Recognition: 2 theorem links
· Lean TheoremMAGIQ: A Post-Quantum Multi-Agentic AI Governance System with Provable Security
Pith reviewed 2026-05-11 01:05 UTC · model grok-4.3
The pith
MAGIQ provides a post-quantum framework for defining and enforcing policies in multi-agent AI systems with formal security proofs.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
MAGIQ allows users to define rich communication and access-control policy budgets for agent-to-agent sessions and tasks, including global budgets for one-to-many agent sessions. It enforces such policies using post-quantum cryptographic primitives, supports session-based enforcement for agent-to-agent and one-to-many agent sessions, and provides accountability of agents to their users through message attribution. The system is formally modeled and its correctness and security are proven using the Universal Composability framework. Performance evaluations compare its computation and communication overhead to the SAGA framework, positioning it as an initial step toward post-quantum secureagent
What carries the argument
The MAGIQ framework, which integrates policy budget definitions with novel quantum-resistant cryptographic protocols for enforcement and message attribution in multi-agent sessions.
If this is right
- Users gain the ability to impose global policy budgets across multiple agents in shared sessions.
- Policy enforcement occurs securely for both direct agent pairs and group interactions.
- Message attribution ensures agents remain accountable to their human owners.
- The overall system maintains provable security guarantees against quantum threats.
- Overhead remains comparable to existing frameworks while adding quantum resistance.
Where Pith is reading between the lines
- This could allow safer integration of AI agents into collaborative environments where policy violations carry high stakes.
- Future extensions might adapt the protocols for other distributed systems facing similar quantum risks.
- Testing in real-world multi-agent deployments could reveal practical scalability limits not covered in the initial evaluation.
- The formal UC proofs suggest potential for composing MAGIQ with other secure protocols in larger AI ecosystems.
Load-bearing premise
The proposed cryptographic protocols achieve high efficiency and quantum resistance while meeting the security properties established in the universal composability analysis.
What would settle it
A successful quantum algorithm that breaks one of the novel protocols or a concrete multi-agent scenario where an agent violates policies despite the enforcement mechanism would disprove the security claims.
Figures
read the original abstract
Our computing ecosystem is being transformed by two emerging paradigms: the increased deployment of agentic AI systems and advancements in quantum computing. With respect to agentic AI systems, one of the most critical problems is creating secure governing architectures that ensure agents follow their owners' communication and interaction policies and can be held accountable for the messages they exchange with other agents. With respect to quantum computing, existing systems must be retrofitted and new cryptographic mechanisms must be designed to ensure long-term security and quantum resistance. In fact, NIST recommends that standard public-key cryptographic algorithms, including RSA, Diffie-Hellman (DH), and elliptic-curve constructions (ECC), be deprecated starting in 2030 and disallowed after 2035. In this paper, we present MAGIQ, a framework for policy definition and enforcement in multi-agent AI systems using novel, highly efficient, quantum-resistant cryptographic protocols with proven security guarantees. MAGIQ (i) allows users to define rich communication and access-control policy budgets for agent-to-agent sessions and tasks, including global budgets for one-to-many agent sessions; (ii) enforces such policies using post-quantum cryptographic primitives; (iii) supports session-based enforcement of policies for agent-to-agent and one-to-many agent sessions; and (iv) provides accountability of agents to their users through message attribution. We formally model and prove the correctness and security of the system using the Universal Composability (UC) framework. We evaluate the computation and communication overhead of our framework and compare it with the state-of-the-art agentic AI framework SAGA. MAGIQ is a first step toward post-quantum-secure solutions for agentic AI systems.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces MAGIQ, a framework for defining and enforcing rich communication and access-control policy budgets (including global one-to-many budgets) in multi-agent AI systems. It uses novel post-quantum cryptographic primitives for enforcement, supports session-based policy application, provides message attribution for accountability, and claims formal correctness and security proofs in the Universal Composability (UC) framework. The work also reports computational and communication overhead evaluations compared to the SAGA baseline, positioning MAGIQ as an initial post-quantum secure governance solution for agentic AI.
