{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T23:12:40Z","timestamp":1775085160082,"version":"3.50.1"},"reference-count":33,"publisher":"Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["quantum-journal.org"],"crossmark-restriction":false},"short-container-title":["Quantum"],"abstract":"<jats:p>The conditional disclosure of secrets (CDS) primitive is among the simplest cryptographic settings in which to study the relationship between communication, randomness, and security. CDS involves two parties, Alice and Bob, who do not communicate but who wish to reveal a secret <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>z<\/mml:mi><\/mml:math> to a referee if and only if a Boolean function <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>f<\/mml:mi><\/mml:math> has <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>f<\/mml:mi><mml:mo stretchy=\"false\">(<\/mml:mo><mml:mi>x<\/mml:mi><mml:mo>,<\/mml:mo><mml:mi>y<\/mml:mi><mml:mo stretchy=\"false\">)<\/mml:mo><mml:mo>=<\/mml:mo><mml:mn>1<\/mml:mn><\/mml:math>. Alice knows <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>x<\/mml:mi><mml:mo>,<\/mml:mo><mml:mi>z<\/mml:mi><\/mml:math>, Bob knows <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>y<\/mml:mi><\/mml:math>, and the referee knows <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>x<\/mml:mi><mml:mo>,<\/mml:mo><mml:mi>y<\/mml:mi><\/mml:math>. Recently, a quantum analogue of this primitive called CDQS was defined and related to <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>f<\/mml:mi><\/mml:math>-routing, a task studied in the context of quantum position-verification. CDQS has the same inputs, outputs, and communication pattern as CDS but allows the use of shared entanglement and quantum messages. We initiate the systematic study of CDQS, with the aim of better understanding the relationship between privacy and quantum resources in the information theoretic setting. We begin by looking for quantum analogues of results already established in the classical CDS literature. Doing so we establish a number of basic properties of CDQS, including lower bounds on entanglement and communication stated in terms of measures of communication complexity. Because of the close relationship to the <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\"><mml:mi>f<\/mml:mi><\/mml:math>-routing position-verification scheme, our results have relevance to the security of these schemes.<\/jats:p>","DOI":"10.22331\/q-2025-10-16-1885","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:29:11Z","timestamp":1760621351000},"page":"1885","update-policy":"https:\/\/doi.org\/10.22331\/q-crossmark-policy-page","source":"Crossref","is-referenced-by-count":1,"title":["Conditional disclosure of secrets with quantum resources"],"prefix":"10.22331","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8354-7463","authenticated-orcid":false,"given":"Vahid R.","family":"Asadi","sequence":"first","affiliation":[{"name":"Institute for Quantum Computing, Waterloo, Ontario"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5555-1940","authenticated-orcid":false,"given":"Kohdai","family":"Kuroiwa","sequence":"additional","affiliation":[{"name":"Perimeter Institute for Theoretical Physics"},{"name":"Institute for Quantum Computing, Waterloo, Ontario"}]},{"given":"Debbie","family":"Leung","sequence":"additional","affiliation":[{"name":"Perimeter Institute for Theoretical Physics"},{"name":"Institute for Quantum Computing, Waterloo, Ontario"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4030-5410","authenticated-orcid":false,"given":"Alex","family":"May","sequence":"additional","affiliation":[{"name":"Perimeter Institute for Theoretical Physics"},{"name":"Institute for Quantum