{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:23:35Z","timestamp":1774023815283,"version":"3.50.1"},"reference-count":55,"publisher":"Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften","license":[{"start":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T00:00:00Z","timestamp":1623715200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["quantum-journal.org"],"crossmark-restriction":false},"short-container-title":["Quantum"],"abstract":"<jats:p>A Physical Unclonable Function (PUF) is a device with unique behaviour that is hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF-based applications have been explored theoretically as well as being implemented in practical settings. Recently, the inherent unclonability of quantum states has been exploited to derive the quantum analogue of PUF as well as new proposals for the implementation of PUF. We present the first comprehensive study of quantum Physical Unclonable Functions (qPUFs) with quantum cryptographic tools. We formally define qPUFs, encapsulating all requirements of classical PUFs as well as introducing a new testability feature inherent to the quantum setting only. We use a quantum game-based framework to define different levels of security for qPUFs: quantum exponential unforgeability, quantum existential unforgeability and quantum selective unforgeability. We introduce a new quantum attack technique based on the universal quantum emulator algorithm of Marvin and Lloyd to prove no qPUF can provide quantum existential unforgeability. On the other hand, we prove that a large family of qPUFs (called unitary PUFs) can provide quantum selective unforgeability which is the desired level of security for most PUF-based applications.<\/jats:p>","DOI":"10.22331\/q-2021-06-15-475","type":"journal-article","created":{"date-parts":[[2021,6,15]],"date-time":"2021-06-15T15:02:43Z","timestamp":1623769363000},"page":"475","update-policy":"https:\/\/doi.org\/10.22331\/q-crossmark-policy-page","source":"Crossref","is-referenced-by-count":53,"title":["Quantum Physical Unclonable Functions: Possibilities and Impossibilities"],"prefix":"10.22331","volume":"5","author":[{"given":"Myrto","family":"Arapinis","sequence":"first","affiliation":[{"name":"School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, UK"}]},{"given":"Mahshid","family":"Delavar","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0920-335X","authenticated-orcid":false,"given":"Mina","family":"Doosti","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, UK"}]},{"given":"Elham","family":"Kashefi","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, UK"},{"name":"Departement Informatique et Reseaux, CNRS, Sorbonne Universit\u00e9, 4 Place Jussieu 75252 Paris CEDEX 05, France"}]}],"member":"9598","published-online":{"date-parts":[[2021,6,15]]},"reference":[{"key":"0","doi-asserted-by":"publisher","unstructured":"Andris Ambainis and Joseph Emerson. Quantum t-designs: t-wise independence in the quantum world. In Proceedings of Twenty-Second Annual IEEE Conference on Computational Complexity (CCC'07), pages 129\u2013140. IEEE, 2007. DOI: 10.1109\/CCC.2007.26.","DOI":"10.1109\/CCC.2007.26"},{"key":"1","doi-asserted-by":"publisher","unstructured":"Mohammad Hassan Ameri, Mahshid Delavar, and Javad Mohajeri. Provably secure and efficient PUF-based broadcast authentication schemes for smart grid applications. International Journal of Communication Systems, 32(8):e3935, 2019. DOI: 10.1002\/dac.3935.","DOI":"10.1002\/dac.3935"},{"key":"2","doi-asserted-by":"publisher","unstructured":"Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, and Moti Yung. Towards a unified security model for physically unclonable functions. In Proceedings of Cryptographers\u2019 Track at the RSA Conference, pages 271\u2013287. Springer, 2016. DOI: 10.1007\/978-3-319-29485-8\u201316.","DOI":"10.1007\/978-3-319-29485-8_16"},{"key":"3","doi-asserted-by":"publisher","unstructured":"Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, and Ivan Visconti. Unconditional uc-secure computation