
Table 2: Unclonable primitives and bounded execution programs.
Primitive to realize Using k-time programs? Using (1,n)-time programs?
Quantum money Yes (with k = 1) No—a coin can be spent n times
Software copy protection (and
secure software leasing)
Yes (including learnable functions)—
but a program can be executed only k
times
Yes—but permitting domain splitting at-
tacks and the power gap between the honest
party and the adversary
One-shot signatures Yes (with k = 1) No—an attacker can sign up to n messages
instead of one
Unclonable encryption Yes Yes—but a weaker security notion covering
n + 1 attackers instead of two
Unclonable decryption Yes Yes—same constraint as above
Digital lockers Yes—k trials for honest party Yes
the observation that there seem to be no natural or
fundamental barriers to such an approach.
On the Nature of Emergent Technologies. We ex-
ercise a cryptographer’s skepticism to add a note of
caution; none of what we have covered here should
be seen as definitive in terms of eventual real-world
applications. There are considerable challenges and
unseen, yet-to-appear problems in the course of re-
alizing either viable quantum computers, or protein
data tokens. Each involves physical, societal and eth-
ical conundrums, and the end product in either case
may take a very different form to what we currently
suppose. For example, the bounded query feature ob-
tained from proteins is a consequence of both their
unclonability and destructive sequencing. If new ad-
vances lead to non-destructive sequencing machinery,
then this feature will not hold anymore. At the same
time, looking for and harnessing emergent technolo-
gies and unexpected developments also give rise to
unexpected cryptography in their own right!
REFERENCES
Aaronson, S. (2009). Quantum copy-protection and quan-
tum money. In CCC.
Aaronson, S. and Christiano, P. (2012). Quantum money
from hidden subspaces. In STOC.
Aaronson, S., Liu, J., Liu, Q., Zhandry, M., and Zhang,
R. (2021). New approaches for quantum copy-
protection. In CRYPTO.
Almashaqbeh, G., Canetti, R., Erlich, Y., Gershoni, J.,
Malkin, T., Pe’er, I., Roitburd-Berman, A., and
Tromer, E. (2022). Unclonable polymers and their
cryptographic applications. In EUROCRYPT.
Amos, R., Georgiou, M., Kiayias, A., and Zhandry, M.
(2020). One-shot signatures and applications to hy-
brid quantum/classical authentication. In STOC.
Ananth, P. and Kaleoglu, F. (2021). Unclonable encryption,
revisited. In TCC.
Ananth, P., Kaleoglu, F., Li, X., Liu, Q., and Zhandry, M.
(2022). On the feasibility of unclonable encryption,
and more. In CRYPTO.
Ananth, P. and La Placa, R. L. (2021). Secure software
leasing. In EUROCRYPT.
Ben-David, S. and Sattath, O. (2016). Quantum tokens for
digital signatures. arXiv preprint arXiv:1609.09047.
Broadbent, A., Gutoski, G., and Stebila, D. (2013). Quan-
tum one-time programs. In CRYPTO.
Broadbent, A., Jeffery, S., Lord, S., Podder, S., and Sun-
daram, A. (2021). Secure software leasing without
assumptions. In TCC.
Broadbent, A. and Lord, S. (2020). Uncloneable quantum
encryption via oracles. In TQC.
Canetti, R. and Dakdouk, R. R. (2008). Obfuscating point
functions with multibit output. In EUROCRYPT.
Chen, Z., Vasilakis, G., Murdock, K., Dean, E., Oswald, D.,
and Garcia, F. D. (2021). {VoltPillager}: Hardware-
based fault injection attacks against intel {SGX} en-
claves using the {SVID} voltage scaling interface. In
USENIX Security.
Coladangelo, A., Liu, J., Liu, Q., and Zhandry, M. (2021).
Hidden cosets and applications to unclonable cryptog-
raphy. In CRYPTO.
Georgiou, M. and Zhandry, M. (2020). Unclonable decryp-
tion keys. Cryptology ePrint Archive.
Goldwasser, S., Kalai, Y. T., and Rothblum, G. N. (2008).
One-time programs. In CRYPTO.
Gottesman, D. (2002). Uncloneable encryption. arXiv
preprint quant-ph/0210062.
Ji, Z., Liu, Y.-K., and Song, F. (2018). Pseudorandom quan-
tum states. In CRYPTO.
Kitagawa, F., Nishimaki, R., and Yamakawa, T. (2021). Se-
cure software leasing from standard assumptions. In
TCC.
Pappu, R., Recht, B., Taylor, J., and Gershenfeld, N.
(2002). Physical one-way functions. Science,
297(5589):2026–2030.
Sattath, O. and Wyborski, S. (2022). Uncloneable decryp-
tion from quantum copy protection. arXiv preprint
arXiv:2203.05866.
Shmueli, O. (2022). Public-key quantum money with a clas-
sical bank. In STOC.
Wiesner, S. (1983). Conjugate coding. SIGACT News,
15(1):78–88.
Zhandry, M. (2019). Quantum lightning never strikes the
same state twice. In EUROCRYPT.
Unclonable Cryptography: A Tale of Two No-Cloning Paradigms
477