Significance. If the UC security proofs are rigorous and the protocols achieve the claimed efficiency and quantum resistance without hidden assumptions, the result would be significant: it would supply the first formally verified post-quantum governance layer for multi-agent systems, directly addressing NIST's deprecation timeline for classical public-key cryptography while handling policy budgets and attribution. The combination of UC modeling with practical overhead comparisons strengthens the case for deployability in quantum-threatened environments.
major comments (3)
- [§4] §4 (Ideal Functionality F_MAGIQ): The definition of F_MAGIQ does not explicitly model adaptive policy budget exhaustion, mid-session policy updates, or concurrent one-to-many agent sessions under adaptive corruption of multiple agents. This gap means the claimed UC emulation may not capture the full real-world behaviors asserted in the abstract, undermining the 'proven security guarantees' for the governance framework.
- [§5] §5 (UC Security Proof): The security reduction does not detail how the simulator handles quantum oracle access or adaptive scheduling of agent sessions. Without these, the proof that the real-world protocol UC-emulates F_MAGIQ cannot be verified as holding for the dynamic multi-agent setting described in the introduction.
- [Evaluation section] Evaluation section (comparison to SAGA): The reported overhead figures lack ablation on the cost of the novel post-quantum primitives versus the policy-enforcement logic; this prevents assessing whether the efficiency claims are load-bearing for the central contribution or merely baseline improvements.
minor comments (2)
- Notation for policy budgets (e.g., global vs. per-session) is introduced in the abstract but not consistently defined before use in the protocol descriptions.
- The abstract states 'highly efficient' protocols; the evaluation should include concrete cycle counts or asymptotic bounds to support this.
Simulated Author's Rebuttal
We thank the referee for their insightful comments and the recommendation for major revision. We address each of the major comments point by point below, providing clarifications and indicating the revisions we have made to the manuscript.
read point-by-point responses
-
Referee: [§4] §4 (Ideal Functionality F_MAGIQ): The definition of F_MAGIQ does not explicitly model adaptive policy budget exhaustion, mid-session policy updates, or concurrent one-to-many agent sessions under adaptive corruption of multiple agents. This gap means the claimed UC emulation may not capture the full real-world behaviors asserted in the abstract, undermining the 'proven security guarantees' for the governance framework.
Authors: We agree that a more comprehensive modeling of adaptive behaviors would strengthen the ideal functionality. In the revised manuscript, we have extended F_MAGIQ to explicitly include adaptive policy budget exhaustion through stateful budget tracking, support for mid-session policy updates via authenticated channels, and handling of concurrent one-to-many sessions under adaptive corruptions of multiple agents. The UC emulation proof has been updated to reflect these enhancements, ensuring that the security guarantees cover the dynamic scenarios described. revision: yes
-
Referee: [§5] §5 (UC Security Proof): The security reduction does not detail how the simulator handles quantum oracle access or adaptive scheduling of agent sessions. Without these, the proof that the real-world protocol UC-emulates F_MAGIQ cannot be verified as holding for the dynamic multi-agent setting described in the introduction.
Authors: The original proof sketch assumed a classical UC framework with post-quantum primitives, but we acknowledge the need for explicit details on quantum aspects. We have revised Section 5 to include a detailed description of the simulator's handling of quantum oracle queries (using the quantum random oracle model where appropriate) and adaptive scheduling of sessions. This includes how the simulator maintains consistency under adaptive corruptions and session scheduling, thereby making the reduction verifiable. revision: yes
-
Referee: Evaluation section (comparison to SAGA): The reported overhead figures lack ablation on the cost of the novel post-quantum primitives versus the policy-enforcement logic; this prevents assessing whether the efficiency claims are load-bearing for the central contribution or merely baseline improvements.