Computing, Waterloo, Ontario"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3672-4169","authenticated-orcid":false,"given":"Sabrina","family":"Pasterski","sequence":"additional","affiliation":[{"name":"Perimeter Institute for Theoretical Physics"}]},{"given":"Chris","family":"Waddell","sequence":"additional","affiliation":[{"name":"Perimeter Institute for Theoretical Physics"}]}],"member":"9598","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"0","doi-asserted-by":"publisher","unstructured":"Yael Gertner, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. Protecting data privacy in private information retrieval schemes. Journal of Computer and System Sciences, 60 (3): 592\u2013629, 2000. ISSN 0022-0000. https:\/\/doi.org\/10.1006\/jcss.1999.1689. URL https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0022000099916896.","DOI":"10.1006\/jcss.1999.1689"},{"key":"1","doi-asserted-by":"publisher","unstructured":"Romain Gay, Iordanis Kerenidis, and Hoeteck Wee. Communication complexity of conditional disclosure of secrets and attribute-based encryption. In Annual Cryptology Conference, pages 485\u2013502. Springer, 2015. https:\/\/doi.org\/10.1007\/978-3-662-48000-7_24.","DOI":"10.1007\/978-3-662-48000-7_24"},{"key":"2","doi-asserted-by":"publisher","unstructured":"Benny Applebaum and Barak Arkis. On the power of amortization in secret sharing: d-uniform secret sharing and CDS with constant information rate. ACM Transactions on Computation Theory (TOCT), 12 (4): 1\u201321, 2020. https:\/\/doi.org\/10.1145\/3417756.","DOI":"10.1145\/3417756"},{"key":"3","doi-asserted-by":"publisher","unstructured":"Benny Applebaum and Prashant Nalini Vasudevan. Placing conditional disclosure of secrets in the communication complexity universe. Journal of Cryptology, 34: 1\u201345, 2021. https:\/\/doi.org\/10.1007\/s00145-021-09376-1.","DOI":"10.1007\/s00145-021-09376-1"},{"key":"4","doi-asserted-by":"publisher","unstructured":"Uri Feige, Joe Killian, and Moni Naor. A minimal model for secure computation. In Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, pages 554\u2013563, 1994. https:\/\/doi.org\/10.1145\/195058.195408.","DOI":"10.1145\/195058.195408"},{"key":"5","doi-asserted-by":"publisher","unstructured":"Rene Allerstorfer, Harry Buhrman, Alex May, Florian Speelman, and Philip Verduyn Lunel. Relating non-local quantum computation to information theoretic cryptography. Quantum, 8: 1387, 2024. https:\/\/doi.org\/10.22331\/q-2024-06-27-1387.","DOI":"10.22331\/q-2024-06-27-1387"},{"key":"6","doi-asserted-by":"publisher","unstructured":"Adrian Kent, William J Munro, and Timothy P Spiller. Quantum tagging: Authenticating location via quantum information and relativistic signaling constraints. Physical Review A, 84 (1): 012326, 2011. https:\/\/doi.org\/10.1103\/PhysRevA.84.012326.","DOI":"10.1103\/PhysRevA.84.012326"},{"key":"7","doi-asserted-by":"publisher","unstructured":"Nishanth Chandran, Vipul Goyal, Ryan Moriarty, and Rafail Ostrovsky. Position based cryptography. In Annual International Cryptology Conference, pages 391\u2013407. Springer, 2009. https:\/\/doi.org\/10.1007\/978-3-642-03356-8_23.","DOI":"10.1007\/978-3-642-03356-8_23"},{"key":"8","doi-asserted-by":"publisher","unstructured":"Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, and Christian Schaffner. Position-based quantum cryptography: Impossibility and constructions. SIAM Journal on Computing, 43 (1): 150\u2013178, 2014. https:\/\/doi.org\/10.1137\/130913687.","DOI":"10.1137\/130913687"},{"key":"9","doi-asserted-by":"publisher","unstructured":"Vahid R. Asadi, Eric Culf, and Alex May. Rank lower bounds on non-local quantum computation. Proceedings, Innovations in theoretical computer science, 2025. 