arXiv:1812.05839v1 [cs.OH] 14 Dec 2018 ss ie n wth hth ok le.H ok scared. Man: but looks The 40, whisper: He older. than a looks less in he and speaks that more old He twitchy in years and tired face 30 In so man’s than candle. is the more a see is light now He to can detail. match we and burning light lit flickering He the is the uses match. match now Another blows the Again. man and holding Again. the match... Again. is another and again. lights while who out He short it man, match. a a the a for of out of flickers blows sound face flame The the The engine. lit. revels an is of that hum match background faint The DARKNESS — BOX INT. eeto htmgtaatu foewr bet ul such build to to Mirror able Black were one of many-worlds. if episode us the new technology. await a of a might of actually what and plot-line on or devices, the reflect world, up security the set other futur We their of and choose codes king sense break a become lottery, in prefer could the their quantum they?) win exploit (or into one could collapse then man and state, a synchronize of to “copies” interference different the if and unu uepsto o utt unu isi the in bits quantum su “objects”, to everyday Schr macroscopic as just to also but not microscopic superposition quantum Abstract aymn ie,adIwn n ul etrbox, many better a times, built many I And ticket won. one I ticket, and bought one times, many bought I many and bucks. box 5 the Too for used expensive. that’s I I apiece, winning, But bucks at less. expensive. chance 5 real even At buy a to tickets. have or is to many chances billion, really your tickets, a increase to many in way only one the Odds mean, you... it. next win against thought: Let’s comes I are impressive. course! What looks of megajackpot more. Money, the wanted right! You’re I sex? up. after child’s warm just was a that But play, list. bucket the off one Another chuckles) in physically, (He hurt, really too... stomach) do here goofy they here, they few oh a and here, me, while, glitches... a trust technical me hurt, some took I also so It but HR, her. from moments with Nancy out fancied Clumsily, it always times. tried had of I couple say. a must I box know. I the you used me, already The still others. had are The they others. technically the hey, it of others... are one Chances but mean. me I really box, wasn’t the entered I When myself. dne’ a rahmnbig fta eepossible, were that If being? human a or cat odinger’s ¨ Wa fsmoebita“o”ta applies that “box” a built someone if —What o’ vnrmme hnIfis boxed first I when remember even don’t I u hnIfudtergtpt ohrheart her to path right the found I then but igsCleeLondon College King’s .P I. el o o e er..hrbedroom. her heart... her not no, well, ROLOGUE eateto Informatics of Department [email protected] uaVigan`oLuca H onst ed er and heart head, to points (He T : HE B odn UK London, , Schr OX dne’ Man odinger’s ¨ red ch e, eo orsd hti ol ul h o and box the build could I if will what chances — enough, side make your make you on can’t living if be you each — but possibilities copies himself, infinite infinite or the could of her with being one not of human out why that copies cat, if multiple a what with make And it being? do human could dog a one his if thought: And I the feet. in his caaat the at booox”. “puuut snoozing Schr¨odinger’s ear: as in called is whispers cartoon cat and, the a his lab on couch, cartoon, sleeping And my this browsing. is Schr¨odinger upon was in Dog”. “Schr¨odinger’s I stumbled was sir. I no I then working, wasn’t vividly. I it usual, remember do they I F***, another. to one it overlap! with apply different overlap the actually do in can states universes the you second, and I First, objects, And I. everyday wrong! I. was Schr¨odinger it. that discovered out turns another. it one Well, that with universes and overlap different alive in never exist both will cats is both cat that and the dead, that wide states a worlds” which spawned “many hypothesis, has the including This interpretations, dead. in of alive, variety states are: existed the case And cat this simultaneously. one the states in no possible occurred, is its of there what all As witness dead. to AND around both Alive simultaneously dead. is that cat and the argued Schr¨odinger alive that opened the happen, is chance not, box equal not the If an will before is cat. or there will the Since this the kill hurt. break be and will won’t poison, cat which the hammer, measure release will the counter trigger vial, Geiger thus the the and of then the it does, course that it the chance If over 50/50 hour. decay a will connected there’s element hammer Now, radioactive a measuring counter. and counter the box Geiger For to the a box. in poison, a radioactivity deadly the inside element, of radioactive longer. sealed a vial little is contains a also a that box for cat The hour. me a one with cat, Bear a know, explain. I There’s you, me boring let Copenhagen am but the I every- Da-di-da-di-da, of to objects. applied problem day metaphor. mechanics a nice quantum a of illustrate interpretation is back to it experiment, a 1935, as thought really that in a not it is