with (stronger-malicious) PUFs. In Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 382\u2013411. Springer, 2017. DOI: 10.1007\/978-3-319-56620-7\u201314.","DOI":"10.1007\/978-3-319-56620-7_14"},{"key":"4","doi-asserted-by":"publisher","unstructured":"Dan Boneh and Mark Zhandry. Secure signatures and chosen ciphertext security in a quantum computing world. In Proceedings of Annual International Cryptology Conference, pages 361\u2013379. Springer, 2013. DOI: 10.1007\/978-3-642-40084-1\u201321.","DOI":"10.1007\/978-3-642-40084-1_21"},{"key":"5","doi-asserted-by":"publisher","unstructured":"Dagmar Bruss, Artur Ekert, and Chiara Macchiavello. Optimal universal quantum cloning and state estimation. Physical Review Letters, 81(12):2598, 1998. DOI: 10.1103\/PhysRevLett.81.2598.","DOI":"10.1103\/PhysRevLett.81.2598"},{"key":"6","doi-asserted-by":"publisher","unstructured":"Christina Brzuska, Marc Fischlin, Heike Schr\u00f6der, and Stefan Katzenbeisser. Physically uncloneable functions in the universal composition framework. In Proceedings of Annual International Cryptology Conference, pages 51\u201370. Springer, 2011. DOI: 10.1007\/978-3-642-22792-9\u20134.","DOI":"10.1007\/978-3-642-22792-9_4"},{"key":"7","doi-asserted-by":"publisher","unstructured":"Harry Buhrman, Richard Cleve, John Watrous, and Ronald De Wolf. Quantum fingerprinting. Physical Review Letters, 87(16):167902, 2001. DOI: 10.1103\/PhysRevLett.87.167902.","DOI":"10.1103\/PhysRevLett.87.167902"},{"key":"8","doi-asserted-by":"publisher","unstructured":"Ran Canetti and Marc Fischlin. Universally composable commitments. In Proceedings of Annual International Cryptology Conference, pages 19\u201340. Springer, 2001. DOI: 10.1007\/3-540-44647-8\u20132.","DOI":"10.1007\/3-540-44647-8_2"},{"key":"9","doi-asserted-by":"publisher","unstructured":"Ulysse Chabaud, Eleni Diamanti, Damian Markham, Elham Kashefi, and Antoine Joux. Optimal quantum-programmable projective measurement with linear optics. Physical Review A, 98(6):062318, 2018. DOI: 10.1103\/PhysRevA.98.062318.","DOI":"10.1103\/PhysRevA.98.062318"},{"key":"10","doi-asserted-by":"publisher","unstructured":"Chip-Hong Chang, Yue Zheng, and Le Zhang. A retrospective and a look forward: Fifteen years of physical unclonable function advancement. IEEE Circuits and Systems Magazine, 17(3):32\u201362, 2017. DOI: 10.1109\/MCAS.2017.2713305.","DOI":"10.1109\/MCAS.2017.2713305"},{"key":"11","doi-asserted-by":"publisher","unstructured":"Giulio Chiribella, Giacomo Mauro D\u2019Ariano, and Paolo Perinotti. Optimal cloning of unitary transformation. Physical review letters, 101(18):180504, 2008. DOI: 10.1103\/PhysRevLett.101.180504.","DOI":"10.1103\/PhysRevLett.101.180504"},{"key":"12","doi-asserted-by":"publisher","unstructured":"Christoph Dankert, Richard Cleve, Joseph Emerson, and Etera Livine. Exact and approximate unitary 2-designs and their application to fidelity estimation. Physical Review A, 80(1):012304, 2009. DOI: 10.1103\/PhysRevA.80.012304.","DOI":"10.1103\/PhysRevA.80.012304"},{"key":"13","doi-asserted-by":"publisher","unstructured":"GM D'Ariano and P Lo Presti. Quantum tomography for measuring experimentally the matrix elements of an arbitrary quantum operation. Physical Review Letters, 86(19):4195, 2001. DOI: 10.1103\/PhysRevLett.86.4195.","DOI":"10.1103\/PhysRevLett.86.4195"},{"key":"14","doi-asserted-by":"publisher","unstructured":"Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, and Javad Mohajeri. PUF-based solutions for secure communications in advanced metering infrastructure (ami). International Journal of Communication Systems, 30(9):e3195, 2017. DOI: 10.1002\/dac.3195.","DOI":"10.1002\/dac.3195"},{"key":"15","doi-asserted-by":"publisher","unstructured":"Mahshid Delavar, Sattar Mirzakuchaki, and Javad Mohajeri. A ring oscillator-based PUF with enhanced challenge-response pairs. Canadian Journal of Electrical and Computer Engineering, 39(2):174\u2013180, 2016. DOI: 10.1109\/CJECE.2016.2521877.","DOI":"10.1109\/CJECE.2016.2521877"},{"key":"16","doi-asserted-by":"publisher","unstructured":"Mina