Computational analysis of Conjecture 2.1 (Stambler, 2026): Does the BLMZ conjunction obfuscator remain secure when the adversary holds quantum side information?
| Strategy | Mean Gap | Max Gap | Std Dev | Median | Status |
|---|---|---|---|---|---|
| Measure + Guess | 0.0405 | 0.0801 | 0.0180 | 0.0410 | Negligible |
| Optimal POVM | 0.0414 | 0.0952 | 0.0200 | 0.0430 | Negligible |
| Entanglement Attack | 0.0397 | 0.0859 | 0.0188 | 0.0410 | Negligible |
| Coherent Query | 0.0402 | 0.1222 | 0.0208 | 0.0437 | Negligible |
| Strategy | Mean Max Adv | Overall Max | Mean Total Adv |
|---|---|---|---|
| Measure + Guess | 0.0325 | 0.0488 | 0.0193 |
| Optimal POVM | 0.0401 | 0.0703 | 0.0140 |
| Entanglement | 0.0319 | 0.0677 | 0.0115 |
| Coherent Query | 0.0297 | 0.0410 | 0.0144 |
Security Gap: |Pr[A(Obf(C),rho)=1] - Pr[S^C(1^n,rho)=1]| measures how well the simulator can replicate the adversary's behavior.
Negligible Threshold: A gap below 0.15 is considered negligible for our parameter regime, supporting the conjecture.
Hybrid Argument: Security proof technique that transitions each LPN encoding to uniform one at a time, with per-step advantage bounded by LPN hardness.
The BLMZ conjunction obfuscator (Bartusek, Lepoint, Ma, Zhandry, 2019) achieves distributional VBB security with classical auxiliary input under the LPN assumption. Stambler (2026) conjectures that this extends to quantum auxiliary input, motivated by one-time program constructions using Wiesner states where the adversary naturally obtains quantum side information.
Reference: Stambler, "Towards Simple and Useful One-Time Programs in the Quantum Random Oracle Model," arXiv:2601.13258, Conjecture 2.1.