Authors: We appreciate this observation regarding the evaluation. To better isolate the contributions, we have added an ablation study in the revised evaluation section. This includes separate measurements for the overhead introduced by the post-quantum cryptographic primitives (such as lattice-based signatures and key exchanges) compared to the policy enforcement mechanisms. The updated figures demonstrate that the novel primitives contribute a moderate overhead while enabling the quantum resistance, supporting the central claims of the paper. revision: yes
Circularity Check
No circularity: MAGIQ security claims rest on independent UC modeling of novel protocols
full rationale
The paper introduces MAGIQ as a new framework for policy enforcement in multi-agent AI systems, using post-quantum cryptographic primitives and formally proving security and correctness via the standard Universal Composability (UC) framework. No steps reduce by construction to fitted parameters, self-definitions, or self-citation chains; the ideal functionality and protocol emulation are presented as independent formal artifacts. Evaluation against SAGA is comparative overhead measurement, not a predictive reduction. The derivation is self-contained against external benchmarks.
Axiom & Free-Parameter Ledger
axioms (1)
- standard math Universal Composability (UC) framework provides a sound model for proving security and correctness of cryptographic protocols in multi-agent settings
Lean theorems connected to this paper
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We use hash chains to enforce task-msg count budgets... s_i = H(s_{i-1}) ... terminal value s_n ... signed by the user
-
IndisputableMonolith/Foundation/RealityFromDistinction.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We formally model and prove the correctness and security of the system using the Universal Composability (UC) framework
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Matt Adorjan. 2025. cloudping.co: AWS Inter-Region Latency Monitoring. https: //github.com/mda590/cloudping.co Accessed: 2025-04-18
2025
-
[2]
Alfonso Amayuelas, Xianjun Yang, Antonis Antoniades, Wenyue Hua, Liang- ming Pan, and William Yang Wang. 2024. MultiAgent Collaboration Attack: Investigating Adversarial Attacks in Large Language Model Collaborations via Debate. InFindings of the Association for Computational Linguistics: EMNLP 2024. 6929–6948
2024
-
[3]
Zeynab Anbiaee, Mahdi Rabbani, Mansur Mirani, Gunjan Piya, Igor Opushnyev, Ali Ghorbani, and Sajjad Dadkhah. 2026. Security Threat Modeling for Emerging AI-Agent Protocols: A Comparative Analysis of MCP, A2A, Agora, and ANP. arXiv:2602.11327 [cs.CR] https://arxiv.org/abs/2602.11327
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[4]
Sepideh Avizheh, Mahmudun Nabi, and Reihaneh Safavi-Naini. 2024. Refereed delegation of computation using smart contracts.IEEE Transactions on Dependable and Secure Computing21, 6 (2024), 5208–5227
2024
-
[5]
Varun Pratap Bhardwaj. 2026. Agent Behavioral Contracts: Formal Specification and Runtime Enforcement for Reliable Autonomous AI Agents. doi:10.5281/ ZENODO.18775393
2026
-
[6]
Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, and Markus Rückert. 2013. On the security of the Winternitz one-time signature scheme. International Journal of Applied Cryptography3, 1 (2013), 84–96
2013
-
[7]
Johannes Buchmann, Erik Dahmen, and Andreas Hülsing. 2011. XMSS-a practical forward secure signature scheme based on minimal security assumptions. In International Workshop on Post-Quantum Cryptography. Springer, 117–129
2011
-
[8]