10.4230\/LIPIcs.ITCS.2025.11.","DOI":"10.4230\/LIPIcs.ITCS.2025.11"},{"key":"10","doi-asserted-by":"publisher","unstructured":"Tianren Liu, Vinod Vaikuntanathan, and Hoeteck Wee. Conditional disclosure of secrets via non-linear reconstruction. In Annual International Cryptology Conference, pages 758\u2013790. Springer, 2017. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_25.","DOI":"10.1007\/978-3-319-63688-7_25"},{"key":"11","doi-asserted-by":"publisher","unstructured":"Amos Beimel and Yuval Ishai. On the power of nonlinear secret-sharing. In Proceedings 16th annual IEEE conference on computational complexity, pages 188\u2013202. IEEE, 2001. 10.1109\/CCC.2001.933886.","DOI":"10.1109\/CCC.2001.933886"},{"key":"12","doi-asserted-by":"publisher","unstructured":"Sam Cree and Alex May. Code-routing: a new attack on position-verification. arXiv preprint arXiv:2202.07812, 2022. https:\/\/doi.org\/10.48550\/arXiv.2202.07812.","DOI":"10.48550\/arXiv.2202.07812"},{"key":"13","doi-asserted-by":"publisher","unstructured":"Andreas Bluhm, Matthias Christandl, and Florian Speelman. A single-qubit position verification protocol that is secure against multi-qubit attacks. Nature Physics, pages 1\u20134, 2022. https:\/\/doi.org\/10.1038\/s41567-022-01577-0.","DOI":"10.1038\/s41567-022-01577-0"},{"key":"14","doi-asserted-by":"publisher","unstructured":"Ronald De Wolf. Nondeterministic quantum query and communication complexities. SIAM Journal on Computing, 32 (3): 681\u2013699, 2003. https:\/\/doi.org\/10.1137\/S0097539702407345.","DOI":"10.1137\/S0097539702407345"},{"key":"15","doi-asserted-by":"publisher","unstructured":"Akinori Kawachi and Harumichi Nishimura. Communication complexity of private simultaneous quantum messages protocols. arXiv preprint arXiv:2105.07120, 2021. https:\/\/doi.org\/10.4230\/LIPIcs.ITC.2021.20.","DOI":"10.4230\/LIPIcs.ITC.2021.20"},{"key":"16","doi-asserted-by":"publisher","unstructured":"Rene Allerstorfer, Andreas Bluhm, Harry Buhrman, Matthias Christandl, Lloren\u00e7 Escol\u00e0-Farr\u00e0s, Florian Speelman, and Philip Verduyn Lunel. Making existing quantum position verification protocols secure against arbitrary transmission loss. arXiv preprint arXiv:2312.12614, 2023. https:\/\/doi.org\/10.48550\/arXiv.2312.12614.","DOI":"10.48550\/arXiv.2312.12614"},{"key":"17","doi-asserted-by":"publisher","unstructured":"Benny Applebaum, Barak Arkis, Pavel Raykov, and Prashant Nalini Vasudevan. Conditional disclosure of secrets: Amplification, closure, amortization, lower-bounds, and separations. In Annual International Cryptology Conference, pages 727\u2013757. Springer, 2017. https:\/\/doi.org\/10.1007\/978-3-319-63688-7_24.","DOI":"10.1007\/978-3-319-63688-7_24"},{"key":"18","doi-asserted-by":"publisher","unstructured":"Richard Cleve, Wim Van Dam, Michael Nielsen, and Alain Tapp. Quantum entanglement and the communication complexity of the inner product function. In NASA International Conference on Quantum Computing and Quantum Communications, pages 61\u201374. Springer, 1998. https:\/\/doi.org\/10.1007\/3-540-49208-9_4.","DOI":"10.1007\/3-540-49208-9_4"},{"key":"19","doi-asserted-by":"publisher","unstructured":"Ashwin Nayak and Julia Salzman. On communication over an entanglement-assisted quantum channel. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, pages 698\u2013704, 2002. https:\/\/doi.org\/10.1145\/509907.510007.","DOI":"10.1145\/509907.510007"},{"key":"20","doi-asserted-by":"publisher","unstructured":"Anurag Anshu, Dave Touchette, Penghui Yao, and Nengkun Yu. Exponential separation of quantum communication and classical information. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, page 277\u2013288, 2017. 10.1145\/3055399.3055401. URL https:\/\/doi.org\/10.1145\/3055399.3055401.","DOI":"10.1145\/3055399.3055401"},{"key":"21","doi-asserted-by":"publisher","unstructured":"Mark Braverman, Ankit Garg, Young Kun Ko, Jieming Mao, and Dave Touchette. Near-optimal bounds on the bounded-round quantum communication complexity of disjointness. SIAM Journal on Computing, 47 (6): 2277\u20132314, 2018. 