<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Léo Colisson | LIP6 - Équipe QI</title><link>https://qi.lip6.fr/fr/people/leo-colisson/</link><atom:link href="https://qi.lip6.fr/fr/people/leo-colisson/index.xml" rel="self" type="application/rss+xml"/><description>Léo Colisson</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>fr</language><copyright>© 2022 LIP6 Quantum Information Team</copyright><lastBuildDate>Fri, 11 Apr 2025 00:00:00 +0000</lastBuildDate><image><url>https://qi.lip6.fr/media/icon_hudf2fdaa51677944daa4f50609104ef9a_13950_512x512_fill_lanczos_center_3.png</url><title>Léo Colisson</title><link>https://qi.lip6.fr/fr/people/leo-colisson/</link></image><item><title>Non-Interactive and Non-Destructive Zero-Knowledge Proofs on Quantum States and Multi-Party Generation of Authorized Hidden GHZ States</title><link>https://qi.lip6.fr/fr/publication/3452711-non-interactive-and-non-destructive-zero-knowledge-proofs-on-quantum-states-and-multi-party-generation-of-authorized-hidden-ghz-states/</link><pubDate>Fri, 11 Apr 2025 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/3452711-non-interactive-and-non-destructive-zero-knowledge-proofs-on-quantum-states-and-multi-party-generation-of-authorized-hidden-ghz-states/</guid><description>&lt;p>We propose the first generalization of the famous Non-Interactive Zero-Knowledge (NIZK) proofs to quantum languages (NIZKoQS) and we provide a protocol to prove advanced properties on a received quantum state non-destructively and non-interactively (a single message being sent from the prover to the verifier).In our second orthogonal contribution, we improve the costly Remote State Preparation protocols [Cojocaru et al. 2019; Gheorghiu and Vidick 2019] that can classically fake a quantum channel (this is at the heart of our NIZKoQS protocol) by showing how to create a multi-qubit state from a single superposition.Finally, we generalize these results to a multi-party setting and prove that multiple parties can anonymously distribute a GHZ state in such a way that only participants knowing a secret credential can share this state, which could have applications to quantum anonymous transmission, quantum secret sharing, quantum onion routing and more.&lt;/p></description></item><item><title>All graph state verification protocols are composably secure</title><link>https://qi.lip6.fr/fr/publication/4519928-all-graph-state-verification-protocols-are-composably-secure/</link><pubDate>Mon, 25 Mar 2024 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/4519928-all-graph-state-verification-protocols-are-composably-secure/</guid><description>&lt;p>Graph state verification protocols allow multiple parties to share a graph state while checking that the state is honestly prepared, even in the presence of malicious parties. Since graph states are the starting point of numerous quantum protocols, it is crucial to ensure that graph state verification protocols can safely be composed with other protocols, this property being known as composable security. Previous works [YDK21] conjectured that such a property could not be proven within the abstract cryptography framework: we disprove this conjecture by showing that all graph state verification protocols can be turned into a composably secure protocol with respect to the natural functionality for graph state preparation. Moreover, we show that any unchanged graph state verification protocols can also be considered as composably secure for a slightly different, yet useful, functionality. Finally, we show that these two results are optimal, in the sense that any such generic result, considering arbitrary black-box protocols, must either modify the protocol or consider a different functionality. Along the way, we show a protocol to generalize entanglement swapping to arbitrary graph states that might be of independent interest.&lt;/p></description></item><item><title>Study of Protocols Between Classical Clients and a Quantum Server</title><link>https://qi.lip6.fr/fr/publication/3927843-study-of-protocols-between-classical-clients-and-a-quantum-server/</link><pubDate>Mon, 28 Mar 2022 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/3927843-study-of-protocols-between-classical-clients-and-a-quantum-server/</guid><description>&lt;p>Quantum computers promise surprising powers of computation by exploiting the stunning physical properties of infinitesimally small particles. I focused on designing and proving the security of protocols that allow a purely classical client to use the computational resources of a quantum server, so that the performed computation is never revealed to the server. To this end, I develop a modular tool to generate on a remote server a quantum state that only the client is able to describe, and I show how multi-qubits quantum states can be generated more efficiently. I also prove that there is no such protocol that is secure in a generally composable model of security, including when our module is used in the UBQC protocol. In addition to delegated computation, this tool also proves to be useful for performing a task that might seem impossible to achieve at first sight: proving advanced properties on a quantum state in a non-interactive and non-destructive way, including when this state is generated collaboratively by several participants. This can be seen as a quantum analogue of the classical Non-Interactive Zero-Knowledge proofs. This property is particularly useful to filter the participants of a protocol without revealing their identity, and may have applications in other domains, for example to transmit a quantum state over a network while hiding the source and destination of the message. Finally, I discuss my ongoing independent work on One-Time Programs, mixing quantum cryptography, error correcting codes and information theory.&lt;/p></description></item><item><title>Non-Destructive Zero-Knowledge Proofs on Quantum States, and Multi-Party Generation of Authorized Hidden GHZ States</title><link>https://qi.lip6.fr/fr/publication/3452711-non-destructive-zero-knowledge-proofs-on-quantum-states-and-multi-party-generation-of-authorized-hidden-ghz-states/</link><pubDate>Sat, 27 Nov 2021 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/3452711-non-destructive-zero-knowledge-proofs-on-quantum-states-and-multi-party-generation-of-authorized-hidden-ghz-states/</guid><description>&lt;p>Due to the special no-cloning principle, quantum states appear to be very useful in cryptography. But this very same property also has drawbacks: when receiving a quantum state, it is nearly impossible for the receiver to efficiently check non-trivial properties on that state without destroying it. In this work, we initiate the study of Non-Destructive Zero-Knowledge Proofs on Quantum States. Our method binds a quantum state to a classical encryption of that quantum state. That way, the receiver can obtain guarantees on the quantum state by