as call it it to all, devised Schr¨odinger A like of things. I First of But this. box. lot like a works do box The can you things. box, Of... lot. better a with and igsCleeLondon College King’s [email protected] eateto Informatics of Department H chuckles) (He ig Sempreboni Diego tgt eeeytm!Adthen And time! every me gets It odn UK London, , make many many many copies of myself and of the completely new and different? If it’s not, at what point did lonely 5 bucks bill in my pocket, and what if each of it stop being the same ship?2 us bought a lottery ticket, and what if one of us won? This paradox is one of the cornerstones of the meta- You would only need a way for all the copies to talk physics of identity and it had been discussed by other an- with each other, measure the different states they are cient philosophers prior to Plutarch, most notably Heraclitus in, and if one of them is in the winning state, then and Plato, and was addressed more recently by Thomas he simply synchronizes with the others and they all Hobbes and John Locke. In fact, about 1500 years after “kill themselves” (He mimes the air quotes with his Plutarch, Thomas Hobbes doubled-down by asking: if one hands) by collapsing all into that state, the winning were to take all the old parts removed from the Ship of state. Seems impossible, doesn’t it? Well, I found a Theseus and exploited a newly developed technology to way. And now I am rich, and can have anything I cure their rotting and enable them to be put back together want. I am invincible. I am the king of the world. I to make a new ship from them, then which of the two am the king of the WORLDS. Or so I thought. But ships is the real Ship of Theseus? What makes you and I was wrong. Stupid and wrong. They are out to get your childhood self the “same” person, despite a lifetime me. Help me, please. Help me! They are out to get of change, from your cells to your values? me! (The flame flickers and dies) Now, returning to our plot, we can ask: if our hero were We wrote this scene as the set-up of a future Black Mirror able to build a box that applies a generalized Hadamard episode in which someone has indeed managed to apply Gate3 not just to quantum bits in the microscopic (i.e., in quantum superposition to large everyday objects, including the sub-atomic) but also to “objects” in the macroscopic, human beings. If that were possible, and if the different such as a cat or a human being, would the “copies” that “copies” could really synchronize and all collapse into their result of the quantum superposition be the same object? preferred state, then one could indeed fairly predictably win Many scholars have worked on this question (and related the lottery, and do much much more. But what if a couple ones in the metaphysics of identity). One way to approach it of the copies decided to rebel and not to synchronize? What is to reason about whether the identity relation is a transitive if they wanted to live their own life? Would they have to relation or not. More formally, do A = B and B = C entail kill the master and all his other slave copies to be free? A = C? While all this is far from possible according to today’s If that is the case, i.e., if identity = is transitive, then science and technology, it is not utterly unimaginable, or at one can reason as follows. Since both ships can trace their least not much more than a spacecraft would have looked histories back to ship, we have that the restored to the eyes of a Neanderthal Man, who lived thousands of ship A claims to be identical to the original ship B (in years before Man built the Apollo 11 spaceflight to land on symbols, A = B) and so does the reconstructed ship C (in the moon. Let’s elaborate all this in more detail, shall we? symbols, C = B and thus B = C by commutativity of II. AGEDANKENEXPERIMENT identity, a property that we can safely assume, or that we can enforce by reformulating transitivity as: X = Z and The Russian physiologist Ivan Pavlov did indeed have a Y = Z entail X = Y ). It thus follows that the restored dog, but the French philosopher Jean Buridan didn’t actually ship A and the reconstructed ship C are also identical with have an ass, the French scholar Pierre-Simon Laplace didn’t each other (A = C), and are in fact a single ship existing actually have a demon and neither did the Scottish mathe- in two locations at the same time. matical physicist James Clerk Maxwell. And the Austrian On the other hand, if identity = is non-transitive, then physicist Erwin Schr¨odinger didn’t actually have a cat.1 A = B and B = C do not entail A = C, so the restored Schr¨odinger’s Cat is a Gedankenexperiment, i.e., a ship A and the reconstructed ship C are both identical to the thought experiment. It’s a purely hypothetical scenario original B, but they are not identical to each other (A 6= C). intended to consider some hypothesis, theory, or principle They are separate objects. for the purpose of thinking through its consequences; in Schr¨odinger’s case, to demonstrate the flaws in the Copen- hagen Interpretation model of quantum mechanics. 