Martti Karvonen’s research while affiliated with University of Ottawa and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (25)


Why quantum state verification cannot be both efficient and secure: a categorical approach
  • Preprint

November 2024

·

2 Reads

·

Ziad Chaoui

·

Diana Kessler

·

[...]

·

Martti Karvonen

The advantage of quantum protocols lies in the inherent properties of the shared quantum states. These states are sometimes provided by sources that are not trusted, and therefore need to be verified. Finding secure and efficient quantum state verification protocols remains a big challenge, and recent works illustrate trade-offs between efficiency and security for different groups of states in restricted settings. However, whether a universal trade-off exists for all quantum states and all verification strategies remains unknown. In this work, we instantiate the categorical composable cryptography framework to show a fundamental limit for quantum state verification for all cut-and-choose approaches used to verify arbitrary quantum states. Our findings show that the prevailing cut-and-choose techniques cannot lead to quantum state verification protocols that are both efficient and secure.


Figure 2: The˜CnThe˜ The˜Cn circuits of the proof of Theorem 5.
Uncloneable Quantum Advice
  • Article
  • Full-text available

October 2024

·

12 Reads

·

4 Citations

IACR Communications in Cryptology

The famous no-cloning principle has been shown recently to enable a number of uncloneable cryptographic primitives, including the copy-protection of certain functionalities. Here we address for the first time unkeyed quantum uncloneablity, via the study of a complexity-theoretic tool that enables a computation, but that is natively unkeyed: quantum advice. Remarkably, this is an application of the no-cloning principle in a context where the quantum states of interest are not chosen by a random process. We establish unconditional constructions for promise problems admitting uncloneable quantum advice and, assuming the feasibility of quantum copy-protecting certain functions, for languages with uncloneable advice. Along the way, we note that state complexity classes, introduced by Rosenthal and Yuen (ITCS 2022) — which concern the computational difficulty of synthesizing sequences of quantum states — can be naturally generalized to obtain state cloning complexity classes. We make initial observations on these classes, notably obtaining a result analogous to the existence of undecidable problems. Our proof technique defines and constructs ingenerable sequences of finite bit strings, essentially meaning that they cannot be generated by any uniform circuit family with non-negligible probability. We then prove a generic result showing that the difficulty of accomplishing a computational task on uniformly random inputs implies its difficulty on any fixed, ingenerable sequence. We use this result to derandomize quantum cryptographic games that relate to cloning, and then incorporate a result of Kundu and Tan (arXiv 2022) to obtain uncloneable advice. Applying this two-step process to a monogamy-of-entanglement game yields a promise problem with uncloneable advice, and applying it to the quantum copy-protection of pseudorandom functions with super-logarithmic output lengths yields a language with uncloneable advice.

Download

Inner automorphisms as 2-cells

June 2024

·

1 Read

inner automorphisms can be used to promote any category into a 2-category, and we study two-dimensional limits and colimits in the resulting 2-categories. Existing connected colimits and limits in the starting category become two-dimensional colimits and limits under fairly general conditions. Under the same conditions, colimits in the underlying category can be used to build many notable two-dimensional colimits such as coequifiers and coinserters. In contrast, disconnected colimits or genuinely 2-categorical limits such as inserters and equifiers and cotensors cannot exist unless no nontrivial abstract inner automorphisms exist and the resulting 2-category is locally discrete. We also study briefly when an ordinary functor can be extended to a 2-functor between the resulting 2-categories.



Categorical composable cryptography: extended version

December 2023

·

14 Reads

·

5 Citations

Logical Methods in Computer Science

We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting subsets of adversaries in a modular, flexible fashion. We conclude by using string diagrams to rederive the security of the one-time pad, correctness of Diffie-Hellman key exchange and no-go results concerning the limits of bipartite and tripartite cryptography, ruling out e.g., composable commitments and broadcasting. On the way, we exhibit two categorical constructions of resource theories that might be of independent interest: one capturing resources shared among multiple parties and one capturing resource conversions that succeed asymptotically.


