"\u201cbest-possible\u201d":[270],"scheme":[272,311],"all":[274],"polynomial-time":[275],"functionalities.":[276],"deviate":[279],"significantly":[280],"from":[281,319],"previous":[282],"works":[283],"on":[284],"obfuscation.":[286],"several":[289],"novel":[290],"technical":[291],"tools":[292,304],"expect":[295],"broadly":[298],"useful":[299],"cryptography.":[302],"These":[303],"include":[305],"publicly-verifiable,":[307],"linearly-homomorphic":[308],"authentication":[310],"classically-decodable":[313],"ZX":[314,346],"measurements":[315],"(which":[316],"build":[318],"coset":[320],"states),":[321],"method":[324],"\u201dlinear":[332],"+":[333],"measurement\u201d":[334],"()":[335],"program:":[337],"alternating":[339],"sequence":[340],"CNOT":[342],"operations":[343],"partial":[345],"measurements.":[347]},"counts_by_year":[{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
