Documente Academic
Documente Profesional
Documente Cultură
Quantum Computing
This book illustrates in concrete terms how to innovate the legal method by
applying and understanding technology and physics.
At first sight this book is about quantum computers etc. Behind the surface,
however, this book is not about quantum-anything. It’s the codification of
self esteem, through the actions I took by writing this book.
Keep trying extreme things you never thought you would do, to achieve
things you never thought were possible. As my idol Max Martin, the greatest
music producer of all time states:
”It’s music. It’s supposed to be fun and inspirational. You have to be inspired.
If I did it because it was my “job”, and I only did it to make money, I don’t
think I’d still be doing it.”
The true motivation behind this book was the hope of inspiring people to
take the chance of believing in them selves and expressing who they are
inside, no matter how much resistance they meet. Every experience whether
a success or failure is something that builds towards a better long term
future, as long as you never give up.
I also believe making and using technology are just ways to be creative and
enhancing the outlet of our core values as humans, which defines the future.
We can only live up to our responsibility of making sure that our overall
reflection of the core values is positive by supporting and not judging each
other, but instead admiring our differences.
Nick Sherigian
2
This edition contains minor text corrections of the original as of 2nd of June
2019.
3
Table of Contents
Prologue
1.1 Introduction 7
4
2.3.3.1 Economical considerations and RNG (Superposition†) 36
2.4 Ab Initio 39
2.4.1 The legal definition of virtual currency
and the use of ab initio 41
2.4.1.1 The Performance 43
2.4.1.2 The System 44
2.4.1.3 Overall Definition 45
Epilogue
5
Part 1: Demarcations and Technological
Explanations
6
1.1 Introduction
Wednesday the 19th of December 2018 the House of Representatives in USA
passed ”H.R.6227 - National Quantum Initiative Act” with the votes 348-11.
Similarly, EU has considered how improvements can be made to the EU
quantum industry.1
”The term “quantum information science” means the use of the laws of
quantum physics for the storage, transmission, manipulation, computing, or
measurement of information.”
This includes the quantum computer, which can rightly be assumed to lead
to a crucial paradigm shift in computer science in this century, cf. section
1.2.4.
As a result, there will also be time periods, where the legal professional is
required to consider legal issues relating to a variety of technologies that are
constantly evolving and which are not yet detail regulated.
7
According to the legal literature, the legal method may seem to fall short in
this context, since there is no legal future research that goes beyond
contemporary history, which not only constitutes extrapolation or guesswork
on a more or less qualified and enlightened basis.2 This type of legal literary
work has instead been referred to as being legal policy.3 Depending on the
content, this term is probably sufficiently accurate.
It should therefore be emphasized that this book’s part 3 is not futuristic, but
rather contemporary use of the legal method.
2 Compared with Bernhard Gomard in UfR 1993B.385 ”Juraen under forandring og udvikling”
3 Henrik Udsen and Peter Blume in UfR 2011B.42/1 ”Persondataretten – nu og i fremtiden”
4 Alf Ross, Om ret og retfærdighed – en indførelse i den analytiske retsfilosofi, April 1953, pp. 2-3.
5 Peter Blume in UfR 1987B.67 ”Ekspertsystemer”
6 Inspired by the way “augmentation” is described in a computer historical perspective in: Thinking
with machines: Intelligence augmentation, evolutionary epistemology, and semiotic, Peter Skagestad,
Journal of Social and Evolutionary Systems, Volume 16, Issue 2, 1993, pp. 157-180. The early pioneers
of the computer focused on the essence of the human thinking and wanted to adapt the computer’s
functionality to improve the ways humans were thinking, cf. p. 157.
7 An Introduction to Cybernetics, W. Ross Ashby, Chapman & Hall Ltd., London, 1956, 2 nd Impression of
8
the lesser”11 hereby leads to the potentially viable reasoning that quantum
mechanics contains principles that are useful in solving legal issues which are
of a substantially more simple character, cf. section 1.2.3 compared with
section 2.2. Similarly, the transition towards the use of IA and AI in legal
disciplines would become more streamlined.
This approach is a step towards a bionic light on the legal method.12 It should
be stressed that since augmentare is used, the approach does not ignore the
legal method as a guarantee of the fundamental values of the judicial
system.13
It should be noted that there will also be a number of ethical and political
issues that may be relevant, but falls outside the scope of this book.
11 Justice Byron White and the Argument that the Greater Includes the Lesser, Michael Herz, BYU Law
Review, Volume 1994, Issue 2, Article 2.
12 The word originates from the Greek word “βίον” which means “unit of life” with the suffix “-ικος”(in
English “ίc”) whereby the meaning becomes “like life”, cf. Bio-Inspired and Nanoscale Integrated
Computing, Dr. Mary Mehrnoosh Eshaghian-Wilner, John Wiley & Sons, 22. sep. 2009, p. ix. However
“life” is a subset of the Greek word “φύσις” also known in english as “physis” which is every physical
phenomenon. Thereby it is more appropriate to describe the bionic light on the legal method as being
“like every physical phenomenon”, compared with the remarks concerning The Theory of Everything in
section 1.2.1.
13 See in continuation hereof Peter Blume in UfR 1992B.193, with related reference in note 25 to Jon
9
1.2 Description of the Technology
The quantum computer and quantum information technologies are based on
quantum physics, which is also called quantum mechanics (the term used
from now on). A brief description of quantum mechanics and the quantum
computer is therefore initially provided. The purpose of the descriptions is
not to be exhaustive and comprehensive, but to be able to impart to the
uninitiated reader in the necessary knowledge of physics as well as the
technology to fully understand the legal rationale of the following sections of
this book.
Furthermore there will be further descriptions of the principles etc. along the
book when it becomes relevant.
Among the pioneers in quantum mechanics are James Clerk Maxwell15 and
Ludwig Boltzman16 with the Maxwell-Boltzmann distribution17 and, in
particular, Max Planck who suggested that the energy of a particle can be
quantized. Planck's theory was supported by experiments, whereby Planck
found that the energy of an energy quantity was proportional to the
frequency of the radiation types and that the fractional ratio between the
energy and the frequency was a constant.18 19 Planck's fundamental natural
15Illustrations of the dynamical theory of gases, part I, On the motions and collisions of perfectly elastic
spheres, J.C. Maxwell, The London, Edinburgh and Dublin Philosophical Magazine and Journal of
Science, 4th Series, vol. 19(1860 A), pp. 19-32.
Illustrations of the dynamical theory of gases, part II, on the process of diffusion of two or more kinds
of moving particles among one another, The London, Edinburgh, and Dublin Philosophical Magazine
and Journal of Science, 4th Series, vol. 20(1860 B), pp. 21 -37.
and Probability Calculations Regarding the Conditions for Thermal Equilibrium, Ludwig Boltzmann,
Sitzungberichte der Kaiserlichen Akademie der Wissenschaften. Mathematisch-Naturwissen Classe.
Abt. II, LXXVI 1877, pp. 373-435 (Wien. Ber. 1877, 76:373-435). Reprinted in Wiss. Abhandlungen, Vol.
II, reprint 42, pp. 164-223, Barth, Leipzig, 1909.
17 Maxwell and the normal distribution: A colored story of probability, independence, and tendency
toward equilibrium, Balázs Gyenis, Studies in History and Philosophy of Science Part B: Studies in
History and Philosophy of Modern Physics, vol. 57, 5th of February 2017, pp. 53-65.
18 Ueber eine Verbesserung der Wien’schen Spectralgleichung; von M. Planck, Verhandlung der
Deutschen Physikal. Gesellschaft [No. 13], Vorgetragen in der Sitzung vom 19. october 1900, pp. 202-
204.
Zur Theorie des Gesetzes der Energieverteilung im Normalspectrum; von M. Planck, Verhandlung der
Deutschen Physikal. Gesellschaft [No. 17], Vorgetragen in der Sitzung vom 14. december 1900, pp. 237-
245.
10
constant has the value h = 6,626070040·10-34 J∙s (Joule times second), where
Joule is an expression of energy.
In 1926, Max Born then found that the Greek letter phi (ɸ) expresses the
probability that an electron ends up in a direction given by the angles alpha
(α), beta (β) and gamma (γ), which is thus a vector. The probability is
proportional to the square of phi (ɸ).21
19 Da vor viden om naturen blev »hakket i småstykker« – 100 år med Max Plancks kvante-teori, Louis
Nielsen, cand. scient. in physics and astronomy, lecturer at Herlufsholm, 3rd of January 2001.
20 Schrödinger, Erwin "Die gegenwärtige Situation in der Quantenmechanik”, Die Naturwissenschaften,
note *
22 Broken Symmetries and the Masses of Gauge Bosons, Higgs, Peter W., AA(Tait Institute of
Mathematical Physics, University of Edinburgh, Edinburgh, Scotland), 10/1964, Physical Review Letters,
vol. 13, Issue 16, pp. 508-509.
23 https://atlas.cern/updates/atlas-feature/higgs-boson
24 Quantum Formulation of the Einstein Equivalence Principle, Magdalena Zych & Časlav Brukner,
11
spacetime is an emergent phenomenon from a prior subquantum medium. 25
The information in the form of bits passes through the computer's central
processing unit (CPU), which performs computations one instruction at a
time, if the CPU is subscalar which means less than one instruction occurs per
clock cycle (IPC <1). Applying parallelism in CPUs, however makes it possible
for a single CPU to complete instructions surpassing one instruction per clock
cycle(IPC > 1).29
In the superposition, a qubit does not have a value between 0 and 1, but can
be described as a probability of being 0 or 1 due to Max Born's law.
The probability of being the value ”0” is then the square of α, while the
probability of being the value ”1” is the square of β. α and β are both
probability amplitudes.
25 Spacetime as an Emergent Phenomenon: A Possible Way to Explain Entanglement and the Tunnel
Effect, P. Castro, M. Gatta, J.R. Croca and R. Moreira, Journal of Applied Mathematics and Physics, Vol.
6, No. 10, published the 26th of October 2018.
26 The Theory of Everything: The Origin and Fate of the Universe, Stephen W. Hawking, Phoenix Books,
2007.
27 Instrumental Analysis, Vannevar Bush, Bulletin of the American Mathematical Society, 42, October
1936, p. 653, however it is a portmanteu of “binary digit” suggested by John W. Turkey, cf. Between
communication and Information – Information & Behaviour, Brent D. Ruben, Routledge, volume 4, 29th
of September 2017, see the section named “Information Theory and Cryptography”.
28 Explication de l’arithmétique binaire, qui se sert des seuls caractères O et I avec des remarques sur
son utilité et sur ce qu’elle donne le sens des anciennes figures chinoises de Fohy, Godefroy-Guillaume
Leibnitz, Mémoires de mathématique et de physique de l’Académie royale des sciences, Académie
royale des sciences, 1703.
29 CPU vs. SOC – The battle for the future of computing, Nikola Zlatanov, Conference: International
System-on-Chip Conference, At UCI, Irvine, CA, October 2015, the section called: “Parallelism”.
12
Thus, since a qubit in superposition has a probability of being "0", a qubit
also has a probability of being "1", which can be expressed as:
| α |^ 2 +| β |^2 = 1
ɸ = [α, β] 30 31
The notion that quantum computers are faster at running through a problem
than a classical computer is defined as “quantum speedup”. Recent research
(2014-2015) about the current quantum computers has not been
unambiguous as to whether the quantum speedup does occur in relation to
all algorithms, but suggests that the quantum speedup might occur in the
future.32 33
However, a study from 2018 shows that parallel quantum algorithms running
in a constant time period are provably better at solving certain linear algebra
problems associated with binary quadratic forms than the classical
computers.34
30 Q# , a quantum computation package for the .NET platform A. S. Tolba, M. Z. Rashad, and M. A. El-
Dosuky Dept. of Computer Science, Faculty of Computers and Information Sciences, Mansoura
University, Mansoura, Egypt, p. 1.
