A Primer on Security of Quantum Computing
- URL: http://arxiv.org/abs/2305.02505v1
- Date: Thu, 4 May 2023 02:30:27 GMT
- Title: A Primer on Security of Quantum Computing
- Authors: Swaroop Ghosh, Suryansh Upadhyay, Abdullah Ash Saki
- Abstract summary: Quantum computing can potentially transform several application areas by solving intractable problems from classical domain.
Quantum computing stack may contain sensitive Intellectual Properties (IP) that requires protection.
Quantum computers suffer from crosstalk that couples two programs in a multi-tenant setting to facilitate traditionally known fault injection attacks.
- Score: 5.510992382274774
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Quantum computing is an emerging computing paradigm that can potentially
transform several application areas by solving some of the intractable problems
from classical domain. Similar to classical computing systems, quantum
computing stack including software and hardware rely extensively on third
parties many of them could be untrusted or less-trusted or unreliable. Quantum
computing stack may contain sensitive Intellectual Properties (IP) that
requires protection. From hardware perspective, quantum computers suffer from
crosstalk that couples two programs in a multi-tenant setting to facilitate
traditionally known fault injection attacks. Furthermore, third party
calibration services can report incorrect error rates of qubits or
mis-calibrate the qubits to degrade the computation performance for
denial-of-service attacks. Quantum computers are expensive and access queue is
typically long for trusted providers. Therefore, users may be enticed to
explore untrusted but cheaper and readily available quantum hardware which can
enable stealth of IP and tampering of quantum programs and/or computation
outcomes. Recent studies have indicated the evolution of efficient but
untrusted compilation services which presents risks to the IPs present in the
quantum circuits. The untrusted compiler can also inject Trojans and perform
tampering. Although quantum computing can involve sensitive IP and private
information and can solve problems with strategic impact, its security and
privacy has received inadequate attention. This paper provides comprehensive
overview of the basics of quantum computing, key vulnerabilities embedded in
the quantum systems and the recent attack vectors and corresponding defenses.
Future research directions are also provided to build a stronger community of
quantum security investigators.
Related papers
- The curse of random quantum data [62.24825255497622]
We quantify the performances of quantum machine learning in the landscape of quantum data.
We find that the training efficiency and generalization capabilities in quantum machine learning will be exponentially suppressed with the increase in qubits.
Our findings apply to both the quantum kernel method and the large-width limit of quantum neural networks.
arXiv Detail & Related papers (2024-08-19T12:18:07Z) - QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum
Circuits [82.50620782471485]
QuantumSEA is an in-time sparse exploration for noise-adaptive quantum circuits.
It aims to achieve two key objectives: (1) implicit circuits capacity during training and (2) noise robustness.
Our method establishes state-of-the-art results with only half the number of quantum gates and 2x time saving of circuit executions.
arXiv Detail & Related papers (2024-01-10T22:33:00Z) - Blind quantum machine learning with quantum bipartite correlator [13.533591812956018]
We introduce novel blind quantum machine learning protocols based on the quantum bipartite correlator algorithm.
Our protocols have reduced communication overhead while preserving the privacy of data from untrusted parties.
arXiv Detail & Related papers (2023-10-19T16:42:32Z) - A First Order Survey of Quantum Supply Dynamics and Threat Landscapes [2.348041867134616]
This paper is a first attempt to explore the quantum computing ecosystem from a security perspective.
By investigating the publicly disclosed information from industry front runners like IBM, Google, Honeywell and more, we piece together various components of quantum computing supply chain.
We uncover some potential vulnerabilities and attack models and suggest defenses.
arXiv Detail & Related papers (2023-08-18T18:48:37Z) - Deploying hybrid quantum-secured infrastructure for applications: When
quantum and post-quantum can work together [0.8702432681310401]
Quantum key distribution is secure against unforeseen technological developments.
Post-quantum cryptography is believed to be secure even against attacks with both classical and quantum computing technologies.
Various directions in the further development of the full-stack quantum-secured infrastructure are also indicated.
arXiv Detail & Related papers (2023-04-10T13:44:21Z) - Delegated variational quantum algorithms based on quantum homomorphic
encryption [69.50567607858659]
Variational quantum algorithms (VQAs) are one of the most promising candidates for achieving quantum advantages on quantum devices.
The private data of clients may be leaked to quantum servers in such a quantum cloud model.
A novel quantum homomorphic encryption (QHE) scheme is constructed for quantum servers to calculate encrypted data.
arXiv Detail & Related papers (2023-01-25T07:00:13Z) - Iterative Qubits Management for Quantum Index Searching in a Hybrid
System [56.39703478198019]
IQuCS aims at index searching and counting in a quantum-classical hybrid system.
We implement IQuCS with Qiskit and conduct intensive experiments.
Results demonstrate that it reduces qubits consumption by up to 66.2%.
arXiv Detail & Related papers (2022-09-22T21:54:28Z) - Optimal Stochastic Resource Allocation for Distributed Quantum Computing [50.809738453571015]
We propose a resource allocation scheme for distributed quantum computing (DQC) based on programming to minimize the total deployment cost for quantum resources.
The evaluation demonstrates the effectiveness and ability of the proposed scheme to balance the utilization of quantum computers and on-demand quantum computers.
arXiv Detail & Related papers (2022-09-16T02:37:32Z) - Shuttle-Exploiting Attacks and Their Defenses in Trapped-Ion Quantum
Computers [5.510992382274774]
This paper presents one such vulnerability in shared TI systems that require shuttle operations for communication among traps.
We propose a random and systematic methodology for adversary program generation.
Our analysis shows shuttle-exploiting attacks can substantially degrade the fidelities of victim programs by 2X to 63X.
arXiv Detail & Related papers (2021-08-02T17:19:59Z) - Delegating Multi-Party Quantum Computations vs. Dishonest Majority in
Two Quantum Rounds [0.0]
Multi-Party Quantum Computation (MPQC) has attracted a lot of attention as a potential killer-app for quantum networks.
We present a composable protocol achieving blindness and verifiability even in the case of a single honest client.
arXiv Detail & Related papers (2021-02-25T15:58:09Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.