2Several variants of the paradox of the Ship of Theseus have been Thought experiments originated in philosophy and the formulated, including the Grandfather’s Axe, which has had both head and handle replaced, and even Trigger’s Broom in the classic TV series Greek philosopher Plutarch is renowned for one of the Only Fools and Horses [19], all ultimately asking whether an object that oldest ones: the Ship of Theseus [13], a ship that remained has had all of its components replaced remains fundamentally the same seaworthy for hundreds of years thanks to constant mainte- object or not. Also So Long, and Thanks For All the Fish, the fourth book of the trilogy The Hitchhiker’s Guide to the Galaxy, contains a variant: nance. As soon as one of the ship’s planks became old and Marvin the Paranoid Android says of himself: “Every part of me has been started to rot, it would be replaced, and so on until, after a replaced at least fifty times...” (except for the diodes down his left side, century or so, all the parts have been replaced. Is the end which hurt) [1]. 3In quantum information processing [7], [12], the quantum bit is usually product still the same Ship of Theseus, or is it something called qubit and the Hadamard Gate is a one-qubit rotation, mapping the qubit-basis states |0i and |1i to two superposition states with equal weight 1Actually, legend has it that Schr¨odinger had a pet cat named Milton of the computational basis states |0i and |1i. Several quantum algorithms at the home in Oxford that he was sharing with his legal wife and his use the Hadamard Gate as an initial step, since it maps n qubits initialized longtime mistress in 1935... Or, as some people would put it, Schr¨odinger with |0i to a superposition of all 2n orthogonal states in the |0i and |1i both did and didn’t have a cat, which both was and wasn’t named Milton. basis with equal weight. That is precisely the “tension” that underlies our plot: III. SCHRODINGER¨ ’S ATTACKER will the different “copies” be the same or not? Will they be We are aware that our plot-line echoes a number of happy to work together and collapse back into one copy as other works5, including in particular an episode of the soon as they have found their preferred state, or will actually manga Naruto, in which Naruto Uzumaki, an adolescent one (or more) of them develop a sense of individuality and ninja, trains using a special technique called “Shadow Clone prefer to continue living its own life? This life might be Technique”, which allows him to create copies of himself worse than that of the “preferred state” (e.g., the copy would and then merge the knowledge acquired by these copies not win the lottery), but it would be its own individual one. back into the original self [6]. Other related works of fiction And it would not end with the “quantum suicide” that the are the movies The One (in which a rogue multiverse agent collapse entails. goes on a manhunt for versions of himself, getting stronger Before we elaborate on this further, also to consider some with each kill [21]) and The Fly (in both versions of the consequences for security, let us observe that a fundamental movie, a scientist build a teleportation “box” that he tries on premise of our plot is that the different “copies” are able to himself, unfortunately without noticing that a fly has entered synchronize so that they can all collapse into their preferred the box as well, which results in a man/fly hybrid [11], state. To the end, they need to be able to communicate [5]), the novel All You Need Is Kill and the movie Edge of and evaluate the options in the different states, which is Tomorrow it inspired (in which a soldier fighting aliens gets something that we are very well aware is not really possible to relive the same day over and over again, the day restarting in quantum information processing, at least not to the extent every time he dies, until he learns how to continue fighting that our plot would require (but in this paper we are of without dying, [16], [9], similar to [14]) and the short film course on the thin edge between science and science fiction, One-Minute Time Machine [2]6, as well as movies/TV-series so please bear with us). In reality, superpositions can never like Spartacus [8], [4] or Land of the Dead [15], actually be observed. Rather, all that we can observe are in which slaves rebel against their master(s). There are the consequences of their existence, after individual waves also some connections with Black Mirror’s Be Right Back of a superposition interfere with each other. Thus, in “real” (S02E01), which centers around a technology that allows quantum information processing, we can never observe an to make artificial replicas of people. atom in its indeterminate state, or being in two places at There is, however, one interesting aspect that we could once, only the resulting consequences, and physical reality exploit to make our episode interesting and “unique”, is not determined until the act of measurement takes place namely the possible consequences for security and privacy. and “solidifies” the situation into one state or another. As is well-known, the security