31 For a more in-depth presentation of the quantum computer, please refer to:
Nielsen, M.A. og Chuang, I.L. (2000). Quantum Computation and Quantum Information.
32 Defining and detecting quantum speedup, Troels F. Rønnow, Zhihui Wang, Joshua Job, Sergio Boixo,
Sergei V. Isakov, David Wecker, John M. Martinis, Daniel A. Lidar and Matthias Troyer, Science 25th of
July 2014, Vol. 345, Issue 6195, pp. 420-424.
33 Probing for quantum speedup in spin-glass problems with planted solutions, Itay Hen, Joshua Job,
Tameem Albash, Troels F. Rønnow, Matthias Troyer and Daniel A. Lidar, Physical Review A 92, 042325
– Published the 23rd of October 2015.
34 Quantum Advantage With Shallow Circuits, Sergey Bravyi, David Gosset, Robert König, Science,
13
well as machine learning,35 classical statistics are not adequate and can be
enhanced by the application of quantum superpositions. 36 This is specifically
the circumstances, where multiple processes are combined in indefinite
order. 37 38
Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE, 20-22nd of November
1994
40 A Fast Quantum Mechanical Algorithm for Database Search, Lov K. Grover, Proceedings, 28th Annual
ACM Symposium on the Theory of Computing (STOC), 29th of May 1996, pp. 212-219.
41Arrow of Time and its Reversal on the IBM Quantum Computer, G.B. Lesovik, I. A. Sadovskyy, M.V.
Suslov, A.V. Lebedev & V.M. Vinokur, Scientific Reports 9, Article number: 4396, 13th of March 2019.
42 Verified quantum information scrambling, K. A. Landsman, C. Figgatt, T. Schuster, N. M. Linke, B.
14
Part 2: Legal Methodological Subjects
15
2.1 Initial Remarks
As stated in section 1.2.3, the quantum computer has increased computing
power and thus increased possibilities for data-driven decision making. This
is also reflected in the increased applicability of AI, machine learning, etc. as
later described. Therefore, such perspectives concerning the use of AI will
also be included in this part of the book.
However, the democratic process does not prevent the law from being
logically constructed to a greater extent according to given logical principles
such as deductive syllogisms,45 which can facilitate the practical association
of the legal method and technology.46
46It is also noted in this context that deontic logic is not considered sufficient, since it is recognized by
the deontic logic that norms are without truth value and thus have no logic. Instead the use of the
term deontic equivalence is appropriate, cf. Peter Blume in UfR 1992B.193 ”Kunstig intelligens og
juridisk metode”, namely note 22, 35 og 50-51 with reference to Richard Susskind. Deontic equivalence
can also be expressed in such a way that deontic logic can to a large extent be considered necessary,
16
It has also been possible to find a single example of a Danish source of law, in
which it is stated that emphasis can be placed on the obvious and logical
correlation between the transactions and their reflection as registrations in
relation to accounting. 47
In some instances, however, there are some general logical principles in the
legal reasoning, besides the already mentioned principle of ”the greater
includes the lesser” in section 1.1, which will be assessed in the following:
The logical part is making a conclusion from some premisses. However, the
logical conclusion sometimes contains discretionary assessments50 e.g. when
the evidence assessment is free (unbound), cf. section 2.3.4, whereby the
but not sufficient to describe the legal method, and must therefore be supplemented in the light of the
nuances that the discrete assesment and social aspects of legal reasoning causes, cf. Peter Blume in
UfR 1992B.193 “Kunstig intelligens og juridisk metode” and Peter Blume in UfR 1987B.65
”Ekspertsystemer”.
See also: Law and Logic: a Review from an Argumentation Perspective, Henry Prakken and Giovanni
Sartor, 19th of August 2015, pp. 1-3 for further conditions that impede the use of deontic logic and on
the contrary points in the direction of deontic equivalence. However, it should be noted that the book
Law and Logic moreover is of a predominantly political nature due to the assumption that the law is
drafted so as to enforce a unique outcome in each case, cf. p. 3. It is unclear what ”enforce a unique
outcome” means, but such an assumption wouldn’t be needed if the law actually did enforce a unique
outcome and therefore, the presentation will not be referenced to further in this book despite the
indications of how logic could be used to write legislation, and thus is particularly suitable for digital
contract design and the use of lex cryptographia in the legislative process.
47 Bogføringsvejledning, Erhvervs- og Selskabsstyrelsen, juni 1999, pkt. 4.2 ”Art og omfang” with my
emphasize a subjective interpretation of the preparatory works in Danish law when the preparatory
works hereby hides rules that cannot be seen in the text of the Act by an objective interpretation. Such
an interpretation has often been criticized especially in cases where not only a minor detail is hidden,
cf. Peter Blume, Juridisk metodelære – En indføring i rettens og juraens verden, 3rd Edition, 2004, p. 92.
However, this does not change the basics of the rationale of how a legal source should be designed
with specific reference to the use of logic before logic can be used in the subsumption.
49 It is desirable if the type of logical reasoning is defined in the source of law.
50 Compared to the principle in: The Use and Limits of Deductive Logic in Legal Reasoning, Wilson
Huhn, Santa Clara Law Review, Volume 42, pp. 813-862, 1st of January 2002(now ULDLLR), pp. 4-5.
17
content of the individual premises can be discrete, which then
colours/impacts the conclusion (lat.: petitio principii seu quaesiti).51
In addition there are considerations about the issues that arise with
ontology52 or lack thereof especially when it comes to the use of AI,53 which
also makes it unclear, whether the intended premisses have been used.
51 Immanuel Kant’s Groundwork for the Metaphysics of Morals, Dieter Schönecker & Allen W. Wood,
Harvard University Press, 5th of January 2015, see the section “The Suspicion of Circularity”.
52 Ontology can be defined as an explicit formal specification of a shared conceptualization, cf. A
to appear in Allen, J. A., Fikes, R., and Sandewall, E. (Eds.) Principles of Know ledge Representation and
Reasoning: Proceedings of the Second International Conference. San Mateo, CA: Morgan Kaufmann,
31st of January 1991. For the application in relation to law and AI see: Proceedings of LOAIT ’07 II
Workshop on Legal Ontologies and Artificial Intelligence Techniques, Pompeu Casanovas, Maria Angela
Biasiotti, Enrico Francesconi and Maria Teresa Sagri (Eds.), 2007.
54 A Dictionary of American and English Law: With Definitions of the Technical Terms of the Canon and
Civil Laws : Also, Containing a Full Collection of Latin Maxims and Citations of Upwards of Forty
Thousand Reported Cases in which Words and Phrases Have Been Judicially Defined Or Construed,
Stewart Rapalje, Robert L. Lawrence, The Lawbook Exchange, Ltd., 1997, p. 497.
55 Immanuel Kant’s Groundwork for the Metaphysics of Morals, Dieter Schönecker & Allen W. Wood,
Harvard University Press, 5th of January 2015, see the section “The Suspicion of Circularity”.
56 When programming algorithms for- and while loops are not hindered hereby as they simply repeats
iterations until a specified condition is met, cf. Learn Python the Hard Way – A Very Simple
Introduction to the Terrifyingly Beautiful World of Computers and Code, Zed Shaw, 3rd Edition, 2014,
pp. 102-105.
57 Infinite Regress Arguments, Stanford Encyclopedia of Philosophy, first published the 20th of July
18
The discrete assessments in legal reasoning that does not explicitly include or
reference every relevant consideration in the discrete assessment in a
written format makes it unclear whether the discrete assessment results in
an infinite regress. The reasoning would then be closely related to circular
reasoning by default.
58
It is nearly impossible to mention all the books about legal method where infinite regress is not
mentioned.
19
2.3 Quantum Mechanics and Qubits in
Relation to the Legal Method
Given that the legal method in its simplest form can be described as
deductive syllogisms the legal method can be expressed as a model by the
following equation:
(1)
facts (legally relevant facts) 59 60 + source of law = conclusion
(2)
0 1 01
facts (legally relevant facts) + source of law = conclusion
59 In relation to the factual circumstances, it is preferable that the empirical method is used instead of,
for example the rationalism’s a priori realization or other methods.
60 If extrapolation is used, it must be in accordance with the given law and its general principles, cf. the
It should be noted that extrapolation is not on par with the legal method because it extends the factual
circumstances to find the legally relevant facts, if no other information exists at all concerning what
one want to extrapolate towards. However, extrapolation is not against the legal method if there is any
other information which then is further defined or specified by the extrapolation.
This can be exemplified by an imaginary example of a person who loves chocolate. If it can be stated
that the person has eaten a given amount of chocolate (the y-axis), in a given time interval (the x-axis),
but without information about chocolate eating at other time intervals, extrapolation cannot be used,
as the factual circumstances would hereby be extended. If, on the other hand, there is given
information that chocolate has been eaten outside the time interval while the quantity is unknown,
extrapolation can be used to further define the factual circumstances about the chocolate that has
been eaten to get closer to the amount of chocolate that has been eaten.
It should be noted, however, that if only a sample has been made and extrapolation is used to reach
the conclusion that a person has eaten more or less chocolate than within the acceptance area of
chocolate eating such a conclusion requires a thorough mathematical theoretically based discussion.
20
Born rule62 since the nature of the agreement as a fact or source of law
depends on an interpretation. The result of the interpretation is not given in
advance in a wide range of cases due to the complexity of the agreement and
the principles of interpretation of the agreement. The superposition can be
expressed as:
(3)
0 superposition 1
facts (legally relevant facts) agreement source of law
(4)
0 superposition 1
not in favour the probability of either outcome in favour
Whereby:
(4.1)
(5) 0†
0 (superposition*) 1 (superposition†) 01 = 1† or 0†
1†
facts (legally relevant facts) + source of law = conclusion
(5.1)
* 0 superposition 1
facts (legally relevant facts) agreement source of law
(5.2)
† 0 superposition 1
Not in favor probability for either outcome in favor
21
The superpositions expressed as probabilities and how these probabilities
are clarified will be elaborated in the following.
Since the discrete assessment is not binary, the discrete assessment must not
be illusory by practically making the assessment binary. Therefore the use of
data in the discrete assessment, including processing of data as statistics, can
be described as the following:
The discrete assessment must not (or not only) to be based on abstract data,
without any further connection to the parties to the case, which, in certain
circumstances, can lead to significant variations that deviates from actual
factual circumstances of the case. Instead, the discrete assessment must be
exercised on the basis of a concrete, empirical assessment of the
circumstances as presented by the plaintiff and the defendant, to the extent
that is possible.
If abstract data is used, it must then be assessed what the probability is that
the event, which the abstract data supports, would occur in the
circumstances of the specific case.64 65
63Data Science and its Relationship to Big Data and Data-Driven Decision Making, Foster Provost and
Tom Fawcett, Mary Ann Liebert, Inc., Vol.1, no.1, March 2013, p. 53.
64 See the principles in Better Regulation Toolbox, Tool #15 “Risk Assessment and Management”, pp.
94, Box 1 where the phrase “likelihood” is used instead of probability, but has the same meaning. See
also Tool # 15, note 126 with reference to SEC(2010)1360 and is written in accordance with Inter-
institutional Agreement between the European Parliament, the Council of the European Union and the
European Commission on Better Law-Making, Official Journal of the European Union, L 123, volume 59,
12th of May 2016.
