๐งฌ QDNA-ID โ Quantum Device Native Authentication
Developed by: Osamah N. Neamah
Institution: Department of Mechatronic Engineering, Graduate Institute, Karabuk University, Karabuk, Turkey.
A quantum provenance dashboard that links physical device behavior
to cryptographically verifiable, signed fingerprints.
A complete trust chain connecting physical quantum behavior to digital verification. The code shown here is a simplified V0 example only and does not represent the exact workings. The dataset shown is the same data used for the Proof-of-Concept tests.
Citation
If you use QDNA-ID in your research, please cite:
QDNA-ID: Quantum Device Native Authentication, http://arxiv.org/abs/2511.17692.
๐ง Project Overview
QDNA-ID introduces a quantum provenance framework that couples quantum hardware behavior with
digitally verifiable cryptographic records. Each quantum execution generates a fingerprint that is:
- Measured on a real IBM Quantum device.
- Characterized by quantum-mechanical metrics (e.g., CHSH S-value).
- Encoded into a deterministic feature vector.
- Digitally signed & timestamped using HMAC-SHA256 and RSA-PSS-SHA256.
- Stored and verifiable as a reproducible provenance record.
This provides a measurable and cryptographically sealed identity for each quantum device run โ
bridging physical quantum entropy with digital cryptographic trust.
๐งฉ Key Features
- โ Hardware-based measurement (no simulators; tested on real IBM Quantum devices).
- ๐ Dual cryptographic signatures โ HMAC-SHA256 (symmetric) & RSA-PSS-SHA256 (asymmetric).
- ๐ CHSH-S Quantum Verification โ non-classical correlation score (โฅ 2.0 required).
- ๐งพ Provenance Metadata โ full environment capture: runtime versions, device ID, timestamps.
- ๐งฎ Feature Extraction โ converts raw counts to structured quantum fingerprints.
- ๐๏ธ Hierarchical Storage โ
qdna_sessions// โโโ _raw.json โโโ _features.json โโโ _sign.json
ruby Copy code
- ๐ Streamlit Dashboard โ live display of CHSH metrics, signatures, and device provenance.
๐งช Technical Stack
| Layer | Technology | Purpose |
|---|---|---|
| Quantum Execution | Qiskit | Circuit transpilation and IBM backend interface |
| Runtime | qiskit_ibm_runtime.SamplerV2 |
Hardware job submission |
| Cryptography | cryptography.hazmat |
HMAC & RSA (SHA-256) |
| Visualization | Streamlit |
Interactive provenance dashboard |
| Storage | JSON + filesystem | Immutable provenance store |
| Environment | Python โฅ 3.10 | Recommended for full reproducibility |
โ๏ธ Installation
# Clone repository
git clone https://github.com/osamah-nn/qDNA-ID.git
cd qDNA-ID
# (Optional) create environment
python -m venv qdnaidex
source qdnaidex/bin/activate # or .\qdnaidex\Scripts\activate on Windows
# Install dependencies
pip install -r qdna_id.yml
Dependencies:
qiskit, qiskit-ibm-runtime, cryptography, numpy, streamlit, pandas
๐ Environment Configuration
Before running, set cryptographic and IBM environment variables:
Copy code
IBM (Configure devices.py by your IBM Cloud ConfigurationS)
# === Your static configuration (with ENV overrides allowed) ===
# Windows
setx QISKIT_IBM_RUNTIME_API_TOKEN "Your API IBM TOKEN"
# Linux
export QISKIT_IBM_RUNTIME_API_TOKEN="Your API IBM TOKEN"
๐ Running a Quantum Session
Run directly from command line:
bash
Copy code
python challenge.py --backend ibm_torino --shots 1024
Output Example
ini
Copy code
CHSH_S=2.39
RAW_FILE=qdna_sessions/ibm_kyiv/QDNAID20251017163045_raw.json
FEATURES_FILE=qdna_sessions/ibm_kyiv/QDNAID20251017163045_features.json
SIGN_FILE=qdna_sessions/ibm_kyiv/QDNAID20251017163045_sign.json
Or start the dashboard:
bash
Copy code
streamlit run app.py
๐ Output Files
File Description
*_raw.json Original quantum counts + full provenance metadata
*_features.json Extracted metrics including chsh_S
*_sign.json Digital signatures (HMAC + RSA) + pubkey fingerprint
๐ฌ Quantum Provenance Workflow
java
Copy code
Quantum Hardware โ Counts โ CHSH Verification
โ
Feature Vectorization
โ
Cryptographic Signing (HMAC + RSA)
โ
Provenance Store (Immutable JSON)
โ
Streamlit Dashboard / Verification API
Each record forms a verifiable โQDNA-IDโ chain, connecting physical behavior
to digital authentication โ enabling reproducibility, security, and trust.
๐งพ Example Signatures Block
json
Copy code
"signatures": {
"hmac_sha256": "b4e9b1f...c74",
"rsa_sha256_hex": "9d3b...1f",
"algorithms": {
"hmac": "HMAC-SHA256",
"rsa": "RSA-PSS-SHA256"
},
"key_ids": {
"hmac": "dev-hmac-01",
"rsa": "dev-rsa-01"
},
"pubkey_fingerprint_sha256": "e3c0...9fa",
"created_at_utc": "2025-10-17T15:23:12Z"
}
๐งฎ Academic Context
Discipline: Quantum Computing, Cryptography, Provenance Informatics
Institution: Karabuk University
Research Group: Quantum Provenance Initiative
Lead Developer: Osamah N. Neamah
This project serves as an academic Proof-of-Concept (PoC) โ demonstrating a full-chain
quantum trust model from hardware to digital signature.
โ ๏ธ License & Notice
ยฉ 2025 QDNA-ID โ Academic PoC License
This work is provided for academic and research use only.
Unauthorized commercial use, redistribution, or derivative production is prohibited
without explicit written consent from the author.
๐ฌ Contact
Author: Osamah N. Neamah
Institution: Karabuk University โ Quantum Provenance Initiative
Email: [email protected]
LinkedIn: linkedin.com/in/osamah-n-neamah-b2774118b
Website: qdnaid.org (coming soon)