--- license: mit --- ๐Ÿงฌ QDNA-ID โ€” Quantum Device Native Authentication **Developed by:** Osamah N. Neamah **Institution:** Department of Mechatronic Engineering, Graduate Institute, Karabuk University, Karabuk, Turkey. > A quantum provenance dashboard that links physical device behavior > to cryptographically verifiable, signed fingerprints. > **A complete trust chain connecting physical quantum behavior to digital verification.** > **The code shown here is a simplified V0 example only and does not represent the exact workings. The dataset shown is the same data used for the Proof-of-Concept tests.** --- ## Citation If you use QDNA-ID in your research, please cite: **QDNA-ID: Quantum Device Native Authentication**, http://arxiv.org/abs/2511.17692. ---- ## ๐Ÿง  Project Overview **QDNA-ID** introduces a *quantum provenance* framework that couples quantum hardware behavior with digitally verifiable cryptographic records. Each quantum execution generates a **fingerprint** that is: 1. **Measured** on a *real* IBM Quantum device. 2. **Characterized** by quantum-mechanical metrics (e.g., CHSH S-value). 3. **Encoded** into a deterministic feature vector. 4. **Digitally signed & timestamped** using HMAC-SHA256 and RSA-PSS-SHA256. 5. **Stored and verifiable** as a reproducible provenance record. This provides **a measurable and cryptographically sealed identity** for each quantum device run โ€” bridging *physical* quantum entropy with *digital* cryptographic trust. --- ## ๐Ÿงฉ Key Features - โœ… **Hardware-based measurement** (no simulators; tested on real IBM Quantum devices). - ๐Ÿ” **Dual cryptographic signatures** โ€” HMAC-SHA256 (symmetric) & RSA-PSS-SHA256 (asymmetric). - ๐Ÿ“ˆ **CHSH-S Quantum Verification** โ€” non-classical correlation score (โ‰ฅ 2.0 required). - ๐Ÿงพ **Provenance Metadata** โ€” full environment capture: runtime versions, device ID, timestamps. - ๐Ÿงฎ **Feature Extraction** โ€” converts raw counts to structured quantum fingerprints. - ๐Ÿ—ƒ๏ธ **Hierarchical Storage** โ€” qdna_sessions// โ”œโ”€โ”€ _raw.json โ”œโ”€โ”€ _features.json โ””โ”€โ”€ _sign.json ruby Copy code - ๐ŸŒ **Streamlit Dashboard** โ€” live display of CHSH metrics, signatures, and device provenance. --- ## ๐Ÿงช Technical Stack | Layer | Technology | Purpose | |:------|:------------|:--------| | Quantum Execution | [Qiskit](https://qiskit.org/) | Circuit transpilation and IBM backend interface | | Runtime | `qiskit_ibm_runtime.SamplerV2` | Hardware job submission | | Cryptography | `cryptography.hazmat` | HMAC & RSA (SHA-256) | | Visualization | `Streamlit` | Interactive provenance dashboard | | Storage | JSON + filesystem | Immutable provenance store | | Environment | Python โ‰ฅ 3.10 | Recommended for full reproducibility | --- ## โš™๏ธ Installation ```bash # Clone repository git clone https://github.com/osamah-nn/qDNA-ID.git cd qDNA-ID # (Optional) create environment python -m venv qdnaidex source qdnaidex/bin/activate # or .\qdnaidex\Scripts\activate on Windows # Install dependencies pip install -r qdna_id.yml Dependencies: qiskit, qiskit-ibm-runtime, cryptography, numpy, streamlit, pandas ๐Ÿ”‘ Environment Configuration Before running, set cryptographic and IBM environment variables: Copy code IBM (Configure devices.py by your IBM Cloud ConfigurationS) # === Your static configuration (with ENV overrides allowed) === # Windows setx QISKIT_IBM_RUNTIME_API_TOKEN "Your API IBM TOKEN" # Linux export QISKIT_IBM_RUNTIME_API_TOKEN="Your API IBM TOKEN" ๐Ÿš€ Running a Quantum Session Run directly from command line: bash Copy code python challenge.py --backend ibm_torino --shots 1024 Output Example ini Copy code CHSH_S=2.39 RAW_FILE=qdna_sessions/ibm_kyiv/QDNAID20251017163045_raw.json FEATURES_FILE=qdna_sessions/ibm_kyiv/QDNAID20251017163045_features.json SIGN_FILE=qdna_sessions/ibm_kyiv/QDNAID20251017163045_sign.json Or start the dashboard: bash Copy code streamlit run app.py ๐Ÿ“Š Output Files File Description *_raw.json Original quantum counts + full provenance metadata *_features.json Extracted metrics including chsh_S *_sign.json Digital signatures (HMAC + RSA) + pubkey fingerprint ๐Ÿ”ฌ Quantum Provenance Workflow java Copy code Quantum Hardware โ†’ Counts โ†’ CHSH Verification โ†“ Feature Vectorization โ†“ Cryptographic Signing (HMAC + RSA) โ†“ Provenance Store (Immutable JSON) โ†“ Streamlit Dashboard / Verification API Each record forms a verifiable โ€œQDNA-IDโ€ chain, connecting physical behavior to digital authentication โ€” enabling reproducibility, security, and trust. ๐Ÿงพ Example Signatures Block json Copy code "signatures": { "hmac_sha256": "b4e9b1f...c74", "rsa_sha256_hex": "9d3b...1f", "algorithms": { "hmac": "HMAC-SHA256", "rsa": "RSA-PSS-SHA256" }, "key_ids": { "hmac": "dev-hmac-01", "rsa": "dev-rsa-01" }, "pubkey_fingerprint_sha256": "e3c0...9fa", "created_at_utc": "2025-10-17T15:23:12Z" } ๐Ÿงฎ Academic Context Discipline: Quantum Computing, Cryptography, Provenance Informatics Institution: Karabuk University Research Group: Quantum Provenance Initiative Lead Developer: Osamah N. Neamah This project serves as an academic Proof-of-Concept (PoC) โ€” demonstrating a full-chain quantum trust model from hardware to digital signature. โš ๏ธ License & Notice ยฉ 2025 QDNA-ID โ€” Academic PoC License This work is provided for academic and research use only. Unauthorized commercial use, redistribution, or derivative production is prohibited without explicit written consent from the author. ๐Ÿ“ฌ Contact Author: Osamah N. Neamah Institution: Karabuk University โ€” Quantum Provenance Initiative Email: osamannehme@gmail.com LinkedIn: linkedin.com/in/osamah-n-neamah-b2774118b Website: qdnaid.org (coming soon)