22
Thus, the use of data does not exclude the possibility of including
discretionary considerations in legal reasoning. The uncertainty associated
with the specific data can in these cases indicate the scope of the specific
margin of discretion that accrues to the legal professional.
65 This is a “subset” superposition in the legal method compared to the model in section 2.3, since the
clarification of the probability does not lead to a legal conclusion in itself but the probability
constitutes a factual circumstance. Similar “subset” superposition considerations could be made about
the probability of a given interpretation of a law.
66 Computational Intelligence – A Logical Approach, David Poole, Alan Mackworth, Randy Goebel,
Subcommittee on Science & Engineering Indicators – 2002, Chapter 6: industry, Technology and the
Global Marketplace, International Patenting Trends in Two New Technology Areas, National Science
Foundation with reference to The Court of Appeals of the Federal Circuit’s court decisions in State
Street bank & Trust Co. v. Signature Financial Group, inc. (1998) and AT&T Corp. v. Excel
Communications (1999), the practices of the European Patent Office(EPO) and the Japanese Patent
Office (JPO) in relation to software. It is therefore clear that the National Science Foundation considers
algorithms a technology, although it might not be a patentable technology.
72 IoA, p. 43.
73 IoA, p. 44.
23
A subset of AI is Machine learning(ML), which is algorithms built as learning
procedures74(learning algorithms 75) towards making optimized decisions,
while applying the learning algorithms to input data76 based on training
data/learning data77 or past experience/input data. 78
Without hidden layers the input and output units in the artificial neural
network are connected, and a learning rule is given that iteratively adjust the
strength of the connections between the units. Adjustments happen to
reduce the difference between a given output and the desired output. The
desired states are therefore specified by the task. However with hidden
layers the artificial neural network must use an autonomic learning
procedure that decides under what circumstances, the hidden units should
be active in order to make the adjustments to reduce the difference between
74 Some studies in machine learning using the game of checkers, Arthur L. Samuel, IBM Journal of
Research and Development (Volume: 44 , Issue: 1.2 , Jan. 2000), pp. 206-226 reprinted with minor
additions and corrections in Computers and Thought, edited by Feigenbaum and Feldman, McGraw-
Hill, 1963(now SSML), p. 602.
75 Introduction to Machine Learning, Ethem Alpaydin, MIT Press, 2 nd Edition, 2010, (now IML), p. 32.
76 SSML, p. 602.
77 SSML, p. 610.
78 IML, p. 31.
79 Initially suggested by Alan Turing as a premise for his imitation game, cf. Computing Machinery and
and dendrites connected by synapses, cf. Fine Structure of the Nervous System: Neurons and Their
Supporting Cells, Alan Peters, Sanford L. Palay, Henry deF Webster, New York: Oxford University Press,
3rd Edition, 1991.
83 For some of the recent research on the field see: Distributed Representations of Words and Phrases
and their Compositionality, Tomas Mikolov, Ilya Sutskeyer, Kai Chen, Greg Corrado, Jeffrey Dean,
Cornell University, 16th of October 2013, Multilingual Models for Compositional Distributed Semantics,
Karl Moritz Hermann and Phil Blunsom, Department of Computer Science, University of Oxford, 17th of
April 2014.
84 ANPLM, p. 1140.
85 ANPLM, p. 1142.
24
a given output and the desired output. The advantage with hidden layers is
therefore that a general purpose is sufficient instead of a learning rule to
achieve the desired output, which also means there is no restriction on the
input variables.86 Furthermore the application of the hidden layer makes it
possible for the artificial neural network to learn and model non-linear and
complex relationships.87
When trying to model the law scientifically, the discrete assessment can be
characterized as a complex prescriptive relationship,88 and the hidden layers
can be specialized to match with legal sub-problems89 in concept hierarchy
memory models:90 91 92
The facts can be subject to a distributed representation where the facts are
given the following features as being either: computer code, text,93 sound94
or pictures.95
McClelland, Surya Ganguli, Proceedings of the Annual Meeting of the Cognitive Science Society, 2013,
Volume 35, p. 1271.
88 Compared to the principle in: The Use and Limits of Deductive Logic in Legal Reasoning, Wilson
Huhn, Santa Clara Law Review, Volume 42, pp. 813-862, 1st of January 2002(now ULDLLR), pp. 4-5.
89 See the principle of specialization and grouping of interests presenting a somewhat predictable
similarity with the categories developed by the judges in: Artificial Neural Networks and Legal
Categorization, Filipe Borges, Raoul Borges, Danièle Bourcier, Legal Knowledge and Information
Systems, Jurix 2003: The Sixteenth Annual Conference, IOS Press, 2003, pp. 13-14. This should make it
possible for certain hidden layers to represent each of the given distributed representations, even
though this specialization has not yet been applied to non-binary complex application of legal method
with the use of feature hierarchies.
90 Learning Concept Hierarchies from Text Corpora using Formal Concept Analysis, Philipp Cimiano,
Andreas Hotho, Steffen Staab, Journal of Artificial Intelligence Research 24 (2005), pp. 305-339.
91 Concept Hierarchy Memory Model: A Neural Architecture for Conceptual Knowledge
Representation, Learning, and Commonsense Reasoning, Ah-Hwee Tan, Hui-Shin Vivien Soon,
International Journal of Neural Systems, Volume 7, No. 3(July, 1996), pp. 305-319.
92 Learning hierarchical category structure in deep neural networks, Andrew M. Saxe, James L.
McClelland, Surya Ganguli, Proceedings of the Annual Meeting of the Cognitive Science Society, 2013,
Volume 35, pp. 1271-1276.
93 Teaching machines to read and comprehend, Karl Moritz Hermann, Tomáš Kočiský, Edward
Grefenstette, Lasse Espeholt, Will Kay, Mustafa Suleyman, Phil Blunsom, NIPS’15 Proceedings of the
28th International Conference on Neural Information Processing Systems – Volume 1, 2015, Pages
1693-1701.
94 Towards End-to-End Speech Recognition with Recurrent Neural Networks, Alex Graves, Navdeep
Jaitly, Proceedings of the 31 st International Conference on Machine Learning, Beijing, China, 2014.
JMLR: W&CP volume 32.
95 Computer vision, Dana Harry Ballard, Christopher M. Brown, Prentice-Hall, 1982.
96 Some Fundamental Legal Conceptions as Applied in Judicial Reasoning, Wesley Hohfeld, 23 Yale L. J.
16 (1913).
97 For a more “micro application”-approach of distributed representation in legal texts, see Gov2Vec:
Learning Distributed Representations of Institutions and Their Legal Text, John J. Nay, Proceedings of
the Empirical Methods in Natural Language Processing Workshop on NLP and Computational Social
25
either deontic norms 98 or qualification norms,99 with the sub features of
rights, powers, privileges, or immunities.100
It has been emphasised in the legal literature that compromise might not
equate with justice, defined as the result a court of law would reach. 109 The
Science, 49–54, Association for Computational Linguistics as well as Nay, J. J. (2017, Forthcoming).
“Natural Language Processing and Machine Learning for Legal Text.” in D. M. Katz, R. Dolin & M.
Bommarito (Eds.), Legal Informatics, Cambridge University Press and “Understanding Legal Meaning
Through Word Embeddings.”, Douglas Rice which is still under review at the current moment.
98 See also note 35.
99 Defining legal risk, Tobias Mahler, paper presented at the conference “Commercial Contracting for
Strategic Advantage – Potentials and Prospects”, Turku University of Applied Sciences 2007, published
in the Conference Proceedings on pages 10-31, p. 10 of the paper.
100 John S. Harbison, Hohfeld and Herefords: The Concept of Property and the Law of the Range, 22 N.
made as a digital contract like a smart contract or a ricardian contract. See section 3.2.3.
103 AIRL, p. 504
104 This analogical (case-based) reasoning has been prominent in the anglo-American common law
tradition, cf. Legal Reasoning, Phoebe C. Ellsworth, The Cambridge Handbook of Thinking and
Reasoning, edited by K. J. Holyoak and R. G. Morrison Jr., 685-704. New York: Cambridge Univ. Press,
2005, p. 687.
105 ULDLLR, p. 42-43 exemplified with the use of Benjamin N. Cardozo’s opinion of Justice in New York
State Court of Appeals in Jacob & Youngs, Inc. v. Kent 230 N.Y. 239, 129 N.E. 889 (1921).
106 An Introduction to Legal Reasoning, Edward H. Levi, The University of Chicago Law Review, volume
15, number 3, spring 1948(now AILR),p. 503. Concerning words having new meanings see the issue of
ontology understood as explicit formal specification of a shared conceptualization, cf. A Translation
Approach to Portable Ontology Specifications, Thomas R. Gruber Knowledge Systems Laboratory,
Technical Report KSL 92-71 to appear in Knowledge Acquisition, 1993, p. 1.
107 Artificial Neural Networks and Legal Categorization, Filipe Borges, Raoul Borges, Danièle Bourcier,
Legal Knowledge and Information Systems, Jurix 2003: The Sixteenth Annual Conference, IOS Press,
2003, p. 15.
108 The Uses and Abuses of Neural Networks in Law, Michael Aikenhead, Santa Clara High Tech.
26
probabilistic approach in the quantum mechanics and qubit augmented legal
method solves this issue, as a definite result is not given.
2.3.1.2.1 Finding all the Relevant Input in the Case That Needs to be Solved
For the artificial neural network to function optimally, it is vital for the
artificial neural network to have the correct input.
In a civil court case a substantial amount of the relevant input comes from
the plaintiff and the defendant. This input is not enough, as legal reasoning
also involves considerations about social objectives and effects, the
institutional characteristics of law, the normative system a given norm is a
part of as well as the cost-benefit- or game-theoretical analysis that the
legislator based the law on.110 Therefore it is difficult to define all the input
necessary for an artificial neural network to understand and implement all of
these principles.
As described in section 2.3.1.2.3 we can not know with certainty how the
judge was actually reasoning. Therefore we have to assume that in
accordance with the principle of legal certainty and the principle of infinite
regress, the judge does mention every consideration the judge makes in the
legal reasoning given by the premises of the case.
110 Law and Logic: a Review from an Argumentation Perspective, Henry Prakken and Giovanni Sartor,
19th of August 2015, pp. 1-3.
111 See the example with passing a law regarding infinite regress in: What is an Infinite Regress
27
If the judge oversees or does not explicitly mention every consideration the
judge made in the premises of a case, it is a subject of criticism. The thereby
following lack of transparency is a hindrance of the rule of law and the right
to a fair trial, which requires an independent judiciary.112 The reasoning
behind this statement is that when every consideration is not mentioned by
the judge, it is possible that the judge included considerations, which are
conflicting with these fundamental democratic principles.
112 The Rule of Law, Tom Bingham, Penguin Books, 2010, pp. 92-98.
113 Special Report: Data, Data everywhere, Clicking for Gold – How internet companies profit from data
on the web, The Economist, Feb. 27, 2010, at 9.
114 The Web Bug FAQ, Richard M. Smith, Electronic Frontier Foundation, 11th of November 1999, v. 1.0.
115 See as a current example GDPR, art. 22 and recitals 71, 72 and 91 as well as the Article 29 Working
Party, wp251.
116 D. Hunter, Looking for Law in all the Wrong Places: Legal Theory and Legal Neural Networks, in: A.
Soeteman (eds.), Legal knowledge based systems JURIX 94: The Foundation for Legal Knowledge
Systems, Lelystad: Koninklijke Vermande, 1994, p. 59.