CAIDA. [n. d.]. The CAIDA Archipelago Monitor Statistics. https://www.caida. org/projects/ark/statistics/. Accessed April 2025
2025
-
[9]
Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, and Gre- gory Neven. 2018. The wonderful world of global random oracles. InAnnual international conference on the theory and applications of cryptographic techniques. Springer, 280–312
2018
-
[10]
Ran Canetti. 2001. Universally composable security: A new paradigm for cryp- tographic protocols. InProceedings 42nd IEEE Symposium on Foundations of Computer Science. IEEE, 136–145
2001
-
[11]
Ran Canetti. 2004. Universally composable signature, certification, and authenti- cation. InProceedings. 17th IEEE Computer Security Foundations Workshop, 2004. IEEE, 219–233
2004
-
[12]
Ran Canetti, Kyle Hogan, Aanchal Malhotra, and Mayank Varia. 2017. A univer- sally composable treatment of network time. In2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, 360–375
2017
-
[13]
Ran Canetti, Pratik Sarkar, and Xiao Wang. 2020. Efficient and round-optimal oblivious transfer and commitment with adaptive security. InInternational Con- ference on the Theory and Application of Cryptology and Information Security. Springer, 277–308
2020
- [14]
-
[15]
Alan Chan, Kevin Wei, Sihao Huang, Nitarshan Rajkumar, Elija Perrier, Seth Lazar, Gillian K. Hadfield, and Markus Anderljung. 2025. Infrastructure for AI Agents.arXiv preprint arXiv:2501.10114(2025)
-
[16]
Jianming Chen, Yawen Wang, Junjie Wang, Xiaofei Xie, Yuanzhe Hu, Qing Wang, and Fanjiang Xu. 2026. Adversarial Attack on Black-Box Multi-Agent by Adaptive Perturbation.Proceedings of the AAAI Conference on Artificial Intelligence40, 35 (Mar. 2026), 29359–29367. doi:10.1609/aaai.v40i35.40176
-
[17]
Zhaoliang Chen. 2026. AITH: A Post-Quantum Continuous Delegation Protocol for Human-AI Trust Establishment. arXiv:2604.07695 [cs.CR] https://arxiv.org/ abs/2604.07695
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[18]
Model Context Protocol Contributors. 2025. Model Context Protocol Registry. https://github.com/modelcontextprotocol/registry. Accessed: 2025-12-11
2025
-
[19]
Edoardo Debenedetti, Ilia Shumailov, Tianqi Fan, Jamie Hayes, Nicholas Car- lini, Daniel Fabian, Christoph Kern, Chongyang Shi, Andreas Terzis, and Flo- rian Tramèr. 2026. Defeating Prompt Injections by Design. arXiv preprint arXiv:2503.18813. InIEEE Conference on Secure and Trustworthy Machine Learning (SaTML). https://arxiv.org/abs/2503.18813
work page internal anchor Pith review arXiv 2026
-
[20]
Stefan Dziembowski, Lisa Eckey, and Sebastian Faust. 2018. Fairswap: How to fairly exchange digital goods. InProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 967–984
2018
-
[21]
Lisa Eckey, Sebastian Faust, and Benjamin Schlosser. 2020. Optiswap: Fast opti- mistic fair exchange. InProceedings of the 15th ACM Asia Conference on Computer and Communications Security. 543–557
2020
-
[22]
2020.Falcon: Fast-Fourier Lattice-based Compact Signa- tures over NTRU, Specification v1.2
Pierre-Alain Fouque, Jeffrey Hoffstein, Paul Kirchner, Vadim Lyubashevsky, Thomas Pornin, Thomas Prest, Thomas Ricosset, Gregor Seiler, William Whyte, and Zhenfei Zhang. 2020.Falcon: Fast-Fourier Lattice-based Compact Signa- tures over NTRU, Specification v1.2. Cryptographic Specification. falcon-sign.info. https://falcon-sign.info/falcon.pdf Accessed: 2026-02-12
2020
-
[23]
Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, and Jörg Schwenk. 2008. Universally composable security analysis of TLS. InInternational Conference on Provable Security. Springer, 313–327
2008
-
[24]
Google Developer Blog. 2025. Announcing the Agent2Agent Proto- col (A2A). https://developers.googleblog.com/en/a2a-a-new-era-of-agent- interoperability/. Accessed: 2025-07-22