Doosti, Farzad Kianvash, and Vahid Karimipour. Universal superposition of orthogonal states. Physical Review A, 96(5):052318, 2017. DOI: 10.1103\/PhysRevA.96.052318.","DOI":"10.1103\/PhysRevA.96.052318"},{"key":"17","doi-asserted-by":"publisher","unstructured":"Lukas Fladung, Georgios M Nikolopoulos, Gernot Alber, and Marc Fischlin. Intercept-resend emulation attacks against a continuous-variable quantum authentication protocol with physical unclonable keys. Cryptography, 3(4):25, 2019. DOI: 10.3390\/cryptography3040025.","DOI":"10.3390\/cryptography3040025"},{"key":"18","doi-asserted-by":"publisher","unstructured":"Fatemeh Ganji, Shahin Tajik, Fabian F\u00e4\u00dfler, and Jean-Pierre Seifert. Strong machine learning attack against PUFs with no mathematical model. In International Conference on Cryptographic Hardware and Embedded Systems, pages 391\u2013411. Springer, 2016. DOI: 10.1007\/978-3-662-53140-2\u201319.","DOI":"10.1007\/978-3-662-53140-2_19"},{"key":"19","doi-asserted-by":"publisher","unstructured":"Blaise Gassend, Dwaine Clarke, Marten Van Dijk, and Srinivas Devadas. Silicon physical random functions. In Proceedings of the 9th ACM conference on Computer and communications security, pages 148\u2013160. ACM, 2002. DOI: 10.1145\/586110.586132.","DOI":"10.1145\/586110.586132"},{"key":"20","doi-asserted-by":"publisher","unstructured":"Giulio Gianfelici, Hermann Kampermann, and Dagmar Bru\u00df. Theoretical framework for physical unclonable functions, including quantum readout. Physical Review A, 101(4):042337, 2020. DOI: 10.1103\/PhysRevA.101.042337.","DOI":"10.1103\/PhysRevA.101.042337"},{"key":"21","doi-asserted-by":"publisher","unstructured":"Sebastianus A Goorden, Marcel Horstmann, Allard P Mosk, Boris \u0160kori\u0107, and Pepijn WH Pinkse. Quantum-secure authentication of a physical unclonable key. Optica, 1(6):421\u2013424, 2014. DOI: 10.1364\/OPTICA.1.000421.","DOI":"10.1364\/OPTICA.1.000421"},{"key":"22","doi-asserted-by":"publisher","unstructured":"Daniel Greenbaum and Zachary Dutton. Modeling coherent errors in quantum error correction. Quantum Science and Technology, 3(1):015007, 2017. DOI: 10.1088\/2058-9565\/aa9a06.","DOI":"10.1109\/CCC.2007.26"},{"key":"23","doi-asserted-by":"publisher","unstructured":"Jorge Guajardo, Sandeep S Kumar, Geert-Jan Schrijen, and Pim Tuyls. Fpga intrinsic PUFs and their use for ip protection. In Proceedings of International workshop on cryptographic hardware and embedded systems, pages 63\u201380. Springer, 2007. DOI: 10.1007\/978-3-540-74735-2\u20135.","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"24","doi-asserted-by":"publisher","unstructured":"B. Halak. Physically Unclonable Functions: From Basic Design Principles to Advanced Hardware Security Applications. Springer International Publishing, 2019. DOI: 10.1007\/978-3-319-76804-5.","DOI":"10.1007\/978-3-319-76804-5"},{"key":"25","doi-asserted-by":"publisher","unstructured":"Charles Herder, Meng-Day Yu, Farinaz Koushanfar, and Srinivas Devadas. Physical unclonable functions and applications: A tutorial. Proceedings of the IEEE, 102(8):1126\u20131141, 2014. DOI: 10.1109\/JPROC.2014.2320516.","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"26","doi-asserted-by":"publisher","unstructured":"Jonathan Katz. Universally composable multi-party computation using tamper-proof hardware. In Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 115\u2013128. Springer, 2007. DOI: 10.1007\/978-3-540-72540-4\u20137.","DOI":"10.1007\/978-3-540-72540-4_7"},{"key":"27","doi-asserted-by":"publisher","unstructured":"Mahmoud Khalafalla and Catherine Gebotys. PUFs deep attacks: Enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 204\u2013209. IEEE, 2019. DOI: 10.23919\/DATE.2019.8714862.","DOI":"10.23919\/DATE.2019.8714862"},{"key":"28","unstructured":"Niraj Kumar, Rawad Mezher, and Elham Kashefi. Efficient construction of quantum physical unclonable functions with unitary t-designs, 2021. arXiv:2101.05692."