117 Commercializing Legal Neural Networks, Dan Hunter, Warwick Electronic Law Journals, Journal of
28
artificial neural network reflect the “rule”, even though the “rule” might not
be actual legal reasoning that is applicable to the given legal problem. 121 In
this context it does not matter if the cases are constructed by an expert in
the given legal field,122 which also follows from the courts not having the
competence to make decisions on hypothetical questions.123 124
This also applies to constructing hypothetical facts such as applying the chi
squared test125 in mathematical calculations of the legal value of given facts.
126
Despite the contrary written in the legal literature 129 it can not be incited to
be hesitant with using contradictory cases as training data. Not including
contradictory cases would simply be a manipulation of the complete dataset.
para. 26, PreussenElektra, C-379/98, para. 39 and Canal Satélite Digital, C-390/99, para. 19. In US law
however it seems like the courts are somewhat more open to hypothetical questions being a part of
their legal reasoning, cf. The Supreme Court’s Use of Hypothetical Questions at Oral Argument, E.
Barrett Prettyman Jr., Catholic University Law Review, Volume 33, Issue 3, Spring 1984, article 4.
124 An exception is the anticipatory breach of contract which can be exemplified by CISG, art. 71(1)
where there needs to be objective grounds showing substantial probability of non-performance, cf.
Anticipatory Breach under the United Nations Convention on Contracts for the International Sale of
Goods, Mercédeh Azeredo da Silveira, Nordic Journal of Commercial Law, Issue 2005 #2, section
II(2)(a).
125 X. On the criterion that a given system of deviations from the probable in the case of a correlated
system of variables is such that it can be reasonably supposed to have arisen from random sampling,
Karl Pearson F.R.S., The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science,
Series 5, Volume 50, 1900, Issue, pp. 157-175.
126 Case C-82/13 Regione Abruzzo, para.14.
127 Making a neural network that can solve all types of cases also has the advantage that the neural
network is not dependent on the classification of cases made by a human, which could decrease the
error rate.
128 Commercializing Legal Neural Networks, Dan Hunter, Warwick Electronic Law Journals, Journal of
29
leading cases contradict older cases, the artificial neural network should be
able to make its own reasoning by taking into account:
- to be able to figure out why the new or old case might be legally
wrong.
It has been suggested in the legal literature that articulating the network’s
knowledge base as “if-statements”131 makes it possible to combine an
artificial neural network with a rule-based expert system.132
130 Possibly gaining notoriety and mass appeal as a label on the issue after release of: The Black Box
Society, The Secret Algorithms That Control Money and Information, Frank Pasquale, Harvard
University Press, 2015.
131 An if-statement creates a branch in the code and makes it possible for the program to chose
between one or more following computational steps for the input, cf. Learn Python the Hard Way – A
Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code, Zed Shaw, 3 rd
Edition, 2014, pp. 102-105.
132 A Neural Network-based Law Machine: The Problem of Legitimacy, David R.Warner Jr., Law,
30
Therefore the artificial neural network must be able to write its legal
arguments and conclusions as humans write legal arguments and conclusions
in a human language (natural language) like English. However, this does not
solve the “black box”-issue, because it is still unknown what happened in the
hidden layer.
Even though we can read what the person wrote, there is no way we can
know for sure what the person was thinking. As artificial neural networks are
modelled after the neurons in the brain, it is plausible to make the analogy
that there is a “black box” as well, when humans solve legal problems, which
is the brain.
We can not know with certainty, what the brain was thinking when solving
the problem, even if we ask the person. However AI has been used for mind
reading in real-time with 90% accuracy with real-time neural speech
recognition (rtNSR) on cortical recordings when repeating a sentence several
minutes in 2018.134 However the technology has not found a wide
application in courts etc. or an application without repetition of specific
sentences.
134Real-time Classification of Auditory Sentences Using Evoked Cortical Activity in Humans, David A.
Moses, Matthew K. Leonard and Edward F. Chang, Journal of Neural Engineering, 27th of February
2018, Volume 15, Number 3. However the technology has not found a wide application in courts etc. or
an application without repetition of specific sentences. See in same direction with relation to imagined
objects: Generic Decoding of Seen and Imagined Objects Using Hierarchical Visual Features,
Tomoyasu Horikawa & Yukiyasu Kamitani, Nature Communications 8, Article number 15037 (2017),
published 22nd of May 2017.
135 Artificial Neural Networks and Legal Categorization, Filipe Borges, Raoul Borges, Danièle Bourcier,
Legal Knowledge and Information Systems, Jurix 2003: The Sixteenth Annual Conference, IOS Press,
2003, p. 19.
136 For a further discussion on industry standards and discrete legal phrases with a similar meaning, see
section 3.2.6.
31
of hidden layers, as future research shows that it is achievable to get a better
understanding of the process within the hidden layers.
There is therefore more clarity when using artificial neural networks to solve
legal problems than when the human brain solves legal issues, which makes
the “black box”-issue irrelevant. This is contingent on the artificial neural
network being able to write its legal arguments and conclusions in a human
(natural) language.
A more complete answer will have to await the discovery of the limits of
each of the technologies. Hereafter a well argued ethical decision has to be
made on, which pro and cons are preferable.
On the other side it has been argued in the literature that not all legal
reasoning is parallel. 138 However, reaching the conclusion that not all legal
reasoning is parallel does not eliminate that some legal reasoning is parallel.
Artificial neural networks can solve problems using parallel computing 142 but
the parallelization of artificial neural network’s training still takes an
unreasonable amount of computation time.143 The reduction on the training
137A Neural Network-based Law Machine: The Problem of Legitimacy, David R.Warner Jr., Law,
Computers & Artificial Intelligence, Volume 2, No. 2, 1993.
138 The Uses and Abuses of Neural Networks in Law, Michael Aikenhead, Santa Clara High Tech.
1993.
143 Parallel and Distributed Deep Learning, Vishakh Hegde, Sheema Usmani, Stanford University, 2016.
32
time also seems to stagnate after a certain point even though additional
nodes/neurons are introduced.144 This issue makes parallel computing in
artificial neural networks difficult to find practical application.
144 Parallel Computing for Artificial Neural Network Training using Java Native Socket Programming,
Haidar Sharif & Osman Gursoy, Periodicals of Engineering and Natural Sciences, Vol. 6, No. 1, February
2018, pp.1-10.
145 The Quest for a Quantum Neural Network, Maria Schuld, Ilya Sinayskiy, Francesco Petruccione,
Quantum Information Processing, Volume 13, Issue 11, November 2014, pp. 2567-2586.
146 An Artificial Neuron Implemented on an Actual Quantum Processor, Francesco Tacchino, Chiara
Macchiavello, Dario Gerace, Daniele Bajoni, NPJ Quantum Information; London, Volume 5, Article
number: 26, 29th of March 2019, p. 1.
147 The Perceptron: A perceiving and recognizing automaton, F. Rosenblatt, Tech. Rep. Inc. Report No.
Macchiavello, Dario Gerace, Daniele Bajoni, NPJ Quantum Information; London, Volume 5, Article
number: 26, 29th of March 2019, p. 1.
149 Quantum computations without definite causal structure, Chiribella, G., D’Ariano, G. M.,
33
2.3.1.2.5 Error Margin
When applying artificial neural networks to legal issues using back-
propagation there will be a margin of error, which is defined as the
difference between the desired and actual output.153 The margin of error in
hidden layers may in some cases be included in the margin for each discrete
assessment. When this is not the case, however, materially wrong legal
conclusions could be made.
It is stated in section 2.3.1, that the use of data driven decision making in
legal assessments does not exclude that there may also be discretionary
considerations in the assessment, and that the uncertainty associated with
the specific data in these situations may indicate the scope of the specific
margin of discretion, which accrues the legal processional. It should be made
clear that it is a condition that the margin of error can be included in the
margin of the discretionary assessment.
It can not be stressed enough that the error margin should always be
presented to the user of the AI for the user to make duly informed legal
decisions based on the legal reasoning of the AI.
The assessment must be rooted in the legal method which has already been
described in rich detail in the legal literature 154 and seek the objective of
being as scientifically correct as possible, thus by definition being a semi
quantitative analysis due to a case law analysis not being sufficient 155 despite
being a qualitative analysis.156
153
Learning Representations by Back-Propagating Errors, David E. Rumelhart, Geoffrey E. Hinton &
Ronald J. Williams, Nature 323, 533-536(1986), p. 534.
154 See a few of many examples: Legal Method and Reasoning, Sharon Hanson, 1st Edition, 30th of June
2003. Introduction to Legal Method, John Hynes Farrar, Anthony M. Dugdale, Sweet & Maxwell, 1984.
Legal Research: how to Find and Understand the Law (LEGAL SKILL SERIES), 1st Edition, 16th of
November, 1993.
155 Using all relevant factual circumstances and applying the factual circumstances that are
differentiated from the factual circumstances in the relevant case law also plays a significant role in the
legal reasoning, which leaves a non-quantitative margin in an otherwise quantitative analysis.
156 See as an example of the analysis principles in Qualitative and Semiquantitative Analysis, Eugene P.
34
Without the use of data-driven decision making the probability distribution
can be discretely assessed through a review of the relevant case law as a
main starting point. The review of the case law must have room for an
individual assessment of the factual circumstances concerning the current
legal issue, which might differentiate the current legal issue from previous
legal issues reflected in the case law.
157 Conditions for intuitive expertise: a failure to disagree, D. Kahneman, G. Klein, The American
Psychologist, September 2009, 64(6), pp. 515-26.
158 This would also make the idea of legal experts in a given legal disciplines illusory. When it comes to
difficult legal issues the differentiation between experts and everyone else is in the ability to fully
understand and apply the legal method by also applying all the relevant factual circumstances in a
case. Learning to apply the legal method correctly is possible in any given legal discipline and can be
applied to other legal disciplines. It could even be argued that trying multiple legal disciplines improves
the understanding of the legal method compared to a legal expert in a given field that solves similar
problems over and over and therefore does not have to rely on legal method.
However this is not the same as insinuating that having expertise in given legal disciplines would not be
advantageous. The advantage would then be in being able to solve cases faster and therefore being
more cost effective for the client, given that the price policy is transparent.
The paradox in these situations is the advantage for the non-legal in-house representative of a client to
pick a legal expert because it would clear the in-house representative of any responsibility for the
result of a case by simply claiming that the best possible legal representative was chosen in order to
maximize the winning chances. This approach to legal issues would give the legal expert an incitement
to spend/bill unreasonably long time on a case to make it seem like a lot of effort went into the case
and drive prices upwards. This is despite the lack of winning probability gained by falsely assuming that
expertise is bound to working intensely with specific legal disciplines.
159 This seems contrary to the undocumented opinion that human assessment by the use of so called
“mental models” under certain undefined conditions(they seem to be personal experience which
would notoriously be subjective) dramatically can improve one’s ability to make assessments on a case,
cf. Quantitative Legal Prediction – or – How I Learned to Stop Worrying and Start Preparing for the
Data-Driven Future of the Legal Services Industry, Daniel Martin Katz, Emory Law Journal, Volume
62:909, p. 928.
35
2.3.3 Probability Distribution Approximation (Contracts)
(Superposition* and Superposition†)160
Regarding superposition* the principle of party autonomy, when it comes to
writing contracts, makes it possible for the parties to decide which parts of a
contract should be factual circumstances, and which parts should be
considered a source of law that is regulating the legal relationship.
The stronger party also has the advantage of buying better legal
professionals and therefore maybe increasing the winning chances, either
due to increased professionalism or due to the time spent on the legal
reasoning by the legal professionals.
160 Even though it can seem like there is a duality in the probability approximation/risk assessment
both superpositions regards legal uncertainty, cf. DLR, p. 11 of the paper.
