Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • Article
  • Published:

Uncloneable encryption from decoupling

Abstract

The laws of quantum physics mean that prominent classical cryptographic protocols can be broken using quantum computers, but they also permit security guarantees that are classically impossible. For example, quantum states cannot be cloned, which restricts the capabilities of any adversary. Here we show that uncloneable encryption exists with no computational assumptions, with security approaching the ideal value as an inverse-polynomial function of the security parameter. With this scheme, two non-interacting adversaries cannot both learn an encrypted message, even if they are both given the encryption key. Our proof uses the properties of a monogamy-of-entanglement game associated with the Haar measure encryption. Using this connection, we show that any state that succeeds with high probability cannot be close to being maximally entangled between the referee and either of the adversaries. The decoupling principle then implies that either adversary becomes completely uncorrelated and, therefore, cannot win significantly better than random guessing.

This is a preview of subscription content, access via your institution

Access options

Buy this article

USD 39.95

Prices may be subject to local taxes which are calculated during checkout

Fig. 1: Cloning attack against a QECM.
Fig. 2: Decoupling implies the existence of uncloneable encryption.

Similar content being viewed by others

Data availability

No datasets were generated during this study.

Code availability

No code was generated or used in the analysis and performance of this work.

References

  1. Park, J. L. The concept of transition in quantum mechanics. Found. Phys. 1, 23–33 (1970).

    Article  ADS  Google Scholar 

  2. Wootters, W. K. & Zurek, W. H. A single quantum cannot be cloned. Nature 299, 802–803 (1982).

    Article  ADS  Google Scholar 

  3. Dieks, D. Communication by EPR devices. Phys. Lett. A 92, 271–272 (1982).

    Article  ADS  Google Scholar 

  4. Bennett, C. H. & Brassard, G. Quantum cryptography: public key distribution and coin tossing. In Proc. International Conference on Computers, Systems and Signal Processing, 175–179 (1984).

  5. Wiesner, S. Conjugate coding. ACM SIGACT News 15, 78–88 (1983).

    Article  Google Scholar 

  6. Broadbent, A. & Lord, S. Uncloneable quantum encryption via oracles. In Proc. 15th Conference on the Theory of Quantum Computation, Communication and Cryptography—TQC 2020, 4–1422 (2020).

  7. Ananth, P., Kaleoglu, F., Li, X., Liu, Q. & Zhandry, M. On the feasibility of unclonable encryption, and more. In Proc. Advances in Cryptology—CRYPTO 2022, 2, 212–241 (2022).

  8. Ananth, P., Kaleoglu, F. & Liu, Q. Cloning games: a general framework for unclonable primitives. In Proc. Advances in Cryptology—CRYPTO 2023, 5, 66–98 (2023).

  9. Chevalier, C., Hermouet, P. & Vu, Q.-H. Towards unclonable cryptography in the plain model. Preprint at http://arxiv.org/abs/2311.16663 (2024).

  10. Ananth, P. & Behera, A. A modular approach to unclonable cryptography. In Proc. Advances in Cryptology—CRYPTO 2024, 7, 3–37 (2024).

  11. Botteron, P. et al. Towards unconditional uncloneable encryption. Preprint at http://arxiv.org/abs/2410.23064 (2024).

  12. Majenz, C., Schaffner, C. & Tahmasbi, M. Limitations on uncloneable encryption and simultaneous one-way-to-hiding. Preprint at https://arxiv.org/abs/2103.14510 (2021).

  13. Tomamichel, M., Fehr, S., Kaniewski, J. & Wehner, S. A monogamy-of-entanglement game with applications to device-independent quantum cryptography. New J. Phys. 15, 103002 (2013).

    Article  ADS  MathSciNet  Google Scholar 

  14. Hiroka, T., Kitagawa, F., Nishimaki, R. & Yamakawa, T. Robust combiners and universal constructions for quantum cryptography. In Proc. Theory of Cryptography Conference, 126–158 (Springer, 2024).

  15. Ananth, P. & Kaleoglu, F. Unclonable encryption, revisited. In Proc. 18th Theory of Cryptography Conference—TCC 2021, 1, 299–329 (2021).

  16. Aaronson, S., Liu, J., Liu, Q., Zhandry, M. & Zhang, R. New approaches for quantum copy-protection. In Proc. Advances in Cryptology—CRYPTO 2021, 1, 526–555 (2021).

  17. Coladangelo, A., Liu, J., Liu, Q. & Zhandry, M. Hidden cosets and applications to unclonable cryptography. In Proc. Advances in Cryptology—CRYPTO 2021, 1, 556–584 (2021).

  18. Coladangelo, A., Majenz, C. & Poremba, A. Quantum copy-protection of compute-and-compare programs in the quantum random oracle model. Quantum 8, 1330 (2024).

    Article  Google Scholar 

  19. Ananth, P. & La Placa, R. L. Secure software leasing. In Proc. Advances in Cryptology—EUROCRYPT 2021, 2, 501–530 (2021).

  20. Broadbent, A., Jeffery, S., Lord, S., Podder, S. & Sundaram, A. Secure software leasing without assumptions. In Proc. 18th Theory of Cryptography Conference—TCC 2021, 1, 90–120 (2021).

  21. Kitagawa, F., Nishimaki, R. & Yamakawa, T. Secure software leasing from standard assumptions. In Proc. 18th Theory of Cryptography Conference—TCC 2021, 31–61 (Springer, 2021).