},{"key":"29","doi-asserted-by":"publisher","unstructured":"Weiqiang Liu, Lei Zhang, Zhengran Zhang, Chongyan Gu, Chenghua Wang, Maire O'neill, and Fabrizio Lombardi. Xor-based low-cost reconfigurable pufs for iot security. ACM Transactions on Embedded Computing Systems (TECS), 18(3):1\u201321, 2019. DOI: 10.1145\/32746665.","DOI":"10.1145\/32746665"},{"key":"30","doi-asserted-by":"publisher","unstructured":"Seth Lloyd, Masoud Mohseni, and Patrick Rebentrost. Quantum principal component analysis. Nature Physics, 10(9):631, 2014. DOI: 10.1038\/nphys3029.","DOI":"10.1038\/nphys3029"},{"key":"31","doi-asserted-by":"publisher","unstructured":"Roel Maes. Physically Unclonable Functions: Constructions, Properties and Applications. Springer-Verlag Berlin Heidelberg, 2016. DOI: 10.1007\/978-3-642-41395-7\u20133.","DOI":"10.1007\/978-3-642-41395-7_3"},{"key":"32","doi-asserted-by":"publisher","unstructured":"C\u00e9dric Marchand, Lilian Bossuet, Ugo Mureddu, Nathalie Bochard, Abdelkarim Cherkaoui, and Viktor Fischer. Implementation and characterization of a physical unclonable function for iot: a case study with the tero-PUF. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(1):97\u2013109, 2017. DOI: 10.1109\/TCAD.2017.2702607.","DOI":"10.1109\/TCAD.2017.2702607"},{"key":"33","unstructured":"Iman Marvian and Seth Lloyd. Universal quantum emulator. arXiv preprint arXiv:1606.02734, 2016. arXiv:1606.02734."},{"key":"34","doi-asserted-by":"publisher","unstructured":"Charis Mesaritakis, Marialena Akriotou, Alexandros Kapsalis, Evangelos Grivas, Charidimos Chaintoutis, Thomas Nikas, and Dimitris Syvridis. Physical unclonable function based on a multi-mode optical waveguide. Scientific reports, 8(1):9653, 2018. DOI: 10.1038\/s41598-018-28008-6.","DOI":"10.1038\/s41598-018-28008-6"},{"key":"35","doi-asserted-by":"publisher","unstructured":"Debdeep Mukhopadhyay. PUFs as promising tools for security in internet of things. IEEE Design & Test, 33(3):103\u2013115, 2016. DOI: 10.1109\/MDAT.2016.2544845.","DOI":"10.1109\/MDAT.2016.2544845"},{"key":"36","doi-asserted-by":"publisher","unstructured":"Michael A Nielsen and Isaac L Chuang. Quantum Computation and Quantum Information. Cambridge University Press, 10th edition, 2010. DOI: 10.1017\/CBO9780511976667.","DOI":"10.1017\/CBO9780511976667"},{"key":"37","doi-asserted-by":"publisher","unstructured":"Georgios M Nikolopoulos. Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack. Physical Review A, 97(1):012324, 2018. DOI: 10.1103\/PhysRevA.97.012324.","DOI":"10.1103\/PhysRevA.97.012324"},{"key":"38","doi-asserted-by":"publisher","unstructured":"Georgios M Nikolopoulos and Eleni Diamanti. Continuous-variable quantum authentication of physical unclonable keys. Scientific reports, 7:46047, 2017. DOI: 10.1038\/srep46047.","DOI":"10.1038\/srep46047"},{"key":"39","doi-asserted-by":"publisher","unstructured":"Micha\u0142 Oszmaniec, Andrzej Grudka, Micha\u0142 Horodecki, and Antoni W\u00f3jcik. Creating a superposition of unknown quantum states. Physical Review Letters, 116(11), 2016. DOI: 10.1103\/PhysRevLett.116.110403.","DOI":"10.1103\/PhysRevLett.116.110403"},{"key":"40","doi-asserted-by":"publisher","unstructured":"Ravikanth Pappu, Ben Recht, Jason Taylor, and Neil Gershenfeld. Physical one-way functions. Science, 297(5589):2026\u20132030, 2002. DOI: 10.1126\/science.1074376.","DOI":"10.1126\/science.1074376"},{"key":"41","doi-asserted-by":"publisher","unstructured":"Ulrich R\u00fchrmair and Daniel E Holcomb. PUFs at a glance. In Proceedings of the conference on Design, Automation & Test in Europe, page 347. European Design and Automation Association, 2014. DOI: 10.7873\/DATE.2014.360.","DOI":"10.7873\/DATE.2014.360"},{"key":"42","doi-asserted-by":"publisher","unstructured":"Ulrich R\u00fchrmair, Frank Sehnke, Jan S\u00f6lter, Gideon Dror, Srinivas Devadas, and J\u00fcrgen Schmidhuber. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM conference on Computer and communications security, pages 237\u2013249, 2010. DOI: 10.1145\/1866307.1866335.","DOI":"10.1145\/1866307.1866335"},{"key":"43","doi-asserted-by":"publisher","unstructured":"Ulrich Ruhrmair and Jan Solter. PUF modeling attacks: An introduction and overview. In 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2014. DOI: 10.7873\/DATE2014.361.","DOI":"10.7873\/DATE2014.361"},{"key":"44","doi-asserted-by":"publisher","unstructured":"Boris \u0160kori\u0107. Quantum readout of physical unclonable functions. In Proceedings of International Conference on Cryptology in Africa, pages 369\u2013386. Springer, 2010. DOI: 10.1007\/978-3-642-12678-9\u201322.","DOI":"10.1007\/978-3-642-12678-9_22"},{"key":"45","doi-asserted-by":"publisher","unstructured":"BORIS \u0160KORI\u0106 . Quantum readout of physical unclonable functions. International Journal of Quantum Information, 10(01):1250001, 2012. DOI: 10.1142\/S0219749912500013.","DOI":"10.1142\/S0219749912500013"},{"key":"46","doi-asserted-by":"publisher","unstructured":"Boris \u0160kori\u0107, Allard P Mosk, and Pepijn WH Pinkse. Security of quantum-readout PUFs against quadrature-based challenge-estimation attacks. International journal of quantum information, 11(04):1350041, 2013. DOI: 10.1142\/S021974991350041X.","DOI":"10.1142\/S021974991350041X"},{"key":"47","doi-asserted-by":"publisher","unstructured":"Boris \u0160kori\u0107, Pepijn WH Pinkse, and Allard P Mosk. Authenticated communication from quantum readout of PUFs. Quantum Information Processing, 16(8):200, 2017. DOI: 10.1007\/s11128-017-1649-0.","DOI":"10.1007\/s11128-017-1649-0"},{"key":"48","doi-asserted-by":"crossref","unstructured":"G Edward Suh and Srinivas Devadas. Physical unclonable functions for device authentication and secret key generation. In Proceedings of 44th ACM\/IEEE Design Automation Conference, pages 9\u201314. IEEE, 2007. 2007 44th ACM\/IEEE Design Automation Conference.","DOI":"10.1145\/1278480.1278484"},{"key":"49","doi-asserted-by":"publisher","unstructured":"Lars Tebelmann, Michael Pehl, and Vincent Immler. Side-channel analysis of the tero PUF. In International Workshop on Constructive Side-Channel Analysis and Secure Design, pages 43\u201360. Springer, 2019. DOI: 10.1007\/978-3-030-16350-1\u20134.","DOI":"10.1007\/978-3-030-16350-1_4"},{"key":"50","doi-asserted-by":"publisher","unstructured":"Ravitej Uppu, Tom AW Wolterink, Sebastianus A Goorden, Bin Chen, Boris \u0160kori\u0107, Allard P Mosk, and Pepijn WH Pinkse. Asymmetric cryptography with physical unclonable keys. Quantum Science and Technology, 4(4):045011, 2019. DOI: 10.1088\/2058-9565\/ab479f.","DOI":"10.1088\/2058-9565\/ab479f"},{"key":"51","doi-asserted-by":"publisher","unstructured":"William K Wootters and Wojciech H Zurek. A single quantum cannot be cloned. Nature, 299(5886):802, 1982. DOI: 10.1038\/299802a0.","DOI":"10.1038\/299802a0"},{"key":"52","doi-asserted-by":"publisher","unstructured":"Yao Yao, Ming Gao, Mo Li, and Jian Zhang. Quantum cloning attacks against PUF-based quantum authentication systems. Quantum Information Processing, 15(8):3311\u20133325, 2016. DOI: 10.1007\/s11128-016-1316-x.","DOI":"10.1007\/s11128-016-1316-x"},{"key":"53","unstructured":"Robert Young, Utz Roedig, and Jonathan Roberts. Quantum physical unclonable function, 2019. Patent: US10148435B2."},{"key":"54","doi-asserted-by":"publisher","unstructured":"Karol \u017byczkowski and Hans-J\u00fcrgen Sommers. Average fidelity between random quantum states. Physical Review A, 71(3):032313, 2005. DOI: 10.1103\/PhysRevA.71.032313.","DOI":"10.1103\/PhysRevA.71.032313"}],"container-title":["Quantum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/quantum-journal.org\/papers\/q-2021-06-15-475\/pdf\/","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T21:13:12Z","timestamp":1725225192000},"score":1,"resource":{"primary":{"URL":"https:\/\/quantum-journal.org\/papers\/q-2021-06-15-475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,15]]},"references-count":55,"URL":"https:\/\/doi.org\/10.22331\/q-2021-06-15-475","archive":["CLOCKSS"],"relation":{},"ISSN":["2521-327X"],"issn-type":[{"value":"2521-327X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,15]]},"article-number":"475"}}