161
See section 3.2.3 for a further explanation of RNG.
162 See section 3.2.3 for a further explanation of lex cryptographia.
36
between the parties, when the parties initially would rather want an
uncomplicated solution and continue doing business with each other. RNG
would also increase the risk predictability, which could be an advantage from
a quant point of view.163
There is nothing that prevents the testimonies from falling out differently
than expected, even if the person has been spoken with before going to
court.
In some legal systems it can be punishable, if a witness does not speak the
truth under oath (also named perjury), which can be assumed to be a
protection against these uncertainties.168 However, this is dependent on that
the legal professional is aware of the truth on an objectively observable
basis, which in most cases is either not the circumstances or would result in
that there would be no reason to initiate a lawsuit. It is further complicated
by the fact that the person giving the testimony might be mistaken by the
legal professional listening to the testimony; the person might have
forgotten the exact facts or might be mistaken in the memory of the
incident.
163 For further considerations about quant in legal issues see section 2.5.
164 DLR, p. 10 of the paper.
165 Basel Committee on Banking Supervision 2006, note 97.
166 Furthermore a distinction can be made between the legal and factual uncertainty concerning
deontic norms and qualification norms respectively, cf. DLR, p. 10 of the paper.
167 The legal uncertainty and the evaluation of the probability for a given outcome has already been
chapter 6 1 and 2 Geo 5 with later modifications and amendments by the Criminal Justice Act 1967 (c.
80), s. 89(2), Criminal Justice Act 1948 (c. 58), s. 1(1), Magistrates' Courts Act 1980 (c. 43), s. 106(2) and
Civil Partnership Act 2004 (c. 33), ss. 80(4), 263(2); S.I. 2005/3175, art. 2(1), Sch. 1; In EU-law: Court of
Justice of the European Communities (Perjury) Act, 1975.
169 Written annexes.
37
Furthermore the person giving the testimony or the nature of the evidence
can provoke a bias in the legal professional.
One of these biases seems to be that technical evidence can merely presume
the content of the facts while a witness can create a conviction within the
judge.170 Based on the above uncertainties regarding the content of a
testimony, such a bias may seem rationally inexplicable.
It is also possible that technological developments will affect this bias
towards the judge being convinced by technical evidence, while a witness
can create a presumption. Hereby a new bias occurs, because the technical
evidence also has its weaknesses:
Cognition 27.
174 Se as an example Schwey, N.A. et al. (2013). ”The Influence of a Defendant’s Body Weight on
38
2.4 Ab Initio
As mentioned in section 1.1, there are time periods when the legal
professional is required to consider legal issues relating to a variety of
technology constantly being developed, which are not yet fully regulated in
the law. Therefore, there is a need for a legal methodological basis that
effectively hinders precedents based facts given by old technology and fills
the gaps in existing legislation that does not explicitly include the new
technology.
The methodological basis for this can be provided by using a number of ways
to rationalize, which point in the same direction:
Similar rationale can be used in legal reasoning under the same Latin phrase
ab initio which will be defined in the following:
Where sources of law describe a given legal context, ab initio may reflect the
principles of a teleological interpretation which also takes into account the
purpose, values, and the legal, social and economic goals the law aims to
achieve. See section 3.1 for a practical example.
Domstolens blinde øje – Om betydningen af ubevidste biases i retssystemet, Jesper Ryberg, Jurist- og
Økonomforbundets forlag, 1. udgave, 2016
Kahneman, D., Slavic, P., & Tversky, A. (Eds.) (1982}. Judgment Under Uncertainty: Heuristics and
Biases. Cambridge, UK: Cambridge University Press
Ellsworth, Phoebe C. "Legal Reasoning." In The Cambridge Handbook of Thinking and Reasoning, edited
by K. J. Holyoak and R. G. Morrison Jr., 685-704. New York: Cambridge Univ. Press, 2005.
176 Molecular Modelling – Principles and Applications, Andrew R. Leach, Pearson Education Limited, 2nd
Edition, p. 65.
177 Molecular Orbital Calculations of the Lower Excited Electronic Levels of Benzene, Configuration
Interaction Included, Robert G. Parr, David P. Craig and Ian G. Ross, The Journal of Chemical Physics,
Vol. 18, Issue 12, 1561(1950).
39
In situations where an analogy of the wording of the applicable law can be
used, ab initio, to a large extent, constitutes the principles of functional
equivalence as described in United Nations Conference on Trade and
Development, Dispute Settlement, International Commercial Arbitration, 5.9
Electronic Arbitration178, p. 51 hereunder namely note 101-103. A practical
example follows in section 2.4.1.1 - 2.4.1.3 about my legal definition of
virtual currency in Danish law in 2016, which has been isolated for the sake
of clarity.
Overall, ab initio can be defined in a legal context as: A use of the functional
equivalence, teleological interpretation and / or the definition of the physical
functions of a physical phenomenon that relates only to the most
fundamental functions and purposes of the physical phenomenon.
178 UNCTAD/EDM/Misc.232/Add.20.
40
to a lack of common features which leads to partial and overlapping
resemblances.179 Ab initio does not have these limitations, since ab initio is
not bound by a comparison, even though comparisons can be made.
179 Defining legal risk, Tobias Mahler, Paper presented at the conference “Commercial Contracting for
Strategic Advantage – Potentials and Prospects”, Turku University of Applied Sciences 2007, published
in the Conference Proceedings on pages 10-31, pp. 5-6.
180 Bitcoin: A Peer-To-Peer Cash System, Satoshi Nakamoto, 2008(now P2PCS), p. 2.
181 Lærebog i obligationsret I - Ydelsen Beføjelser, Mads Bryde Andersen og Joseph Lookofsky, 3.
41
Therefore it follows that a currency must be a monetary standard used in a
monetary system belonging to a government.
This point of view is also consistent with the point of view presented in
Skatterådet’s decision in SKM 2014.226 SR regarding the definition of
“currency” in accordance with skattekontrolloven. 183 It can also be deduced
from SKM 2014.226 SR that virtual currency is not a foreign currency due to
the blockchain.184
The blockchain which is the system behind virtual currencies that are known
at the moment is a peer-to-peer system and thereby decentral. A peer can
create new blocks in the blokchain, and it is inter alia in this way that Bitcoins
are created.185 Therefore Bitcoins are not in accordance with the definition of
a currency, due to the blockchain being decentral.186
(section excluded)
183 The decision is based on the remarks on L 422 of the 6th of June 2005 (LF 129 2004/2005 om
udarbejdelse af skattemæssigt årsregnskab i fremmed valuta) where InvesteringsForeningsRådets
consultation response regarding skattekontrollovens § 3 C, stk. 3 states, that an official exchange rate
given by a central bank is required for a currency to exist.
184 This is a wrong assessment. It is possible that a blockchain is owned by a government.
185 P2PCS, p. 4
186 See also P2PCS, p. 1 and 3
42
2.4.1.1 The Performance
The performance that a virtual currency consists of can technically be
described as a series of digital signatures.187
It happens that these virtual currencies are bought and sold for regular
currencies by third parties, who have no affiliation with the provider of the
game. However, currencies in game are not intended to serve as a means of
payment outside the game, which is generally also stated in the terms of use
of the game provider. Trading currencies in games thus takes place outside of
the gaming provider and is not allowed by the gaming provider, who will be
able to make a claim against the third party for breach of the terms of use.
A criterion must therefore be made that the virtual currency must include
the purpose of serving as a mean of payment.
Another type of virtual currency is virtual currency that can be purchased for
a regular currency but cannot be resold to the issuer. Using the example of
"gold" from World of Warcraft, this would be the case if “gold” could be
purchased by Blizzard who is the game provider, but cannot be sold back to
Blizzard for a regular currency. Thus, this kind of virtual currency acts as a
payment surrogate after Betalingstjenesteloven, Chapter 10.
Thus, the virtual currency must be able to both be bought and sold for
regular currency and therefore be bidirectional, cf. the Danish translation of
case C-264/14 Hedqvist, para. 24.
187 P2PCS, p. 2
188 Virtual Currency Schemes, European Central Bank, 2012(now ECB), section 2.1.
43
2.4.1.2 The System
Since the virtual currency is virtual, the monetary system must necessarily be
digital and must cause virtual currency to be bidirectional.
A virtual good whose value is tied to a physical good will, however, have a
very stringent course that follows the physical good to which the virtual good
is bound.
The reason is that if the value of the virtual currency is lower than the value
of the physical good to which the currency is tied, users would buy the virtual
service and sell the virtual currency in exchange for the physical good and
gain a profit. This would increase the price due to the higher demand for the
virtual service until the price of the physical good was achieved. Visa versa,
the demand for the virtual service will fall if the virtual currency value
exceeds the value of the physical good, otherwise the physical good could be
sold for the currency and gaining a profit.
Although the users formally buy and sell a virtual good, it is actually the
physical good that is being traded, and the good is merely represented by the
virtual currency. In these situations, therefore, there is no monetary system,
but a system for exchanging this virtual representation of the physical good
and for this reason, there is no virtual currency.
The decentralized system also means that the virtual currency does not have
an issuer.189 However, it cannot be excluded that there will later be forms of
virtual currency that have an issuer and not a decentralized system, but still
functions in a digital system.
189
Cf. Virtuelle Valutaer, Nationalbanken, Betalingsformidlingskontoret, Anders Laursen and Jon
Hasling Kyed, Danmarks Nationalbank, Monetary Review, 1st Quarter, 2014.
44
or a group of companies from making a virtual currency on the basis of a
blockchain that they have ownership of. In these cases, there will still be a
currency whose purpose is that the virtual currency should serve as a general
means of payment.
45
2.5 Conclusive Remarks
In practice, the augmentation of the legal method places significantly stricter
demands on the legal professional than ever before.191 These demands are
beyond the legal professional’s core competence, which are the deductive
syllogisms with premises of predominantly non-scientific nature.192 The legal
methodological basis is not necessarily adequately described in the legal
literature due to the constantly advancing technological development and
also requires in-depth knowledge of mathematics and physics when the facts
are technical. 193
The most important question: “Is this legal professional’s efforts even
profitable or should I pick another legal professional to solve this issue?”
could also be answered using quant.
This could lead to a paradigm shift in, how we perceive who the “best” legal
professionals are; from being the best at legal reasoning to being the most
profitability efficient. 195
Whether humans have jobs in the business of legal advice might therefore
depend on, whether the efforts of a human combined with the efforts of AI
are more profitable than the sole use of AI, when the cases are only about
money.
191 Futhermore the increased application of technology to a broader variety of every day events makes
it is questionable whether it is sufficient with a specific court like The Technology and Construction
Court that also deals with claims relating to the design, supply and installation of computers, computer
software and related network systems, cf. The UK Ministry of Justice, CPR - Rules and Directions, Part
60 – Technology and Construction Court Claims, PRACTICE DIRECTION 60 – TECHNOLOGY AND
CONSTRUCTION COURT CLAIMS, para. 2.1. “TCC claims”, litra (e) that involves issues or questions
which are technically complex, cf. The UK Ministry of Justice, CPR - Rules and Directions, Part 60 –
Technology and Construction Court Claims, 60.1(3), litra (a).
192 Evidence is not bound to be scientific, and the law is not created on a scientific basis, but originates
from the democratic process at least in the western world.
193 This is specially an issue for the countries that do not use the common law approach.
194 Quantitative Legal Prediction – or – How I Learned to Stop Worrying and Start Preparing for the
Data-Driven Future of the Legal Services Industry, Daniel Martin Katz, Emory Law Journal, Volume
62:909, pp. 928-929.