of most commonly used Using the lingo of quantum information processing public-key algorithms (such as RSA or Diffie-Hellman key (see [7], [12] as well as the short but very informative agreement) relies on mathematical problems that are, as webpage [20] from which we have taken some of the of the time of writing, hard to solve such as the integer explanations that we summarize here), any attempt to factorization problem, the discrete logarithm problem and measure or obtain knowledge of quantum superpositions the elliptic-curve discrete logarithm problem. However, all by the outside world causes them to decohere, effectively of these problems can be easily solved on a sufficiently destroying the superposition and reducing it to a single powerful quantum computer running Shor’s algorithm [17], location or state, and also destroying the ability of its thus resulting in the insecurity of the public-key algorithms individual states to interfere with each other. In other words, that are based on them. This has spawned post-quantum decoherence results in the collapse of the quantum wave cryptography, a new area of research that aims to devise function and the settling of a particle into its observed state cryptographic algorithms that are secure against an attack under classical physics; the particle undergoes a transition by a quantum computer [3], [10]. 4 from quantum to classical behavior. Our man could realize Shor’s algorithm in a physical For the sake of our plot, we assume that the builder of the sense or, much more simply, carry out parallel brute force box has been able not just to create copies of himself by attacks. For instance, Schr¨odinger’s attacker could attempt “extending” superposition to the macroscopic, but he has to discover the secret password or key of a system by having also been able to find a way to “extend” quantum inter- each “copy” try to out a different candidate password or ference by allowing the “copies” to communicate, evaluate key... if enough copies are created and they all work in the states they are in and decide into which of the many parallel (and communicate to ensure that they each try out different possible states, of the many different possible a different candidate), then the brute force attack would not worlds, they want to collapse. We are thus assuming that take billions of years like in the “classical” case but only superposition, interference, measuring and decoherence can the conceivably much smaller time needed for the initial become acts of consciousness. superposition to create a sufficiently large number of copies, 4 Decoherence is the main reason that quantum theory really only applies plus that for a copy to try out a candidate in parallel with the in practice to the sub-atomic world: in the large-scale world in which we live, it is (as far as know today) impossible to isolate anything from 5Although when we first came up with the plot-line we were not fully interaction with its environment, especially given the countless trillions of aware of these echoes, as is often the case in creative writing. photons bouncing off every object all the time. Even an object made of just 6In fact, quantum teleportation and quantum time travel might inspire 60 atoms requires extreme cold to prevent it from becoming “classical” a number of other Black-Mirror-style plot-lines, which we will leave for rather than “quantum” [20]. future editions of the “Re-coding Black Mirror” workshop. others, plus that for the copy that succeeds to communicate their “master” and his allies, as in our plot-line, which could with the others, plus that for the final collapse into the state have the following epilogue. in which the system has been successfully broken. IV. EPILOGUE:THE BOX Schr¨odinger’s attacker could carry out much more so- phisticated attacks. We lack space to discuss them in more INT. BOX — DARKNESS detail (especially since they would require also a summary The man lights the last match but it sizzles and dies right of the required background),but in a nutshell he could break away. Must have been wet. No matches are left. and the every system whose security is based on the fact that the candle flame is long out. Darkness again engulfs everything probability of successfully guessing a secret is infinitesimal. inside the box. The faint background hum of the engine goes Let us give one more example. on. In the darkness, it seems there is no way out. The Man’s Consider zero-knowledge protocols, which are protocols breathing becomes heavier and heavier — he is losing all in which one party (the prover Peggy) can prove to another hope. We just hear his voice, again in a whisper: party (the verifier Victor) that she knows a value x, without The Man: OK, calm down. Calm down! Shhh, calm down. conveying any information apart from the fact that she If only I could talk to one of them, one of me. Which knows the value x (see, e.g., [18]). The intuition underlying one am I? Or to him. Maybe he would know how to zero-knowledge protocols (a.k.a. zero-knowledge proofs) get me out of here. I don’t. can be explained by means of an