asking to the sender to prove properties directly on the classical encryption. This method is therefore non-destructive, and it is possible to verify a very large class of properties. For instance, we can force the sender to send different categories of states depending on whether they know a classical password or not. Moreover, we can also provide guarantees to the sender: for example, we can ensure that the receiver will never learn whether the sender knows the password or not. We also extend this method to the multi-party setting. We show how it can prove useful to distribute a GHZ state between different parties, in such a way that only parties knowing a secret can be part of this GHZ. Moreover, the identity of the parties that are part of the GHZ remains hidden to any malicious party. A direct application would be to allow a server to create a secret sharing of a qubit between unknown parties, authorized for example by a third party Certification Authority. Finally, we provide simpler &amp;ldquo;blind&amp;rdquo; versions of the protocols that could prove useful in Anonymous Transmission or Quantum Onion Routing, and we explicit a cryptographic function required in our protocols based on the Learning With Errors hardness problem.&lt;/p></description></item><item><title>Security Limitations of Classical-Client Delegated Quantum Computing</title><link>https://qi.lip6.fr/fr/publication/2997004-security-limitations-of-classical-client-delegated-quantum-computing/</link><pubDate>Mon, 07 Dec 2020 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2997004-security-limitations-of-classical-client-delegated-quantum-computing/</guid><description>&lt;p>Secure delegated quantum computing allows a computationally weak client to outsource an arbitrary quantum computation to an untrusted quantum server in a privacy-preserving manner. One of the promising candidates to achieve classical delegation of quantum computation is classical-client remote state preparation ($RSP_{CC}$), where a client remotely prepares a quantum state using a classical channel. However, the privacy loss incurred by employing $RSP_{CC}$ as a sub-module is unclear. In this work, we investigate this question using the Constructive Cryptography framework by Maurer and Renner (ICS'11). We first identify the goal of $RSP_{CC}$ as the construction of ideal RSP resources from classical channels and then reveal the security limitations of using $RSP_{CC}$. First, we uncover a fundamental relationship between constructing ideal RSP resources (from classical channels) and the task of cloning quantum states. Any classically constructed ideal RSP resource must leak to the server the full classical description (possibly in an encoded form) of the generated quantum state, even if we target computational security only. As a consequence, we find that the realization of common RSP resources, without weakening their guarantees drastically, is impossible due to the no-cloning theorem. Second, the above result does not rule out that a specific $RSP_{CC}$ protocol can replace the quantum channel at least in some contexts, such as the Universal Blind Quantum Computing (UBQC) protocol of Broadbent et al. (FOCS &amp;lsquo;09). However, we show that the resulting UBQC protocol cannot maintain its proven composable security as soon as $RSP_{CC}$ is used as a subroutine. Third, we show that replacing the quantum channel of the above UBQC protocol by the $RSP_{CC}$ protocol QFactory of Cojocaru et al. (Asiacrypt &amp;lsquo;19), preserves the weaker, game-based, security of UBQC.&lt;/p></description></item><item><title>QFactory: classically-instructed remote secret qubits preparation</title><link>https://qi.lip6.fr/fr/publication/2164592-qfactory-classically-instructed-remote-secret-qubits-preparation/</link><pubDate>Sun, 08 Dec 2019 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2164592-qfactory-classically-instructed-remote-secret-qubits-preparation/</guid><description>&lt;p>The functionality of classically-instructed remotely prepared random secret qubits was introduced in (Cojocaru et al 2018) as a way to enable classical parties to participate in secure quantum computation and communications protocols. The idea is that a classical party (client) instructs a quantum party (server) to generate a qubit to the server&amp;rsquo;s side that is random, unknown to the server but known to the client. Such task is only possible under computational assumptions. In this contribution we define a simpler (basic) primitive consisting of only BB84 states, and give a protocol that realizes this primitive and that is secure against the strongest possible adversary (an arbitrarily deviating malicious server). The specific functions used, were constructed based on known trapdoor one-way functions, resulting to the security of our basic primitive being reduced to the hardness of the Learning With Errors problem. We then give a number of extensions, building on this basic module: extension to larger set of states (that includes non-Clifford states); proper consideration of the abort case; and verifiablity on the module level. The latter is based on &amp;ldquo;blind self-testing&amp;rdquo;, a notion we introduced, proved in a limited setting and conjectured its validity for the most general case.&lt;/p></description></item><item><title>On the possibility of classical client blind quantum computing</title><link>https://qi.lip6.fr/fr/publication/2164617-on-the-possibility-of-classical-client-blind-quantum-computing/</link><pubDate>Mon, 27 Aug 2018 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2164617-on-the-possibility-of-classical-client-blind-quantum-computing/</guid><description>&lt;p>We define the functionality of delegated pseudo-secret random qubit generator (PSRQG), where a classical client can instruct the preparation of a sequence of random qubits at some distant party. Their classical description is (computationally) unknown to any other party (including the distant party preparing them) but known to the client. We emphasize the unique feature that no quantum communication is required to implement PSRQG. This enables classical clients to perform a class of quantum communication protocols with only a public classical channel with a quantum server. A key such example is the delegated universal blind quantum computing. Using our functionality one could achieve a purely classical-client computational secure verifiable delegated universal quantum computing (also referred to as verifiable blind quantum computation). We give a concrete protocol (QFactory) implementing PSRQG, using the Learning-With-Errors problem to construct a trapdoor one-way function with certain desired properties (quantum-safe, two-regular, collision-resistant). We then prove the security in the Quantum-Honest-But-Curious setting and briefly discuss the extension to the malicious case.&lt;/p></description></item></channel></rss>