195 Compared to the comments in Quantitative Legal Prediction – or – How I Learned to Stop Worrying
and Start Preparing for the Data-Driven Future of the Legal Services Industry, Daniel Martin Katz,
Emory Law Journal, Volume 62:909, pp. 932-936.
46
the human legal reasoning increases the probability of a correct result or a
win. See also note 158.
47
Part 3: Practical Subjects
48
3.1 Personal Data and the Quantum
Computer
For an immediate consideration, it is only anonymisation that poses
distinctive challenges beyond what would be the circumstances with any
other technological innovation. Therefore, it is only anonymisation which is
described below in relation to the laws about personal data.
196For a more philosophical explanation of the quantum information concept and the demarcation of
information in general, a reference can be made to: Quantum Information Theory and the Foundations
of Quantum Mechanics, Christopher Gordon Timpson, D.Phil. thesis submitted Trinity Term 2004 at the
University of Oxford, vivaed august 2004, LaTex, 250pp.
197 “Machines, Computations, and Universality: Third International Conference”, MCU 2001 Chisinau,
Moldava, May 23-27, 2001 Proceedings, Maurice Margenstern, Yurii Rogozhin, Springer, 29th of June
2003, p. 41, namely note 6.
198
Advanced visual quantum mechanics, Bernd Thaller, Springer Science & Business Media, 6th of
December 2005(now AVQM), p. 170.
199 Quantum Information and Consciousness: A Gentle Introduction, Danko D. Georgiev, CRC Press, 6th
from Albert Einstein to Max Born, Ref. 11, p. 158, cf. Speakable and unspeakable in quantum
mechanics – Collected papers on quantum philosophy, J.S. Bell, Cambridge University Press, 1987, p.
143, note 8. Einstein did not think, that ”entanglement” was possible, but as time would reveal,
Einstein was wrong.
201 AVQM, p. 170, namely note 5.
202
Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states, Charles H.
Bennett and Stephen J. Wiesner, Phys. Rev. Lett. 69, 2881 – Published 16th of November 1992.
49
the form of quantum information is hereby anonymised in such a way that
the quantum information falls outside the scope of GDPR,203 cf. GDPR recital
26.
The GDPR also does not explain how anonymisation can be done practically,
which the Article 29 group has tried to elucidate, as there is no standard of
anonymity in the legislation.208 Furthermore, a distinction is made between
two basic types of anonymisation by randomization and generalization,209
while nothing prevents making combinations of these.210
203 Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (General
Data Protection Regulation - "GDPR").
204 It should also be noted that the GDPR is a regulation and Article 288 of the TFEU provides that a
Act of 2018, which comes into force the 1st of January 2020, cf. Assembly Bill No. 375, Chapter 55, An
act to add Title 1.81.5 (commencing with Section 1798.100) to Part 4 of Division 3 of the Civil Code,
relating to privacy. See namely section 1798.198(a).
206 An independent European working group set up under article 29 in directive 95/46/EC, whose tasks
are described in article 30 of directive 95/46/EC as well as article 15 in directive 2002/58/EC. The
Article 29 Working Party only has advisory status, cf. directive 95/46/EC, art. 29(1) and art. 30(1)(c),
and only gives opinions, cf. art. 30(b).
207 ”Opinion 05/2014 on AnonymisationTechniques”, Article 29 Dataprotection Working Party, adopted
209For a comparative analysis of some of these anonymisation methods see: Connecting Randomized
Response, Post-Randomization, Differential Privacy and t-Closeness via Deniability and Permutation,
Josep Domingo-Ferrer, Jordi Soria-Comas (Submitted on 6 Mar 2018).
210 Opinion, pp. 11f.
211 Opinion, pp. 12f.
212 Utilizing Noise Addition for Data Privacy, an Overview, Kato Mivule, Proceedings of the International
Conference on Information and Knowledge Engineering (IKE 2012), 16th of September 2013, pp. 65-71.
50
then deliberately added noise without a pattern to the anonymised dataset.
The data controller can then, by comparison with the original dataset, clarify
how much noise is to be added and in what way.213
Because quantum information does not add noise or permute personal data
as a result of the ”no-teleportation theorem”, it is clear that quantum
information is not randomization, when the quantum information is intact.
Since quantum information does not divide personal data into groupings due
to the ”no-teleportation theorem”, it is clear that quantum information is not
a generalization.
213 Opinion, p. 15 f. with reference in note 14 to Dwork, C. (2006), Differential privacy. In Automata,
languages and programming (s. 1-12), Springer Berlin Heidelberg, as well as a reference in note 15 to
Ed Felten (2012), Protecting privacy by adding noise.
214 Opinion, p. 13f.
215 Opinion, p. 16
216 Opinion, p. 16
217 L. Sweeney. k-anonymity: a model for protecting privacy, International Journal on Uncertainty,
Li, Tiancheng Li, Suresh Venkatasubramanian, 2007 IEEE 23rd International Conference on Data
Engineering, 4th of June 2007.
51
However, it should be pointed out that the Article 29 Working Party has not
indicated that it has provided an exhaustive list of methods of
anonymisation.219
The anonymisation must be both in relation to the data controller and a third
party.221
It should also be pointed out that the Article 29 Working Party recognizes
that no anonymisation technique is flawless per se.222 This means that there
is a de minimis limit on, how personal data processing has been ineffective
when it comes to being irreversible, without the data processing losing its
character of being an anonymisation.
However, the data controller will still be able to identify the specific personal
data, in spite of the fact that there is only quantum information available.
52
The damaged coherent data will then be anonymised in cases where the
conditions of singling out, linkability and inference are met and thus covered
by the GDPR, preamble recital 26.
226
Inverting Quantum Decoherence by Classical Feedback from the Environment, Francesco Buscemi,
Giulio Chiribella, and Giacomo Mauro D’Ariano, Phys. Rev. Lett. 95, 090501 – Published 23rd of August
2005, p. 1.
53
3.2 Contracts on Quantum-Computing-as-a-
Service(QCaaS)
Since most people do not own a quantum computer, access to a quantum
computer can instead be acquired via a cloud solution; also referred to as
quantum-computing-as-a-service(QCaaS).227 QCaaS offer a conjunctional use
with classical computers which increases their likeliness to be used in the
time period, where the quantum computer does not have the same
commercial viability as the classical computer. 228
Special programming languages are also used when using QCaaS and
quantum simulators, where for example LIQUi|> and Q#234 can be
mentioned.
In a legal context, the obvious main principle can then seem to be that one
should initiate by understanding the cloud computing contracts if one wants
to understand, how a QCaaS contract should be constructed.235
However, this is hardly the case as QCaaS contracts already exist. In addition,
knowledge of QCaaS's distinctive features is required, whereby the legal
issues that arise with these features can be duly taken into account in the
legal reasoning reflected in the clauses of the contract. However, it is not
hereby stated that cloud computing contracts are useless, they are just not
the initial starting point, and on the contrary must, methodically, constitute a
final supplement when it comes to compiling knowledge that is applied in the
final QCaaS contract.236 237
G. Joneckis, Hannah Acheson-Field, Iain D. Boyd, Benjamin A. Corbin, Queying Han, Robert N. Rozansky,
IDA Science & Technology Policy Institute, 2017, p. 85.
229 https://www.dwavesys.com/home
230 https://quantumexperience.ng.bluemix.net/qx
231 https://rigetti.com/
232 http://stationq.github.io/Liquid/
233 http://www.quantumplayground.net/#/home
234
https://docs.microsoft.com/en-us/quantum/language/?view=qsharp-preview
235 A Quantum Leap?: The potential legal implications of the quantum computing revolution, Andrew
Standards Customer Council, Practical Guide to Cloud Service Agreements, version 2.0 of April 2015.
54
However, a number of the "terms and conditions" that can be found for
QCaaS have not been the subject of independent negotiation inter partes,
whereby these adhesion agreements are primarily for the benefit of the
service provider and thus, do not address some of the issues I address below.
However, there may be more contractual material than just the available
terms and conditions, if the strength of the contracting parties is more equal,
which, however, is not available to the public. Because I do not have more
access to these documents, I do not have the opportunity to delimit the full
contractual basis.
A number of the concrete practical issues for QCaaS that influences the
QCaaS contracts will be discussed below, as well as other key agreement
clauses in an agreement between the service provider and the customer. It
must be emphasized that the issues do not constitute an exhaustive list,
which is not practically possible as the parties to the agreement may have
specific requirements for their specific contract.
3.2.1 NIS-Directive
The definition of a cloud computing service is given in the NIS Directive, art.
4(19) as a digital service that enables access to a scalable and elastic pool of
shareable computing resources, which is further specified in recital 17:
238Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning
measures for a high common level of security of network and information systems across the Union, OJ
L 194, 19.7.2016, pp. 1–30.
55
In light of this broad conceptual understanding of "cloud computing
service"239 and a dynamic interpretation, QCaaS will also be covered. The NIS-
directive must therefore be taken into account in relation to the contract
between the service provider and the customer. A clause can be made
whereby the service provider is obliged to comply with the NIS-directive and
the derived domestic legislation of the relevant member states, which must
be interpreted in conformity with the directive.240
239 The definition of cloud computing services in the NIS-directive is for the specific purpose of the
Directive, and without prejudice to any other instruments, cf. recital 55.
240 Case 14/83 Von Colson, para. 27.
241 ENISA Briefing: Quantum Key Distribution, ENISA, 27. November 2009(now EBQKD).
242 EBQKD, pp. 3f.
243 A Quantum Leap in International Law on Cyberwarfare: An Analysis of International Cooperation
with Quantum Computing on the Horizon, Dominic Rota, 8th of November 2018.
244 A Quantum Leap in International Law on Cyberwarfare: An Analysis of International Cooperation
with Quantum Computing on the Horizon, Dominic Rota, 8th of November 2018, Section IV:
Approaches to International Uniformity on Cyber Policy, litra a.
56
Instead of just listing the already known crimes and warfare acts in the law
this approach makes it possible to take into account actions, which are not
yet regulated, but might be regulated in the future hence enabling staying a
head of the evolution of the law.
One could argue that one approach is better or preferred over the others.
However in the light of contract drafting being a way of reducing the risks of
unwanted scenarios and giving the contracting parties the optimal
possibilities of taking every relevant matter into account, the optimal
solution would be to use all three approaches. They don’t have to be
reflected in the final draft, but the process towards the final draft should
reflect considerations, when it comes to all three approaches.
Another way of limiting the risk of QCaaS being unlawfully used is by having
procedures for being able to identify the customer (KYC) as well as having
requirements that the customer must meet to make sure, the customer has
taken reasonable actions towards making sure, a hacker cannot get access to
the QCaaS through the customer.
When the code in a digital system follows the lex superior derogat legi
inferiori principle, and all written interpretations must be disregarded when
describing the code etc., the code can be described as lex cryptographia.246
Then, there is the possibility of a paradigm shift: From the rule of law 247 to
the rule of code.
More generally, it can be argued that the source code is lex cryptographia,
when the code is the sole basis for the management of man-made interests.
The management can be executed by using a digital contract, but also
artificial intelligence and other algorithms in general.
As quantum processors and qubits are also the subject of programming, and
thus source code, cf. section 3.2, there is basically nothing which suggests
245 Furthermore see Directive (EU) 2016/943 of the European Parliament and of the Council of 8 June
2016 on the protection of undisclosed know-how and business information (trade secrets) against their
unlawful acquisition, use and disclosure.
246 Decentralized Blockchain Technology and the Rise of Lex Cryptographia Wright, Aaron and De
57
that it should be possible to create yet another distinction in the paradigm
shift, which could be coined lex quantum.