Uncloneable Quantum Advice

September 2023

·

19 Reads

The famous no-cloning principle has been shown recently to enable a number of uncloneable functionalities. Here we address for the first time unkeyed quantum uncloneablity, via the study of a complexity-theoretic tool that enables a computation, but that is natively unkeyed: quantum advice. Remarkably, this is an application of the no-cloning principle in a context where the quantum states of interest are not chosen by a random process. We show the unconditional existence of promise problems admitting uncloneable quantum advice, and the existence of languages with uncloneable advice, assuming the feasibility of quantum copy-protecting certain functions. Along the way, we note that state complexity classes, introduced by Rosenthal and Yuen (ITCS 2022) - which concern the computational difficulty of synthesizing sequences of quantum states - can be naturally generalized to obtain state cloning complexity classes. We make initial observations on these classes, notably obtaining a result analogous to the existence of undecidable problems. Our proof technique establishes the existence of ingenerable sequences of finite bit strings - essentially meaning that they cannot be generated by any uniform circuit family. We then prove a generic result showing that the difficulty of accomplishing a computational task on uniformly random inputs implies its difficulty on any fixed, ingenerable sequence. We use this result to derandomize quantum cryptographic games that relate to cloning, and then incorporate a result of Kundu and Tan (arXiv 2022) to obtain uncloneable advice. Applying this two-step process to a monogamy-of-entanglement game yields a promise problem with uncloneable advice, and applying it to the quantum copy-protection of pseudorandom functions with super-logarithmic output lengths yields a language with uncloneable advice.


Fig. 1 M. C. Escher, Klimmen en dalen (Ascending and descending), 1960. Lithograph, 285mm × 355mm.
Fig. 2 An experimental procedure uses a black box of one type to simulate a black box of another type.
Fig. 4 Bundle diagram for the empirical model of Example 8.
Closing Bell Boxing Black Box Simulations in the Resource Theory of Contextuality

August 2023

·

63 Reads

·

10 Citations

This chapter contains an exposition of the sheaf-theoretic framework for contextuality emphasising resource-theoretic aspects, as well as some original results on this topic. In particular, we consider functions that transform empirical models on a scenario S to empirical models on another scenario T, and characterise those that are induced by classical procedures between S and T corresponding to ‘free’ operations in the (non-adaptive) resource theory of contextuality. We proceed by expressing such functions as empirical models themselves, on a new scenario built from S and T. Our characterisation then boils down to the non-contextuality of these models. We also show that this construction on scenarios provides a closed structure in the category of measurement scenarios.


Categorical composable cryptography: extended version

August 2022

·

13 Reads

We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting subsets of adversaries in a modular, flexible fashion. W We conclude by using string diagrams to rederive the security of the one-time pad and no-go results concerning the limits of bipartite and tripartite cryptography, ruling out e.g., composable commitments and broadcasting. On the way, we exhibit two categorical constructions of resource theories that might be of independent interest: one capturing resources shared among multiple parties and one capturing resource conversions that succeed asymptotically.


Inner autoequivalences in general and those of monoidal categories in particular

May 2022

·

12 Reads

We develop a general theory of (extended) inner autoequivalences of objects of any 2-category, generalizing the theory of isotropy groups to the 2-categorical setting. We show how dense subcategories let one compute isotropy in the presence of binary coproducts, unifying various known one-dimensional results and providing tractable computational tools in the two-dimensional setting. In particular, we show that the isotropy 2-group of a monoidal group coincides with its Picard 2-group, i.e., the 2-group on its weakly invertible objects.


Categorical composable cryptography

January 2022

·

45 Reads

·

7 Citations

Lecture Notes in Computer Science

We formalize the simulation paradigm of cryptography in terms of category theory and show that protocols secure against abstract attacks form a symmetric monoidal category, thus giving an abstract model of composable security definitions in cryptography. Our model is able to incorporate computational security, set-up assumptions and various attack models such as colluding or independently acting subsets of adversaries in a modular, flexible fashion. We conclude by using string diagrams to rederive the security of the one-time pad and no-go results concerning the limits of bipartite and tripartite cryptography, ruling out e.g., composable commitments and broadcasting.