allegorical story: Peggy Think. Think! There must be a way. No, there isn’t. has uncovered the secret word used to open a magic door The box is perfect, of course it is. My masterpiece. in a cave. The cave is shaped like a ring, with the entrance My demise. on one side and the magic door blocking the opposite side. Wait... wait... wait! Could it be? No, it can’t! Yes, it Victor wants to know whether Peggy knows the secret word, can! In the quantum realm, qubits have problems. Yes, but Peggy, of course, does not want to reveal her knowledge yes! Qubits are susceptible to errors. Think! First, heat. (the secret word) to Victor. She only wants to prove to Second, noise. Third, stray electromagnetic couplings. him that she knows the secret without him actually learning Is there another cause? There is, of course there is! it (hence, “zero-knowledge”). They thus label the left and Bit-flips!7 Bit-flips could be the solution to all my right paths from the entrance L and R. First, Victor waits problems! outside the cave as Peggy goes in. Peggy takes either path (Fade to white) L or R; Victor is not allowed to see which path she takes. Then, Victor enters the cave and shouts the name of the path he wants her to use to return, either L or R, chosen at REFERENCES random. Provided that Peggy really does know the magic [1] D. Adams. So Long, and Thanks For All the Fish. Pan Books, 1984. word, this is easy: she opens the door, if necessary, and [2] D. Avery (directed by). One-Minute Time Machine. www.imdb.com/title/tt3620860/ and returns along the desired path. However, suppose that Peggy www.youtube.com/watch?v=vBkBS4O3yvY. did not know the word. Then, she would only be able to [3] D. J. Bernstein and T. Lange. Post-quantum cryptography — dealing with the fallout of physics success. IACR Cryptology ePrint Archive, 2017:314, 2017. return by the named path if Victor were to give the name of [4] M. Crichton (directed by). Westworld, 1973. www.imdb.com/title/tt0070909/. the same path by which she had entered. Since Victor would [5] D. Cronenberg (directed by). The Fly, 1986. www.imdb.com/title/tt0091064/. [6] M. Kishimoto. A special training. In Naruto, chapter 315. Viz Media, 2006. choose L or R at random, Peggy would have a 50% chance www.mangapanda.com/naruto/315/7. of guessing correctly. If they repeat this “game” many times, [7] A. Kitaev, A. Shen, and M. Vyalyi. Classical and Quantum Computation. Cambridge University Press, 2000. Peggy’s chance of successfully anticipating all of Victor’s [8] S. Kubrick (directed by). Spartacus, 1960. www.imdb.com/title/tt0054331/. 1 [9] D. Liman (directed by). Edge Of Tomorrow, 2014. requests will become vanishingly small ( n where n is 2 www.imdb.com/title/tt1631867/. the number of times). Thus, if Peggy repeatedly appears [10] V. Mavroeidis, K. Vishi, M. D. Zych, and A. Jøsang. The Impact of Quantum at the exit Victor names, he can conclude that it is very Computing on Present Cryptography. arXiv preprint arXiv:1804.00200, 2018. [11] K. Neumann (directed by). The Fly, 1958. www.imdb.com/title/tt0051622/. reasonable that Peggy does in fact know the secret word [12] M. Nielsen and I. Chuang. Quantum Computation and Quantum Information. (she has “proved” that she knows the secret). Schr¨odinger’s Cambridge University Press, 2000. [13] Plutarch (Translated by John Dryden). Theseus. The Internet Classics Archive, attacker, who unlike Peggy does not know the secret word, classics.mit.edu/Plutarch/theseus.html. could simply create many worlds and focus only on those in [14] H. Ramis (directed by). Groundhog Day, 1993. www.imdb.com/title/tt0107048. which Victor asks him to exit from the path he (the attacker) [15] G. A. Romero (directed by). Land of the Dead, 2005. has entered, without having to open the door. www.imdb.com/title/tt0418819/. [16] H. Sakurazaka. All You Need Is Kill. Super Dash Bunko, 2004. As another example, just imagine the possibilities of [17] P. W. Shor. Polynomial-Time Algorithms for Prime Factorization and Dis- violating someone’s privacy by observing them in many dif- crete Logarithms on a Quantum Computer. SIAM Journal on Computing, 26:14841509, 1995. ferent worlds. There might even be attacks on secure multi- [18] N. P. Smart. Cryptography Made Simple. Springer, 2016. party computation algorithms, smart contracts, blockchains [19] J. Sullivan (created by). Only Fools and Horses..., 1981–2003. www.imdb.com/title/tt0081912/. and cryptocurrencies. [20] The Physics of the Universe. Quantum Superposition. How can we defend against Schr¨odinger’s attacker? Well, www.physicsoftheuniverse.com/topics quantum superposition.html. [21] J. Wong (directed by). The One, 2001. www.imdb.com/title/tt0267804/. how about creating Schrodinger’s¨ defender? One copy of a defender for each copy of the attacker? Or could we perhaps 7Qubits suffer from bit-flips (like classical bits) and from phase errors. enroll some of the copies of the attacker to defend against Direct inspection for errors should be avoided as it will cause the value their other copies? We would just need them to rebel against to collapse, leaving its superposition state.