  22. Mehta, A. & Müller, A. Unclonable functional encryption. Preprint at http://arxiv.org/abs/2410.06029 (2024).

  23. Georgiou, M. & Zhandry, M. Unclonable decryption keys. Preprint at Cryptology ePrint Archive http://eprint.iacr.org/2020/877 (2020).

  24. Sattath, O. & Wyborski, S. Uncloneable decryptors from quantum copy-protection. Preprint at http://arxiv.org/abs/2203.05866 (2022).

  25. Jawale, R. & Khurana, D. Unclonable non-interactive zero-knowledge. In Proc. International Conference on the Theory and Application of Cryptology and Information Security, 94–128 (Springer, 2025).

  26. Bhattacharyya, A. & Culf, E. Uncloneable encryption from decoupling. Preprint at http://arxiv.org/pdf/2503.19125 (2025).

  27. Poremba, A., Ragavan, S. & Vaikuntanathan, V. Cloning games, black holes and cryptography. Preprint at http://arxiv.org/abs/2411.04730 (2024).

  28. Terhal, B. M. Is entanglement monogamous? IBM J. Res. Dev. 48, 71–78 (2004).

    Article  Google Scholar 

  29. Culf, E. Quantum Uncloneability Games and Applications to Cryptography. Master’s thesis, Univ. Ottawa (2022).

  30. Culf, E. & Vidick, T. A monogamy-of-entanglement game for subspace coset states. Quantum 6, 791 (2022).

    Article  Google Scholar 

  31. Culf, E., Vidick, T. & Albert, V. V. Group coset monogamy games and an application to device-independent continuous-variable QKD. Preprint at http://arxiv.org/abs/2212.03935 (2022).

  32. Johnston, N., Mittal, R., Russo, V. & Watrous, J. Extended non-local games and monogamy-of-entanglement games. Proc. R. Soc. Lond. Ser. A 472, 20160003 (2016).

    ADS  MathSciNet  Google Scholar 

  33. Schumacher, B. & Westmoreland, M. D. Approximate quantum error correction. Quantum Inf. Process. 1, 5–12 (2002).

    Article  ADS  MathSciNet  Google Scholar 

  34. Dupuis, F. The Decoupling Approach to Quantum Information Theory. PhD thesis, Univ. Montréal (2010).

  35. Hayden, P., Horodecki, M., Winter, A. & Yard, J. A decoupling approach to the quantum capacity. Open Syst. Inf. Dyn. 15, 7–19 (2008).

    Article  MathSciNet  Google Scholar 

  36. Majenz, C., Berta, M., Dupuis, F., Renner, R. & Christandl, M. Catalytic decoupling of quantum information. Phys. Rev. Lett. 118, 080503 (2017).

    Article  ADS  MathSciNet  Google Scholar 

  37. Alagic, G. & Majenz, C. Quantum non-malleability and authentication. In Proc. 14th Theory of Cryptography Conference—TCC 2017, 2, 310–341 (2017).

  38. Lancien, C. & Majenz, C. Weak approximate unitary designs and applications to quantum encryption. Quantum 4, 313 (2020).

    Article  Google Scholar 

  39. Dupuis, F., Berta, M., Wullschleger, J. & Renner, R. One-shot decoupling. Commun. Math. Phys. 328, 251–284 (2014).

    Article  ADS  MathSciNet  Google Scholar 

  40. Dankert, C., Cleve, R., Emerson, J. & Livine, E. Exact and approximate unitary 2-designs and their application to fidelity estimation. Phys. Rev. A 80, 012304 (2009).

    Article  ADS  Google Scholar 

  41. Cleve, R., Leung, D., Liu, L. & Wang, C. Near-linear constructions of exact unitary 2-designs. Quantum Inf. Comput. 16, 721–756 (2016).

    MathSciNet  Google Scholar 

Download references

Acknowledgements

We are grateful to A. Broadbent for insightful discussions and helpful comments on a draft of the paper. A.B. thanks D. Leung for teaching her about decoupling. E.C. thanks everyone with whom he has discussed the uncloneable encryption problem in depth: P. Botteron, S. Kundu, S. Lord, A. Mehta, I. Nechita, M. Nevins, C. Pellegrini, D. Rochette, H. Salmasian and W. Slofstra. Research at the Perimeter Institute is supported in part by the Government of Canada through the Department of Innovation, Science, and Economic Development Canada and by the Province of Ontario through the Ministry of Colleges and Universities. E.C. is supported by a CGS D scholarship from NSERC.

Author information

Authors and Affiliations

Authors

Contributions

Both authors contributed equally to all aspects of this article and to the writing of the paper.

Corresponding authors

Correspondence to Archishna Bhattacharyya or Eric Culf.

Ethics declarations

Competing interests

The authors declare no competing interests.

Peer review

Peer review information

Nature Physics thanks Prabhanjan Ananth, Henry Yuen and the other, anonymous, reviewer(s) for their contribution to the peer review of this work.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Supplementary Information

Technical preliminaries, technical lemmata and proofs of the main results.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhattacharyya, A., Culf, E. Uncloneable encryption from decoupling. Nat. Phys. 22, 315–318 (2026). https://doi.org/10.1038/s41567-025-03154-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Version of record:

  • Issue date:

  • DOI: https://doi.org/10.1038/s41567-025-03154-7

Search

Quick links

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics