A Quantum Circuit Obfuscation Methodology for Security and Privacy
- URL: http://arxiv.org/abs/2104.05943v1
- Date: Tue, 13 Apr 2021 05:09:45 GMT
- Title: A Quantum Circuit Obfuscation Methodology for Security and Privacy
- Authors: Aakarshitha Suresh and Abdullah Ash Saki and Mahabubul Alam and Rasit
o Topalaglu and Dr. Swaroop Ghosh
- Abstract summary: Several 3rd party compilers are evolving to offer improved performance for large quantum circuits.
This could lead to an adversary to Reverse Engineer (RE) the quantum circuit for extracting sensitive aspects.
We propose obfuscation of quantum circuits to hide the functionality.
- Score: 1.7324358447544175
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Optimization of quantum circuits using an efficient compiler is key to its
success for NISQ computers. Several 3rd party compilers are evolving to offer
improved performance for large quantum circuits. These 3rd parties, or just a
certain release of an otherwise trustworthy compiler, may possibly be untrusted
and this could lead to an adversary to Reverse Engineer (RE) the quantum
circuit for extracting sensitive aspects e.g., circuit topology, program, and
its properties. In this paper, we propose obfuscation of quantum circuits to
hide the functionality. Quantum circuits have inherent margin between correct
and incorrect outputs. Therefore, obfuscation (i.e., corruption of
functionality) by inserting dummy gates is nontrivial. We insert dummy SWAP
gates one at a time for maximum corruption of functionality before sending the
quantum circuit to an untrusted compiler. If an untrusted party clones the
design, they get incorrect functionality. The designer removes the dummy SWAP
gate post-compilation to restore the correct functionality. Compared to a
classical counterpart, the quantum chip does not reveal the circuit
functionality. Therefore, an adversary cannot guess the SWAP gate and
location/validate using an oracle model. Evaluation of realistic quantum
circuit with/without SWAP insertion is impossible in classical computers.
Therefore, we propose a metric-based SWAP gate insertion process. The objective
of the metric is to ensure maximum corruption of functionality measured using
Total Variation Distance (TVD). The proposed approach is validated using IBM
default noisy simulation model. Our metric-based approach predicts the SWAP
position to achieve TVD of upto 50%, and performs 7.5% better than average TVD,
and performs within 12.3% of the best obtainable TVD for the benchmarks. We
obtain an overhead of < 5% for the number of gates and circuit depth after SWAP
addition.
Related papers
- Hardware Trojans in Quantum Circuits, Their Impacts, and Defense [2.089191490381739]
Circuits with a short depth and lower gate count can yield the correct solution more often than the variant with a higher gate count and depth.
Many 3rd party compilers are being developed for lower compilation time, reduced circuit depth, and lower gate count for large quantum circuits.
arXiv Detail & Related papers (2024-02-02T16:44:52Z) - Implementing fault-tolerant non-Clifford gates using the [[8,3,2]] color
code [0.0]
We observe improved performance for encoded circuits implementing non-Clifford gates.
Our results illustrate the potential of using codes with quantum gates to implement non-trivial algorithms.
arXiv Detail & Related papers (2023-09-15T18:00:02Z) - Obfuscating Quantum Hybrid-Classical Algorithms for Security and Privacy [5.444459446244819]
Quantum classical algorithms like QAOA encode the graph properties to solve a graph maxcut problem.
Usage of untrusted hardware could present the risk of intellectual property (IP) theft.
We propose an edge pruning obfuscation method for QAOA along with a split iteration methodology.
arXiv Detail & Related papers (2023-05-03T18:35:14Z) - Randomized Reversible Gate-Based Obfuscation for Secured Compilation of
Quantum Circuit [5.444459446244819]
We propose an obfuscation technique for quantum circuits using reversible gates to protect them from such attacks during compilation.
Our method achieves TVD of up to 1.92 and performs at least 2X better than a previously reported obfuscation method.
arXiv Detail & Related papers (2023-05-02T00:24:34Z) - Obfuscation of Pseudo-Deterministic Quantum Circuits [14.026980555435841]
We show how to obfuscate pseudo-deterministic quantum circuits in the classical oracle model.
Our obfuscator outputs a quantum state $ketwidetildeQ$ repeatedly on arbitrary inputs.
arXiv Detail & Related papers (2023-02-22T01:14:20Z) - Software mitigation of coherent two-qubit gate errors [55.878249096379804]
Two-qubit gates are important components of quantum computing.
But unwanted interactions between qubits (so-called parasitic gates) can degrade the performance of quantum applications.
We present two software methods to mitigate parasitic two-qubit gate errors.
arXiv Detail & Related papers (2021-11-08T17:37:27Z) - On the realistic worst case analysis of quantum arithmetic circuits [69.43216268165402]
We show that commonly held intuitions when designing quantum circuits can be misleading.
We show that reducing the T-count can increase the total depth.
We illustrate our method on addition and multiplication circuits using ripple-carry.
arXiv Detail & Related papers (2021-01-12T21:36:16Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z) - Fault-tolerant Coding for Quantum Communication [71.206200318454]
encode and decode circuits to reliably send messages over many uses of a noisy channel.
For every quantum channel $T$ and every $eps>0$ there exists a threshold $p(epsilon,T)$ for the gate error probability below which rates larger than $C-epsilon$ are fault-tolerantly achievable.
Our results are relevant in communication over large distances, and also on-chip, where distant parts of a quantum computer might need to communicate under higher levels of noise.
arXiv Detail & Related papers (2020-09-15T15:10:50Z) - QUANTIFY: A framework for resource analysis and design verification of
quantum circuits [69.43216268165402]
QUANTIFY is an open-source framework for the quantitative analysis of quantum circuits.
It is based on Google Cirq and is developed with Clifford+T circuits in mind.
For benchmarking purposes QUANTIFY includes quantum memory and quantum arithmetic circuits.
arXiv Detail & Related papers (2020-07-21T15:36:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.