However, the content of such a principle, and whether there is a basis for
such a distinction, is so far unresolved, whereby this should be further
elucidated.
Due to the arbitrary nature of the damage and thus the arbitrary result
thereof, it seems, although theoretically possible, to be practically
inappropriate, if the law or the content of an agreement was formed on the
basis of coincidence. This is further supported by the fact that, as far as the
author is aware, there is no demonstrable data on digital contracts being
formed on the basis of the principles of random number generators (RNG)
despite the fact that RNG is used in cryptography.248 249
248For example, RC4 by Ron Rivest, which was invented in 1987 and among other things used to
protect internet traffic by SSL protocols, cf. Advances in Cryptology - CRYPTO 2008: 28th Annual
International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, p. 297.
58
contract252 or ricardian contract253 can be enforced digitally without the use
of middlemen.
detailed definition of the individual concepts, see ”Mastering Ethereum: Building Smart Contracts and
DApps”, Andreas M. Antonopoulos, Gavin Wood, O'Reilly Media, Inc., 13th of November 2018, XXIX
quick glossary.
255 Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto, 2008, p. 2.
256 Inspired by the idea of smart cities, cf. Understanding Smart Cities: An integrative Framework, 2012,
45th Hawaii International Conference on System Sciences, H. Chourabi, T. Nam, Shawn Walker etc.
Smart laws can supplement the written agreement, by being accepted by the entire digital ecosystem
and thereby regulate the individual digital contracts. Furthermore, smart laws can regulate the
relationship between the digital contracts and the digital system to which the contracts are a part of.
Smart Laws works in conjunction with the existing legislation based on a “terms of service”-principle,
whereby errors in smart contracts can be corrected, and data can be returned to the rightful owners.
The management of smart laws is done by a human being assigned the authority to evaluate the code
either ex officio, or at the request of a contracting party. The most prominent advantage of smart laws
is that jurisdiction does not become problematic, as immediate enforcement can occur without the
involvement of legal systems. However, smart laws must give way to laws implemented by the
appropriate legislative procedure.
257 United Nations Conference on Trade and Development, Dispute Settlement, International
1371(2) in the French civil code is highlighted. It can particularly be criticized, however, that only a
digital signature is mentioned, but it is not further emphasized which technical specifications such a
59
The legal arguments regarding functional equivalence, which would
otherwise be found to support the adequacy of a digital signature, can be
progressively supporting the use of quantum information, since the rationale
for the digital signature in classical information does not appear in the
wording, but rather by interpretation.261 262
A similar principle must be applicable in other legal systems than the Danish
one, as well as the principle of ratification in international law, cf. Vienna
Convention on the Law of Treaties,266 art. 2(1)(b).267
signature must live up to. Hereby it must be clear that it is not any digital signature, which is sufficient
to fulfil the criterion in New York Convention on the Recognition and Enforcement of Foreign Arbitral
Awards, art. 4.
259 The principle comparison of art. 4 with art. 8, cf. UNCTD, p. 51 is justified, although it is explicitly
stated in UNCITRAL Model Law on Electronic Commerce Guide to Enactment with 1996 with additional
article 5 bis as adopted in 1998, pp. 20ff. that the functional equivalence is only used in relation to the
Model Law’s art. 6 – 8, as it is also stated that the functional equivalence relates to the term "original",
which is also used in art. 4.
260 There may be deviations from this in the individual country’s lex arbitri, as the model law may be
deviated from, cf. EU-PIL, European Union Private International Law in Contract and Tort, Joseph
Lookofsky & Ketilbjørn Hertz, 1st Edition, 2009, p. 163.
261 Compared to Quantum Safe Cryptography and Security – An introduction, benefits enablers and
challenges, ETSI World Class Standards, ETSI White Paper No. 8, June 2015 (now QSCS), section 6.4.
262 Similar considerations would apply to the principle of “authentication” in REGULATION (EU) No
910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic
identification and trust services for electronic transactions in the internal market and repealing
Directive 1999/93/EC, art. 3 (5).
263 UNCITRAL Model Law on Electronic Commerce Guide to Enactment from 1996 with additional
60
3.2.4 Decoherence
As stated in section 3.1.1 decoherence268 may occur whereby, at least
temporarily, data might be lost. In some circumstances, it is possible to
recover coherence in the decoherent quantum states, however, in a damaged
condition, although theoretically it is possible to achieve perfect coherence
under certain circumstances.269
- What measures the service provider has made before the conclusion
of the agreement to prevent the occurrence of decoherence.
- Which of the parties carries the risk of lost data, respectively the loss
of the QPU or the repair costs of decoherence. This includes, in
particular, whether the service provider is aware of the type of data
used by the customer, and how the customer is using the QPU on the
basis of the legal reasoning behind the principle of casus mixtus cum
culpa at the conclusion of the contract. This must be weighed against
the service provider's knowledge of specific application methods that
increase the risk of decoherence.
268"On the Interpretation of Measurement in Quantum Theory", H. Dieter Zeh, Foundations of Physics,
vol. 1, no. 1, 1970, pp. 69–76.
61
- How long the service provider has to rectify the specific breach,
before the breach is fundamental and can justify the termination of
the parties' agreement.
It should be noted that the parties should as a main principle not take into
account Heisenberg's uncertainty principle,272 after which the position and
impulse of a particle cannot be determined at exactly the same time. This
does not make it more difficult for the service provider to discover
decoherent quantum states in a qubit.273
- Smart contracts where the contract is only code, see note 238.
- Ricardian contracts where the contract is both code and plain writing,
see note 239.
Max Raskin has incorrectly defined smart contracts as "an agreement whose
execution is automated".275 However, no distinguishment is thereby made
between smart contracts and ricardian contracts.
272 Heisenberg, W., The physical content of quantum kinematics and mechanics. In Quantum Theory
and Measurement (eds Wheeler, J. A. and Zurek, W. H.), Princeton University Press, Princeton, NJ, USA,
1983, pp. 62–84 [originally published: Z. Phys., 1927, 43(3–4), 172–198], cf. Heisenberg’s original
derivation of the uncertainty principle and its universally valid reformulations, Masanao Ozawa,
current science, volume 109, no. 11, 10th of December 2015, p. 1, note 1.
273 Quantum Optical Tests of Complementarity, Berthold-Georg Englert, Marlan O. Scully & Herbert
309.
62
“An event-driven program, with state, that runs on a distributed,
decentralized, shared and replicated ledge and that can take custody over
and instruct transfer of assets on that ledger.”
Digital contracts, which are linked to the blockchain system, are, contrary to
classical contracts, not an expression of the will or trust between the parties,
but rather the mistrust of the parties to intermediaries.277 By translating the
contract into code, the result can be triggered automatically when the
conditions are met by using if-statements like the following pseudo code: "If
X happens - then Y is the result".
Unlike digital contracts there are also digital codes, which constitute the
legally relevant facts in relation to the legal method or agreements that are
not automatically executed.
Digital contracts can also be used in a number of digital systems and not just
blockchain, tangle (DAG)279 or similar future systems. Therefore, it is most
constructs.
279 The Tangle, Serguei Popov, 30th of April 2018, version 1.4.3, pp. 1-7. Also notice section 5 regarding
resistance to quantum computers, where it is stated that a quantum computer would be 17 billion
times more efficient at mining than a classical computer, but tangle is better protected against a
63
appropriate not to define digital contracts in relation to a specific system
type.
When using digital contracts in relation to QCaaS, it should be noted that the
”no teleport theorem” is irrelevant, because one can make time recordings in
order to determine the price the customer has to pay in the classic
computer’s Application Programming Interface (API).280
However, it is most appropriate that the parties to the agreement also make
an agreement in writing. Hereby it is ensured that the digital contract gets
the content that the parties have intended, and the parties' subjective
circumstances at the conclusion of the digital contract are clarified. The
written agreement also allows for the use of clauses that cannot be
converted into computer code such as arbitration clauses, etc.
Due to the few QCaaS service providers, however, the service providers are
able to impact the industry standard not only with their technological
quantum computer than blockchain. However section 5, note 34 makes it clear that the premise about
the quantum computer’s computational power is hypothetically constructed as of 30th of April 2018.
280 In pseudo code the solution would be something along the lines of: ”If X amounts of time units are
registered in the API, then Y amount of money will be paid from the costumer to the service provider.”
64
advances, but also with their contracts and the way they make the QCaaS
accessible to their costumers.
Such long term macro perspective on the contracts enables the emergence
of more durable business models as well and might reduce the challenges for
quantum safety.282
281 Corporate Social Responsibility: Strategy, Communication, Governance, Rasche, A., Morsing, M., &
Moon, J. (red.), Cambridge: Cambridge University Press(2017), 529 p.
282QSCS, section 6.2 where it is deemed a challenge for quantum safety.
283 Case C-398/95, SETTG v Ypourgos Ergasias [1997] ECR I-3091, para. 23 and Case C-158/96, Kohll,
[1998] ECR I-1931, para. 41, as commented on by Advocate General Jacobs in his Opinion in Case C-
147/03, Commission v Austria, [2005] ECR I-5969, para. 31.
65
3.3 Quantum Encryption
Encryption plays a prominent role in data protection 284 as well as in relation
to human rights, where the right to communication privacy is given by Article
12 of the United Nations Universal Declaration of Human Rights, and Article 8
of the European Convention on Human Rights.285
284 Encryption is expressedly mentioned in GDPR, art. 6, stk. 4, litra e, GDPR, art. 32, stk. 1, litra a, GDPR
art. 34, stk. 3, litra a, as well as recital 83 where it is expressedly mentioned that
285 For further information of this perspective on quantum encryption see: The Impact of Quantum
Technologies on the EU’s Future Policies, Part 2 Quantum communications: from science to policies,
Adam M. Lewis, Martino Travagnin, JRC Science for Policy Report, 2018, section 4.5.
286 QSCS, p. 5 and section 6.4.
287 European Commission, COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN
PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE
COMMITTEE OF THE REGIONS, A Digital Single Market Strategy for Europe, Brussels, 6.5.2015,
COM(2015) 192 final(now DSMSE), p. 2 and p. 16.
288 DSMSE, p. 13, note 15.
289 COMMISSION STAFF WORKING DOCUMENT on QUANTUM TECHNOLOGIES Accompanying the
66
acknowledges that quantum computing is the top of high-end of computing
technology, including exascale high-performance computing. Furthermore
the European Commission states that data security and safety will be
changed by the quantum computer as widely used data-encryption
techniques will be vulnerable to attacks from the quantum computer.
Meanwhile the quantum computer can protect data in a completely secure
way that makes eavesdropping fundamentally impossible. 290
The use of quantum encryption as being “state of the art” or “high industry
standards”, cf. section 3.2, will therefore with predominant likeliness be
interpreted somewhat in accordance with the standards given by ETSI as well
Extreme Quantum Information Theory (xQIT) stated in Stix, Gary. “Best-Kept Secrets”, Scientific
American, 20 December 2004, p. 83.
294 Edward L. Bernays, The Engineering of Consent, The Annals of the American Academy of Political
and Social Science, Volume 250, Issue 1, 1st of March 1947, p. 114.
295 Robert B. Cialdini, “Influence: The Psychology of Persuasion”, 1984.
296 Psychographics: A Critical Review, William D. Wells, Journal of Marketing Research, Vol. 12, No. 2
297 SWDQT, section 4 “Innovation in Quantum Technologies: Now or Never?” as well as SWDQT, note
17.