10.1137\/16M1061400.","DOI":"10.1137\/16M1061400"},{"key":"22","doi-asserted-by":"publisher","unstructured":"Mark M Wilde. Quantum information theory. Cambridge university press, 2013. https:\/\/doi.org\/10.1017\/CBO9781139525343.","DOI":"10.1017\/CBO9781139525343"},{"key":"23","doi-asserted-by":"publisher","unstructured":"Dennis Kretschmann, Dirk Schlingemann, and Reinhard F Werner. The information-disturbance tradeoff and the continuity of Stinespring&apos;s representation. IEEE transactions on information theory, 54 (4): 1708\u20131717, 2008. 10.1109\/TIT.2008.917696.","DOI":"10.1109\/TIT.2008.917696"},{"key":"24","doi-asserted-by":"publisher","unstructured":"A Robert Calderbank and Peter W Shor. Good quantum error-correcting codes exist. Physical Review A, 54 (2): 1098, 1996. https:\/\/doi.org\/10.1103\/PhysRevA.54.1098.","DOI":"10.1103\/PhysRevA.54.1098"},{"key":"25","unstructured":"Daniel Gottesman. Surviving as a Quantum Computer in a Classical World. 2024. URL https:\/\/www.cs.umd.edu\/class\/spring2024\/cmsc858G\/QECCbook-2024-ch1-8.pdf."},{"key":"26","doi-asserted-by":"publisher","unstructured":"Ryan O&apos;Donnell and John Wright. Efficient quantum tomography. In 48th annual ACM symposium on Theory of Computing, 8 2015. 10.1145\/2897518.2897544.","DOI":"10.1145\/2897518.2897544"},{"key":"27","doi-asserted-by":"publisher","unstructured":"Alexander A. Sherstov. The pattern matrix method. SIAM Journal on Computing, 40 (6): 1969\u20132000, 2011. 10.1137\/080733644. URL https:\/\/doi.org\/10.1137\/080733644.","DOI":"10.1137\/080733644"},{"key":"28","doi-asserted-by":"publisher","unstructured":"Andris Ambainis. Polynomial degree and lower bounds in quantum complexity: Collision and element distinctness with small range. Theory of Computing, 1 (3): 37\u201346, 2005. 10.4086\/toc.2005.v001a003. URL https:\/\/theoryofcomputing.org\/articles\/v001a003.","DOI":"10.4086\/toc.2005.v001a003"},{"key":"29","doi-asserted-by":"publisher","unstructured":"Samuel Kutin. Quantum lower bound for the collision problem with small range. Theory of Computing, 1 (2): 29\u201336, 2005. 10.4086\/toc.2005.v001a002. URL https:\/\/theoryofcomputing.org\/articles\/v001a002.","DOI":"10.4086\/toc.2005.v001a002"},{"key":"30","doi-asserted-by":"publisher","unstructured":"Hartmut Klauck. Lower bounds for quantum communication complexity. In Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pages 288\u2013297. IEEE, 2001. 10.1109\/SFCS.2001.959903.","DOI":"10.1109\/SFCS.2001.959903"},{"key":"31","doi-asserted-by":"publisher","unstructured":"Uma Girish, Alex May, Leo Orshansky, and Chris Waddell. Comparing classical and quantum conditional disclosure of secrets. arXiv preprint arXiv:2505.02939, 2025. https:\/\/doi.org\/10.48550\/arXiv.2505.02939.","DOI":"10.48550\/arXiv.2505.02939"},{"key":"32","doi-asserted-by":"publisher","unstructured":"Ashley Montanaro. Learning stabilizer states by Bell sampling. arXiv preprint arXiv:1707.04012, 2017. https:\/\/doi.org\/10.48550\/arXiv.1707.04012.","DOI":"10.48550\/arXiv.1707.04012"}],"container-title":["Quantum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/quantum-journal.org\/papers\/q-2025-10-16-1885\/pdf\/","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:29:13Z","timestamp":1760621353000},"score":1,"resource":{"primary":{"URL":"https:\/\/quantum-journal.org\/papers\/q-2025-10-16-1885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":33,"URL":"https:\/\/doi.org\/10.22331\/q-2025-10-16-1885","archive":["CLOCKSS"],"relation":{},"ISSN":["2521-327X"],"issn-type":[{"value":"2521-327X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"article-number":"1885"}}