Apoth3osis
<_RESEARCH/QUANTUM_CRYPTOGRAPHY

Constructor-Theoretic Crypto Program

VERIFIED3 PHASES92 MODULES3,200+ THEOREMS0 SORRY4 MENTAT CERTS

The Central Question

Can cryptographic security be derived from the laws of physics rather than from computational hardness assumptions? Constructor Theory says yes: if cloning the full quantum state is physically impossible, then eavesdropping is physically impossible — regardless of the adversary's computational power. This makes QKD security immune to algorithmic breakthroughs, including quantum computers.

Original Researchers

David Deutsch
Visiting Professor, University of Oxford
Pioneer of quantum computation. Deutsch-Jozsa algorithm. Co-creator of Constructor Theory. Fellow of the Royal Society.
Chiara Marletto
Research Fellow, University of Oxford
Co-creator of Constructor Theory. Pioneer of information-theoretic foundations bridging physics and computation. Author of "The Science of Can and Can't."

Scientific Context

Traditional cryptographic security relies on computational hardness: "breaking this requires solving a problem believed to be hard." Constructor Theory provides a fundamentally stronger guarantee: security from physical impossibility. The adversary doesn't just lack an efficient algorithm — the required operation violates physical law.

The core chain: Kochen-Specker contextuality → no hidden variables → physical impossibility of global sections → superinformation (X clonable, Y clonable, XY NOT clonable) → eavesdropping requires cloning XY → eavesdropping is physically impossible.

What formalization provides: Every step in this chain is machine-checked. The CHSH inequality proves no local hidden variable model can produce quantum correlations. The Tsirelson bound establishes the quantum limit. BB84 and E91 are proved secure as instantiations of the general superinformation security theorem. Composable security ensures protocols remain safe when used as subroutines.

Project Phases

PHASE 1VERIFIEDLean 4 Formal Proofs

Complete formalization across 92 modules: CT core framework, constructive hardness, BB84/E91 QKD protocols, CHSH/Tsirelson bounds, composable security, QEC, entropy/privacy amplification, and photoemission physics bridge.

  • chsh_inequality: |S| ≤ 2 for LHV models
  • tsirelson_bound: |S| ≤ 2√2 for quantum strategies
  • bb84_secure + e91_secure: eavesdropping CT-impossible
  • superinfo_secure_against_eavesdropping: core theorem
PHASE 2VERIFIEDC & Rust Transpilation

Faithful translation to verified C (gcc -Wall -Wextra -Werror: 0 warnings) and safe Rust (cargo test: 13/13 pass). CT core, CHSH bounds, and QKD security proofs translated.

  • gcc -std=c11 -Wall -Wextra -Werror: PASS
  • cargo build: 0 warnings
  • cargo test: 13/13 pass
  • All 16 deterministic LHV states verified bounded
PHASE 3PENDINGIPFS Permanent Storage

All artifacts content-addressed and pinned to IPFS. Lean proofs, verified C, safe Rust archives with CIDv1 identifiers.

  • Lean archive: 10 key files (7.9KB)
  • C archive: 3 translation units (3.1KB)
  • Rust archive: 5 source files + Cargo.toml (3.2KB)
  • SHA-256 content hashes for all archives

MENTAT Contribution Certificates

MENTAT-CA-003|MCR-CTC-001
2024-01-01

MENTAT Contribution Record

IDEA

Conceptual Contribution

CONTRIBUTION LEVEL: IDEA

Ontological Engineer

Constructor Theory: Security from Physical Impossibility

Contributor

David Deutsch, Chiara Marletto

University of Oxford

Core conceptual insight: cryptographic security can be derived from the physical impossibility of certain transformations (no-cloning), rather than from computational hardness assumptions. Constructor Theory reformulates physics in terms of possible and impossible tasks, providing a substrate for information-theoretic security proofs that are immune to algorithmic breakthroughs.

MENTAT · Mesh-Encrypted Network for Trusted Autonomous TransactionsImmutable · Content-Addressed · Tamper-Proof
MENTAT-CA-003|MCR-CTC-002
2024-01-01

MENTAT Contribution Record

THEORY

Mathematical Foundation

CONTRIBUTION LEVEL: THEORY

Ontological Engineer

Complete CT Framework: Tasks, Information Variables, Composable Security

Contributor

David Deutsch, Chiara Marletto

University of Oxford

Full mathematical framework: (1) Substrate-agnostic task algebra with serial and parallel composition, (2) Information variables with pairwise-disjoint attributes, (3) Superinformation media with copy tasks and no-copy proofs, (4) Eavesdropping strategies with soundness conditions, (5) UC-style composable security via CompositionKit interface, (6) Entropy bounds and privacy amplification.

Builds Upon

MCR-CTC-001
MENTAT · Mesh-Encrypted Network for Trusted Autonomous TransactionsImmutable · Content-Addressed · Tamper-Proof
MENTAT-CA-003|MCR-CTC-003
2026-03-13

MENTAT Contribution Record

PROOF

Formally Verified

CONTRIBUTION LEVEL: PROOF

Lean 4 Formalization — 92 Modules, 3200+ Theorems, 0 Sorry

Contributor

Apoth3osis Labs

R&D Division

Machine-checked Lean 4 formalization of the complete CT cryptographic framework. 92 modules across 8 layers: CT core, constructive hardness, BB84/E91 QKD protocols, CHSH/Tsirelson bounds, composable security, quantum error correction, entropy/privacy amplification, and photoemission physics bridge. All theorems proved without sorry/admit using kernel-only axioms.

Builds Upon

MCR-CTC-001MCR-CTC-002
MENTAT · Mesh-Encrypted Network for Trusted Autonomous TransactionsImmutable · Content-Addressed · Tamper-Proof
MENTAT-CA-003|MCR-CTC-004
2026-03-13

MENTAT Contribution Record

KERNEL

Computationally Verified

CONTRIBUTION LEVEL: KERNEL

CT Crypto Verified Kernel — C & Rust Transpilation

Contributor

Apoth3osis Labs

R&D Division

Verified C and safe Rust transpilations of the core CT cryptographic modules. C: gcc -std=c11 -Wall -Wextra -Werror, 0 warnings per translation unit. Rust: cargo build 0 warnings, cargo test 13/13 pass. CT core framework, CHSH/Tsirelson bound verification, and QKD security proofs faithfully translated.

Builds Upon

MCR-CTC-003
MENTAT · Mesh-Encrypted Network for Trusted Autonomous TransactionsImmutable · Content-Addressed · Tamper-Proof

Governed by MENTAT-CA-001 v1.0 · March 2026