2025
-
[25]
Lov K. Grover. 1996. A fast quantum mechanical algorithm for database search. InProceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Com- puting(Philadelphia, Pennsylvania, USA)(STOC ’96). Association for Computing Machinery, New York, NY, USA, 212–219. doi:10.1145/237814.237866
-
[26]
gsiros. 2024. saga. https://github.com/gsiros/saga
2024
-
[27]
Xiangming Gu, Xiaosen Zheng, Tianyu Pang, Chao Du, Qian Liu, Ye Wang, Jing Jiang, and Min Lin. 2024. Agent Smith: A Single Image Can Jailbreak One Million Multimodal LLM Agents Exponentially Fast
2024
- [28]
-
[29]
Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, and Christopher Wood. 2023. Password-authenticated TLS via OPAQUE and post-handshake authentication. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 98–127
2023
-
[30]
Sirui Hong, Mingchen Zhuge, Jonathan Chen, Xiawu Zheng, Yuheng Cheng, Jinlin Wang, Ceyao Zhang, Zili Wang, Steven Ka Shing Yau, Zijuan Lin, Liyang Zhou, Chenyu Ran, Lingfeng Xiao, Chenglin Wu, and Jürgen Schmidhuber
-
[31]
InThe Twelfth International Conference on Learning Representations
MetaGPT: Meta Programming for A Multi-Agent Collaborative Frame- work. InThe Twelfth International Conference on Learning Representations. https: //openreview.net/forum?id=VtmBAGCN7o
-
[32]
Andreas Huelsing, Denis Butin, Stefan-Lukas Gazdag, Joost Rijneveld, and Aziz Mohaisen. 2018. XMSS: eXtended Merkle Signature Scheme. RFC 8391. doi:10. 17487/RFC8391
2018
-
[33]
Andreas Hülsing, Denis Butin, Stefan-Lukas Gazdag, Joost Rijneveld, and Aziz Mohaisen. 2018. XMSS: eXtended Merkle Signature Scheme. RFC 8391. doi:10. 17487/RFC8391
2018
- [34]
- [35]
- [36]
-
[37]
Leslie Lamport. 1979. Constructing digital signatures from a one way function. Technical Report SRI-CSL-98(1979)
1979
- [38]
-
[39]
Evan Li, Tushin Mallick, Evan Rose, William Robertson, Alina Oprea, and Cristina Nita-Rotaru. 2026. ACE: A Security Architecture for LLM-Integrated App Systems. InProceedings of the Network and Distributed System Security Symposium (NDSS)
2026
- [40]
-
[41]
2024.Transition to Post-Quantum Cryptography Standards
Dustin Moody, Ray Perlner, Andrew Regenscheid, Angela Robinson, and David Cooper. 2024.Transition to Post-Quantum Cryptography Standards. Technical Conference’17, July 2017, Washington, DC, USA Report NIST IR 8547 (Initial Public Draft). National Institute of Standards and Technology, Gaithersburg, MD, USA. doi:10.6028/NIST.IR.8547.ipd Initial Public Draft
- [42]
-
[43]
August 13, 2024
National Institute of Standards and Technology (NIST). August 13, 2024. FIPS 203 Module-Lattice-Based Key-Encapsulation Mechanism Standard. https://csrc. nist.gov/pubs/fips/203/final Available at https://csrc.nist.gov/pubs/fips/203/final
2024
-
[44]
August 13, 2024
National Institute of Standards and Technology (NIST). August 13, 2024. FIPS 204 Module-Lattice-Based Digital Signature Standard. https://csrc.nist.gov/pubs/ fips/204/final Available at https://csrc.nist.gov/pubs/fips/204/final
2024
-
[45]
August 13, 2024
National Institute of Standards and Technology (NIST). August 13, 2024. FIPS 205 Stateless Hash-Based Digital Signature Standard. https://csrc.nist.gov/pubs/ fips/205/final Available at https://csrc.nist.gov/pubs/fips/205/final
2024
-
[46]
Ramesh Raskar, Pradyumna Chari, Jared James Grogan, Mahesh Lambe, Robert Lincourt, Raghu Bala, Aditi Joshi, Abhishek Singh, Ayush Chopra, Rajesh Ranjan, Shailja Gupta, Dimitris Stripelis, Maria Gorskikh, and Sichao Wang. 2025. Up- grade or Switch: Do We Need a Next-Gen Trusted Architecture for the Internet of AI Agents? arXiv:2506.12003 [cs.NI] https://ar...
