| Date | 11th, Aug 2020 |
|---|
It is widely known that quantum computing can potentially offer not only unparalleled computational performance, but also exceptional – and theoretically unbreakable – security. One of the lesser-known features of quantum computing is the possibility to create one-time programs that operate similarly to ‘classical’ software, but are destroyed after their execution, thus facilitating efforts to prevent attempts of stealing code or processed information.

The photo above is an artist’s depiction of an entangled pair of photons that may be used for quantum communication or computation. Image credit: U.S. Army Research Office/Public Domain
A recent study published on arXiv.org describes an improved protocol for already existing schemes of one-time programs by employing entangled pairs of quantum bits. Here, the quantum communication is separated from the actual program execution, which enables the user (client or sender) to perform such code at a later point of time, using classical communication. This approach also solves several drawbacks of earlier schemes of one-time programs:
It is well known that quantum technology allows for an unprecedented level of data and software protection for quantum computers as well as for quantum-assisted classical computers. To exploit these properties, probabilistic one-time programs have been developed, where the encoding of classical software in small quantum states enables computer programs that can be used only once. Such self-destructing one-time programs facilitate a variety of new applications reaching from software distribution to one-time delegation of signature authority. Whereas first proof-of-principle experiments demonstrated the feasibility of such schemes, the practical applications were limited due to the requirement of using the software on-the-fly combined with technological challenges due to the need for active optical switching and a large amount of classical communication. Here we present an improved protocol for one-time programs that resolves major drawbacks of previous schemes, by employing entangled qubit pairs. This results in four orders of magnitude higher count rates as well the ability to execute a program long after the quantum information exchange has taken place. We demonstrate our protocol over an underground fiber link between university buildings in downtown Vienna. Finally, together with our implementation of a one-time delegation of signature authority this emphasizes the compatibility of our scheme with prepare-and-measure quantum internet networks.
Link to the research article: https://arxiv.org/abs/2008.02294