67
as in accordance with possible certifications of quantum cryptographic
products.298
Some encryptions however are qualified as “quantum safe” which means the
encryptions are well studied and resists attacks using all known quantum
algorithms at a given time301 as well as future algorithmic and computational
advances including the emergence of quantum computers.302 This can be
achieved when the cipher can adapt to a quantum attack by increasing its
key size to prevent the vulnerability hence outstripping Moore’s Law 303 or by
offering security guaranteed by physical laws.304 The physical laws are the
Heisenberg’s uncertainty principle, the “no-cloning theorem” as well as
entanglement based Quantum Key Distribution(QKD).305 See also section 3.2.
Usually variants of RSA, ECC, Diffie-Hellman and DSA security protocols are
used for secure e-mail(S/MIME), Virtual Private Networks(VPN), Secure Web
Browsing(SSL/TLS) etc., which means they can be broken by Shor’s algorithm,
since they are based on integer factorisation and discrete logarithms. 306
298 WP27, p. 8.
299 QSCS, p. 10.
300 QSCS, p. 11. It is not explicitly called brute force, but ”guessing”. However brute force would
probably be the appropriate term, since its qualified guesses trying all the possible solutions.
301 QSCS, p. 13-14 and p. 17 with the examples of AES(Advanced Encryption Standard)-128 and AES-256
first time announced in “Announcing the ADVANCED ENCRYPTION STANDARD (AES)”, Federal
Information Processing Standards Publication 197, 26th of November, 2001 issued by the National
Institute of Standards and Technology (NIST) after approval by the Secretary of Commerce pursuant to
Section 5131 of the Information Technology Management Reform Act of 1996 (Public Law 104-106)
and the Computer Security Act of 1987 (Public Law 100-235). Along with AES-128 and AES-256, AES-
192 is also included.
302 WP27, p. 7.
303 Cramming more components onto integrated circuits, Gordon E. Moore, Electronics, Volume 38,
68
However in some cases it is possible to upgrade these security protocols to
make them quantum safe.307
State of the art as of June 2015 was Vernam’s One Time Pad308 309, Wegman-
Carter Authentication310, AES-128, AES-192 and AES-256 as well as methods
implementing Quantum Key Distribution(QKD) that offers security
guaranteed by physical laws.311 The security guaranteed by physical laws was
revised as of June 2018 to include312 quantum random number generation313,
closed group digital signatures314, long-term secure data storage315 and
multi-party secure computation316, which are robust against future
algorithmic and computational advances, including the emergence of
quantum computers.317 This exemplifies the speed of technological advances
and how fast the state of the art principle changes which makes an expansive
dynamic interpretation a must.318
secrecy in the transmission of telegrams, C.M. Cornwell, 1882. Later OTP was patented as U.S. Patent
1,310,719A issued 22nd of July 22 1919 to Gilbert S. Vernam.
310 Universal classes of hash functions, J. L. Carter, M. N. Wegman, Journal of Computer and System
256 are excluded from being state of the art as of june 2018, however I don’t find that is the case, since
the use of computational complexity as a cryptographic method is mentioned in WP27, p. 7.
313 Quantum random number generators, X. Ma, X. Yuan, Z. Cao, B. Qi. and Z. Zhang, Npj Quantum
J. A. Buchmann, D. Demirel, M. Geihs, M. Fujiwara, S. Moriai, M. Sasaki and A. Waseda, AsiaCCS, 2017,
pp. 461-468.
316 D. Unruh, “Universally composable quantum multi-party computation”, In Advances in Cryptology—
“Quantum-Safe Cryptography (QSC); Limits to Quantum Computing applied to symmetric key sizes”,
ETSI GR QSC 006 V1.1.1 (2017-02).
319 QSCS, pp. 18-19.
320 QSCS, p. 19.
69
3.3.2 Quantum Key Distribution (QKD)
Understanding the best practices in a simplified manner is possible with the
use of the principles of QKD which are widely applicable to other quantum
cryptographic methods. 321 322
As an example the BB84 protocol323 has a failure probability which is: < 10 to
the power of -10 and will be used in the following to explain QKD. 324
The effect hereof is that the transmissions cannot be read or copied reliably
by an eavesdropper ignorant of certain key information used in forming the
transmission. The leakage can’t even happen partially without it being likely
to be detected by the channel’s legitimate users.328
When QKD is performed between the parties A and B, the party A chooses a
random bit string and a random sequence of polarisation bases that will be
sent to B as photons. A horizontal or 45-degree photon is a binary 0 and
vertical or 135-degree photon is a binary 1. 329
321 WP27, p. 9.
322 See also the other ETSI GR QSC 001 V1.1.1 (2016-07), ETSI GR QSC 003 V1.1.1 (2017-02), ETSI GR
QSC 004 V1.1.1 (2017-03), ETSI TR 103 570 V1.1.1 (2017-10), ETSI TR 103 617 V1.1.1 (2018-09) for a
more detailed explanation of the use of quantum encryption to more specific technologies and its
various applications.
323 C. H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In
Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume
175, page 8. New York, 1984 (now PKDCT).
324 WP27, p. 11.
325 Meaning not 90 degrees when perceiving the qubit as a vector.
326 PKDCT, p. 7.
327 Quantum Cryptography Beyond Quantum Key Distribution, Anne Broadbent and Christian
Schaffner, Cornell University, Designs, Codes and Cryptography (2015), last revised 18 Dec 2015 (v2),
pp. 10-11, as well as S. Wiesner, Conjugate coding, SCM SIGACT News, 15(1), 1983, pp. 78-88.
328 PKDCT, p. 7.
329 PKDCT, p. 9.
70
polarization. Therefore B will only obtain meaningful data from half of the
photons that reaches B that B measures correct330 while some photons will
be lost during the transition.331
After this process has occurred, another process begins using a public
communication channel, which is susceptible to eavesdropping, but not
injection or alteration of the messages between A and B. In this following
process A and B determines:
2) which photons were then received by B with the correct basis and
therefore had their polarization measured correctly by B, without
expressing that the photon is representing a binary 0 or 1.*
Given that the quantum transmission was undisturbed A and B should agree
on the bits encoded by the photons. 332
Due to the mix of rectilinear and diagonal photons during the quantum
transmission the eavesdropper is carrying the risk of altering the
transmission which would lead to the transmission not being agreed on
between A and B. The eavesdropper can only get up to ½ bits of information
(b ≤ ½) from trying to measure the polarization.333
If all the comparisons are agreed upon, A and B concludes that the quantum
transmission has at least been free of significant eavesdropping. The
quantum transmission can hereafter be used as a one-time pad (OTP) for
subsequent secure communication over the public channel. After the use of
the OTP the process is repeated. 335
eavesdropping on more than a few photons is unlikely to escape. Whether this would be statistically
correct however is not verified.
335 PKDCT, p. 9.
71
Epilogue
I want to thank all of my friends, who wanted to remain anonymous, for the
support and for showing me how fascinating computer science and physics
are.
Furthermore, I want to thank all of the people, who did not think it was
possible for me to write this book. If most people thought it was possible, it
would not be something I would be interested in doing. I definitely needed
that indicator to make sure, what I wanted to achieve had the right altitude
and could actually make other people believe that they can achieve things,
they and their surroundings think are impossible.
I also want to thank everyone, who had the sort of success I wanted and
made resources to help me and many others. Some of you even answered a
lot of my questions and gave me opportunities, when I was trying to figure
out how to do better. I hope in some way I paid all of you back by writing this
book and continuing that legacy of trying to help other people, who want to
improve themselves.
Last, but definitely not least, I want to thank you for reading this book. I am
definitely grateful for creating something you would enjoy reading. It is not
something I take for granted at all.
If you have any comments, questions, maybe you created something or you
have other reasons for wanting to reach out to me, I am sure you will be able
to figure out how to write me. I will do my best to reply in a respectful
manner.
72
Appendix A: Sources of Law
73
U.S. Law
Laws
26 U.S.C. § 6065
26 U.S.C. § 7206(1)
California Consumer Privacy Act, Bill No. 375, Chapter 55, An act to add Title
1.81.5 (commencing with Section 1798.100) to Part 4 of Division 3 of the Civil
Code, relating to privacy
Legal Literature
Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal
Information Processing Standards Publication 197, 26th of November, 2001
issued by the National Institute of Standards and Technology (NIST) after
approval by the Secretary of Commerce pursuant to Section 5131 of the
Information Technology Management Reform Act of 1996 (Public Law 104-
106).
Justice Byron White and the Argument that the Greater Includes the Lesser,
Michael Herz, BYU Law Review, Volume 1994, Issue 2, Article 2
Tales from the Cryptocurrency: On Bitcoin, Square Pegs and Round Holes, [49
New Eng. L. Rev. 121 (2014)], section IV.
74
Use and Limits of Syllogistic Reasoning in Briefing Cases, Wilson R. Huhn,
Akron Law Publications, January 2002.
Case Law
The Court of Appeals of the Federal Circuit’s court decision in State Street
bank & Trust Co. v. Signature Financial Group, inc. (1998)
The Court of Appeals of the Federal Circuit’s court decision in AT&T Corp. v.
Excel Communications (1999)
E.U. Law
Laws, Working Documents, Guidelines etc.
Consolidated versions of the Treaty on European Union and the Treaty on
the Functioning of the European Union 2012/C 326/01.
75
network and information systems across the Union, OJ L 194, 19.7.2016, pp.
1–30.
European Commission’s Ethics guidelines for trustworthy AI, 8th of April 2019
as a part of EU’s digital single market strategy.
Case Law
76
Case C-390/99, Canal Satélite Digital
U.K. Law
Perjury act 1911, chapter 6 1 and 2 Geo 5 with later modifications and
amendments by the Criminal Justice Act 1967 (c. 80), s. 89(2), Criminal
Justice Act 1948 (c. 58), s. 1(1), Magistrates' Courts Act 1980 (c. 43), s. 106(2)
and Civil Partnership Act 2004 (c. 33), ss. 80(4), 263(2); S.I. 2005/3175, art.
2(1), Sch. 1.
Danish Law
77
Legal Literature
Case Law
SKM2014.226.SR
International law
Vienna Convention on the Law of Treaties, United Nations(VCLT), Treaty
Series, vol. 1155, p. 331, Vienna, 23rd of May 1969.
78
United Nations Conference on Trade and Development, Dispute Settlement,
International Commercial Arbitration, 5.9 Electronic Arbitration,
UNCTAD/EDM/Misc.232/Add.20.
79
Decentralized Blockchain Technology and the Rise of Lex Cryptographia
Wright, Aaron and De Filippi, Primavera, (March 10, 2015).
Justice Byron White and the Argument that the Greater Includes the Lesser,
Michael Herz, BYU Law Review, Volume 1994, Issue 2, Article 2.
Legal knowledge based systems JURIX 94: The Foundation for Legal
Knowledge Systems, Lelystad: Koninklijke Vermande, 1994.
Legal Method and Reasoning, Sharon Hanson, 1st Edition, 30th of June 2003.
Legal Research: how to Find and Understand the Law (LEGAL SKILL SERIES),
1st Edition, 16th of November, 1993.
D. Hunter, Looking for Law in all the Wrong Places: Legal Theory and Legal
Neural Networks, in: A. Soeteman (eds.).
80
THE LAW AND LEGALITY OF SMART CONTRACTS, Max Raskin, 1 GEO. L. TECH.
REV. 305 (2017).
The Use and Limits of Deductive Logic in Legal Reasoning, Wilson Huhn,
Santa Clara Law Review, Volume 42, 1st of January 2002, pp. 813-862.
The Uses and Abuses of Neural Networks in Law, Michael Aikenhead, Santa
Clara High Tech. L.J.31(1996), Volume 12, Issue 1, article 2.
81