
Briefing
The core problem addressed is the vulnerability of existing Proofs of Quantumness (PoQ) schemes, where a malicious classical verifier can exploit a quantum prover’s interaction to extract secrets and solve classically intractable problems like factoring. The breakthrough is the formalization and construction of Zero-Knowledge Proofs of Quantumness (ZKPoQ) , which introduces a new zero-knowledge property enforced on the verifier’s side, regulating their behavior to be honest-but-curious. This mechanism, typically realized by compiling PoQ schemes with an extractable Non-Interactive Zero-Knowledge (NIZK) argument for the verifier, fundamentally ensures that a classical verifier cannot gain any information beyond the confirmation of the system’s quantum capability, establishing a trustable foundation for secure quantum-as-a-service models.

Context
Prior to this research, the established paradigm of Proofs of Quantumness (PoQ) focused on proving a system’s quantum capabilities, yet it suffered from a critical theoretical limitation ∞ the security only held against a classical adversary who did not interact maliciously with the quantum prover. This left a significant vulnerability where a malicious classical verifier could employ specific interactive strategies to extract the quantum prover’s secret state, thereby solving the underlying hard problem, such as factoring or Learning With Errors (LWE), that the quantum computer was meant to solve. This deficiency effectively turned the proof system into an oracle for solving classically intractable problems, compromising the quantum system’s integrity.

Analysis
ZKPoQ achieves its enhanced security by inverting the traditional application of zero-knowledge. The core mechanism requires the classical verifier to participate in a classical zero-knowledge argument, specifically an extractable NIZK argument, instead of requiring the quantum prover to generate a ZKP to protect their secret. This dual-role participation ensures that the information communicated by the verifier can be perfectly simulated by a classical probabilistic prover.
The verifier gains no exploitable information about the quantum prover’s state. The transformation compiles existing PoQ schemes, including the factoring-based and LWE-based ones, by adding this verifier-side cryptographic constraint, thereby achieving computational zero-knowledge for the verifier.

Parameters
- Core Security Property ∞ Computational Zero-Knowledge (Ensures the verifier learns nothing exploitable beyond the quantum claim’s truth.)
- Transformation Tool ∞ Extractable NIZK Argument (The classical zero-knowledge proof used on the verifier’s side to enforce the ZK property.)
- Targeted Schemes ∞ Factoring-Based and LWE-Based PoQ (Two mainstream PoQ schemes successfully transformed into ZKPoQ.)

Outlook
This foundational work opens a new research avenue for securing the emerging field of quantum-as-a-service and decentralized quantum computing networks. Future research will focus on optimizing the efficiency of the verifier-side NIZK arguments to reduce computational overhead and exploring ZKPoQ’s application in building verifiable quantum randomness beacons and certified quantum-resistant cryptographic services. Within five years, this framework could become the standard for establishing trust in any system claiming to utilize quantum advantage, ensuring that the quantum capability itself is not a security liability but a verifiably secure resource.

Verdict
The formalization of Zero-Knowledge Proofs of Quantumness establishes a necessary, robust security foundation for the future architecture of trustable quantum-classical hybrid systems.
