Back to News
quantum-computing

Impersonating Quantum Secrets over Classical Channels

arXiv Quantum Physics
Loading...
3 min read
0 likes
⚡ Quantum Brief
Researchers Luowen Qian and Mark Zhandry demonstrate that eavesdroppers can impersonate quantum parties by monitoring classical communication between them, even when those parties share evolving entangled secrets. The attack becomes computationally efficient if one-way puzzles—a foundational cryptographic primitive—do not exist, linking quantum authentication security directly to their theoretical possibility. Their findings imply that reusable authentication schemes over classical channels with quantum pre-shared keys inherently require one-way puzzles to prevent impersonation, strengthening the cryptographic assumptions needed for such systems. The work extends prior results by proving that quantum money schemes verified via classical oracle queries cannot achieve information-theoretic security, generalizing a 2023 ASIACRYPT study limited to random oracles. Near-term quantum devices may struggle with these security demands, as verifying black-box quantum money constructions requires coherent evaluation of cryptographic tools, posing practical implementation challenges.
Impersonating Quantum Secrets over Classical Channels

Summarize this article with:

Quantum Physics arXiv:2601.01058 (quant-ph) [Submitted on 3 Jan 2026] Title:Impersonating Quantum Secrets over Classical Channels Authors:Luowen Qian, Mark Zhandry View a PDF of the paper titled Impersonating Quantum Secrets over Classical Channels, by Luowen Qian and 1 other authors View PDF Abstract:We show that a simple eavesdropper listening in on classical communication between potentially entangled quantum parties will eventually be able to impersonate any of the parties. Furthermore, the attack is efficient if one-way puzzles do not exist. As a direct consequence, one-way puzzles are implied by reusable authentication schemes over classical channels with quantum pre-shared secrets that are potentially evolving. As an additional application, we show that any quantum money scheme that can be verified through only classical queries to any oracle cannot be information-theoretically secure. This significantly generalizes the prior work by Ananth, Hu, and Yuen (ASIACRYPT'23) where they showed the same but only for the specific case of random oracles. Therefore, verifying black-box constructions of quantum money inherently requires coherently evaluating the underlying cryptographic tools, which may be difficult for near-term quantum devices. Comments: Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR) Cite as: arXiv:2601.01058 [quant-ph] (or arXiv:2601.01058v1 [quant-ph] for this version) https://doi.org/10.48550/arXiv.2601.01058 Focus to learn more arXiv-issued DOI via DataCite (pending registration) Submission history From: Luowen Qian [view email] [v1] Sat, 3 Jan 2026 03:40:28 UTC (41 KB) Full-text links: Access Paper: View a PDF of the paper titled Impersonating Quantum Secrets over Classical Channels, by Luowen Qian and 1 other authorsView PDFTeX Source view license Current browse context: quant-ph new | recent | 2026-01 Change to browse by: cs cs.CR References & Citations INSPIRE HEP NASA ADSGoogle Scholar Semantic Scholar export BibTeX citation Loading... BibTeX formatted citation × loading... Data provided by: Bookmark Bibliographic Tools Bibliographic and Citation Tools Bibliographic Explorer Toggle Bibliographic Explorer (What is the Explorer?) Connected Papers Toggle Connected Papers (What is Connected Papers?) Litmaps Toggle Litmaps (What is Litmaps?) scite.ai Toggle scite Smart Citations (What are Smart Citations?) Code, Data, Media Code, Data and Media Associated with this Article alphaXiv Toggle alphaXiv (What is alphaXiv?) Links to Code Toggle CatalyzeX Code Finder for Papers (What is CatalyzeX?) DagsHub Toggle DagsHub (What is DagsHub?) GotitPub Toggle Gotit.pub (What is GotitPub?) Huggingface Toggle Hugging Face (What is Huggingface?) Links to Code Toggle Papers with Code (What is Papers with Code?) ScienceCast Toggle ScienceCast (What is ScienceCast?) Demos Demos Replicate Toggle Replicate (What is Replicate?) Spaces Toggle Hugging Face Spaces (What is Spaces?) Spaces Toggle TXYZ.AI (What is TXYZ.AI?) Related Papers Recommenders and Search Tools Link to Influence Flower Influence Flower (What are Influence Flowers?) Core recommender toggle CORE Recommender (What is CORE?) Author Venue Institution Topic About arXivLabs arXivLabs: experimental projects with community collaborators arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website. Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them. Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs. Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?)

Read Original

Source Information

Source: arXiv Quantum Physics