Citations (12)


... As stated by Broadbent, Karvonen, and Lord [BKL23], the task of witness cloning can be viewed as the "1 → 2" analog of the task of producing witness to quantum verification circuits which is the "0 → 1" task. ...

Reference:

On the hardness of cloning and connections to representation theory
Uncloneable Quantum Advice

IACR Communications in Cryptology

... On Pieter I, the second named author, worked with Pieter from when I arrived at the University of Ottawa in 2019 until his passing in 2022. We established (special cases of) the the main results of this work early in our collaboration, before we decided to put this work on a back burner and focus on [7]. A week before his death, I received Pieter's final comments on our draft of [7], after which I completed that manuscript and then returned to this one with the current memorial volume in mind: while he never saw the final version, I hope that it is to his taste, especially since the natural setting for the theory was given by crossed modules studied in [6] instead of the special case we initially worked on. ...

Inner autoequivalences in general and those of monoidal categories in particular
  • Citing Article
  • May 2024

Journal of Pure and Applied Algebra

... In this work we provide a no-go result showing that a quantum state verification protocol cannot be composably secure and efficient at the same time. We use the novel framework of categorical composable cryptography [2,3] to prove this result. The motivation for using this framework lies in its combination of rigor and flexibility. ...

Categorical composable cryptography: extended version
  • Citing Article
  • December 2023

Logical Methods in Computer Science

... In the resource theories framework, given that we have a notion of free objects determined by elements from the set F, we can also have a notion of free operations as those that, at least, preserve this set. In other words, mappings T : U → U such that T (F ) ⊆ F. Different works have considered different choices of free operations, meaning in our case those that do not create KS contextual correlations from KS noncontextual ones [29][30][31][32][33][34][35]. Noncontextual wirings (NCWs) [36,37] is one such choice of free operations. ...

Closing Bell Boxing Black Box Simulations in the Resource Theory of Contextuality

... In this work we provide a no-go result showing that a quantum state verification protocol cannot be composably secure and efficient at the same time. We use the novel framework of categorical composable cryptography [2,3] to prove this result. The motivation for using this framework lies in its combination of rigor and flexibility. ...

Categorical composable cryptography

Lecture Notes in Computer Science

... For this purpose, we first define the morphisms. As the intent is to show it is equivalent to a category of causal contextuality scenarios, we define morphisms on the same lines as [23] with the idea that the decisions of the universe player in a game can be simulated by another game into which the observer decisions are fed, in the same way a human can sit in front of two electronic chessboards and let the computers play against each other by alternatively feeding the output of one side on the other side. Definition 5 (Game morphism). ...

A comonadic view of simulation and quantum resources
  • Citing Conference Paper
  • June 2019

... The main aspect of this line of research is that partiality can have a purely algebraic description: one can introduce a restriction operator on morphisms, associating to a morphism a partial identity on its domain. This categorical framework has recently been put to use to develop the semantics of specific reversible programming constructs and concrete reversible languages: analysis of recursion in the context of reversibility [AK16, Kaa19, KV19], formalization of reversible flowchart languages [12,22], analysis of side-effects [HK15,HKK18], etc. Interestingly enough however, the adequacy of the developed categorical constructs with reversible functional programming languages has been seldom studied. For instance, if Kaarsgaard et al. [KAG17] mention Theseus as a potential use-case, they do not discuss it in details. ...

Reversible Effects as Inverse Arrows

Electronic Notes in Theoretical Computer Science

... For this reason, Graham's decomposition does not preserve the simple complex structure of the measurement scenario. As obtained in Ref. [30], being acyclic induces morphisms -there linked with simplification of the object -from the terminal object of the category of empirical models. ...

Categories of Empirical Models

Electronic Proceedings in Theoretical Computer Science