Hardware Architecture for a Quantum Computer Trusted Execution
Environment
- URL: http://arxiv.org/abs/2308.03897v1
- Date: Mon, 7 Aug 2023 20:18:36 GMT
- Title: Hardware Architecture for a Quantum Computer Trusted Execution
Environment
- Authors: Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan
Ding, Jakub Szefer
- Abstract summary: Cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property.
This work presented the first hardware architecture for a trusted execution environment for quantum computers.
- Score: 7.9098355641304865
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The cloud-based environments in which today's and future quantum computers
will operate, raise concerns about the security and privacy of user's
intellectual property. Quantum circuits submitted to cloud-based quantum
computer providers represent sensitive or proprietary algorithms developed by
users that need protection. Further, input data is hard-coded into the
circuits, and leakage of the circuits can expose users' data. To help protect
users' circuits and data from possibly malicious quantum computer cloud
providers, this work presented the first hardware architecture for a trusted
execution environment for quantum computers. To protect the user's circuits and
data, the quantum computer control pulses are obfuscated with decoy control
pulses. While digital data can be encrypted, analog control pulses cannot and
this paper proposed the novel decoy pulse approach to obfuscate the analog
control pulses. The proposed decoy pulses can easily be added to the software
by users. Meanwhile, the hardware components of the architecture proposed in
this paper take care of eliminating, i.e. attenuating, the decoy pulses inside
the superconducting quantum computer's dilution refrigerator before they reach
the qubits. The hardware architecture also contains tamper-resistant features
to protect the trusted hardware and users' information. The work leverages a
new metric of variational distance to analyze the impact and scalability of
hardware protection. The variational distance of the circuits protected with
our scheme, compared to unprotected circuits, is in the range of only $0.16$ to
$0.26$. This work demonstrates that protection from possibly malicious cloud
providers is feasible and all the hardware components needed for the proposed
architecture are available today.
Related papers
- Jailbreaking Quantum Computers [10.353892677735212]
This work presents the first thorough exploration of the attacks on the interface between gate-level and pulse-level quantum circuits.
It shows that most current software development kits are vulnerable to these new types of attacks.
The exploration of security and privacy issues of the rising pulse-level quantum circuits provides insight into the future development of secure quantum software development kits and quantum computer systems.
arXiv Detail & Related papers (2024-06-10T00:11:05Z) - DynamiQS: Quantum Secure Authentication for Dynamic Charging of Electric Vehicles [61.394095512765304]
Dynamic Wireless Power Transfer (DWPT) is a novel technology that allows charging an electric vehicle while driving.
Recent advancements in quantum computing jeopardize classical public key cryptography.
We propose DynamiQS, the first post-quantum secure authentication protocol for dynamic wireless charging.
arXiv Detail & Related papers (2023-12-20T09:40:45Z) - Quantum Key Distribution for Critical Infrastructures: Towards Cyber
Physical Security for Hydropower and Dams [0.4166512373146748]
Hydropower facilities are often remotely monitored or controlled from a centralized remote-control room.
Communications may use the internet to remote control a facility's control systems, or it may involve sending control commands over a network from a control room to a machine.
The content could be encrypted and decrypted using a public key to protect the communicated information.
In contrast, quantum key distribution (QKD) is not based upon a computational problem, and offers an alternative to conventional public-key cryptography.
arXiv Detail & Related papers (2023-10-19T18:59:23Z) - Demonstration of quantum-digital payments [36.136619420474766]
We show how quantum light can secure daily digital payments by generating inherently unforgeable quantum cryptograms.
Unlike previously proposed protocols, our solution does not depend on long-term quantum storage or trusted agents and authenticated channels.
It is practical with near-term technology and may herald an era of quantum-enabled security.
arXiv Detail & Related papers (2023-05-23T20:20:14Z) - A Primer on Security of Quantum Computing [5.510992382274774]
Quantum computing can potentially transform several application areas by solving intractable problems from classical domain.
Quantum computing stack may contain sensitive Intellectual Properties (IP) that requires protection.
Quantum computers suffer from crosstalk that couples two programs in a multi-tenant setting to facilitate traditionally known fault injection attacks.
arXiv Detail & Related papers (2023-05-04T02:30:27Z) - Exploration of Quantum Computer Power Side-Channels [6.531546527140474]
In today's cloud-based quantum computer setting, users lack physical control over the computers.
This work shows for the first time that power-based side-channel attacks could be deployed against quantum computers.
arXiv Detail & Related papers (2023-04-06T18:15:05Z) - Modular decoding: parallelizable real-time decoding for quantum
computers [55.41644538483948]
Real-time quantum computation will require decoding algorithms capable of extracting logical outcomes from a stream of data generated by noisy quantum hardware.
We propose modular decoding, an approach capable of addressing this challenge with minimal additional communication and without sacrificing decoding accuracy.
We introduce the edge-vertex decomposition, a concrete instance of modular decoding for lattice-surgery style fault-tolerant blocks.
arXiv Detail & Related papers (2023-03-08T19:26:10Z) - Moving beyond the transmon: Noise-protected superconducting quantum
circuits [55.49561173538925]
superconducting circuits offer opportunities to store and process quantum information with high fidelity.
Noise-protected devices constitute a new class of qubits in which the computational states are largely decoupled from local noise channels.
This Perspective reviews the theoretical principles at the heart of these new qubits, describes recent experiments, and highlights the potential of robust encoding of quantum information in superconducting qubits.
arXiv Detail & Related papers (2021-06-18T18:00:13Z) - Building a fault-tolerant quantum computer using concatenated cat codes [44.03171880260564]
We present a proposed fault-tolerant quantum computer based on cat codes with outer quantum error-correcting codes.
We numerically simulate quantum error correction when the outer code is either a repetition code or a thin rectangular surface code.
We find that with around 1,000 superconducting circuit components, one could construct a fault-tolerant quantum computer.
arXiv Detail & Related papers (2020-12-07T23:22:40Z) - Anti-Forging Quantum Data: Cryptographic Verification of Quantum
Computational Power [1.9737117321211988]
Quantum cloud computing is emerging as a popular model for users to experience the power of quantum computing through the internet.
How can users be sure that the output strings sent by the server are really from a quantum hardware?
arXiv Detail & Related papers (2020-05-04T14:28:14Z) - Enabling Pulse-level Programming, Compilation, and Execution in XACC [78.8942067357231]
Gate-model quantum processing units (QPUs) are currently available from vendors over the cloud.
Digital quantum programming approaches exist to run low-depth circuits on physical hardware.
Vendors are beginning to open this pulse-level control system to the public via specified interfaces.
arXiv Detail & Related papers (2020-03-26T15:08:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.