-
[47]
Tirumaleswar Reddy and Hannes Tschofenig. 2025. Post-Quantum Cryptography Recommendations for TLS-based Applications. Internet-Draft, draft-ietf-uta-pqc- app-00. https://www.ietf.org/archive/id/draft-ietf-uta-pqc-app-00.html Work in progress
2025
-
[48]
Ronald L Rivest and Adi Shamir. 1996. PayWord and MicroMint: Two simple micropayment schemes. InInternational workshop on security protocols. Springer, 69–87
1996
-
[49]
Yonadav Shavit, Sandhini Agarwal, Miles Brundage, Steven Adler, Cullen O’Keefe, Rosie Campbell, Teddy Lee, Pamela Mishkin, Tyna Eloundou, Alan Hickey, et al
-
[50]
Practices for governing agentic AI systems.Research Paper, OpenAI(2023)
2023
-
[51]
P.W. Shor. 1994. Algorithms for quantum computation: discrete logarithms and factoring. InProceedings 35th Annual Symposium on Foundations of Computer Science. 124–134. doi:10.1109/SFCS.1994.365700
- [52]
-
[53]
Rao Surapaneni, Miku Jha, Michael Vakoc, and Todd Segal. 2025. Announcing the Agent2Agent Protocol (A2A). Google Developers Blog. https://developers. googleblog.com/en/a2a-a-new-era-of-agent-interoperability/ Accessed: 2025- 04-10
2025
-
[54]
Georgios Syros, Anshuman Suri, Jacob Ginesin, Cristina Nita-Rotaru, and Alina Oprea. 2026. SAGA: A Security Architecture for Governing AI Agentic Systems. InProceedings of the Network and Distributed System Security Symposium (NDSS)
2026
-
[55]
Haochuan Kevin Wang and Zechen Zhang. 2026. Kill-Chain Canaries: Stage- Level Tracking of Prompt Injection Across Attack Surfaces and Model Safety Tiers. arXiv:2603.28013 [cs.CR] https://arxiv.org/abs/2603.28013
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[56]
Qingyun Wu, Gagan Bansal, Jieyu Zhang, Yiran Wu, Beibin Li, Erkang Zhu, Li Jiang, Xiaoyun Zhang, Shaokun Zhang, Jiale Liu, Ahmed Hassan Awadallah, Ryen W White, Doug Burger, and Chi Wang. 2023. AutoGen: Enabling Next- Gen LLM Applications via Multi-Agent Conversation. arXiv:2308.08155 [cs.AI] https://arxiv.org/abs/2308.08155
work page internal anchor Pith review Pith/arXiv arXiv 2023
-
[57]
Weichen Yu, Kai Hu, Tianyu Pang, Chao Du, Min Lin, and Matt Fredrikson. 2025. Infecting LLM Agents via Generalizable Adversarial Attack. InRed Teaming GenAI: What Can We Learn from Adversaries?https://openreview.net/forum? id=udsmFGMwlp
2025
-
[58]
Weibo Zhao, Jiahao Liu, Bonan Ruan, Shaofei Li, and Zhenkai Liang
-
[59]
When mcp servers attack: Taxonomy, feasibility, and mitigation.arXiv preprint arXiv:2509.24272, 2025
When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation. arXiv:2509.24272 [cs.CR] https://arxiv.org/abs/2509.24272 A Ethical Considerations Our paper is not an attack paper, it does not use any public dataset, or human data collection, so we believe that there are no ethical concerns. B Notations We present the notations used throughout the paper i...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.