Enigma: Privacy-Preserving Execution of QAOA on Untrusted Quantum
Computers
- URL: http://arxiv.org/abs/2311.13546v1
- Date: Wed, 22 Nov 2023 17:40:23 GMT
- Title: Enigma: Privacy-Preserving Execution of QAOA on Untrusted Quantum
Computers
- Authors: Ramin Ayanzadeh, Ahmad Mousavi, Narges Alavisamani and Moinuddin
Qureshi
- Abstract summary: We propose Enigma, a suite of privacy-preserving quantum computation schemes.
Unlike previous SQC schemes that obfuscate quantum circuits, Enigma transforms the input problem of QAOA.
We show that the privacy improvements of Enigma come at only a small reduction in fidelity.
- Score: 0.6144680854063939
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum computers can solve problems that are beyond the capabilities of
conventional computers. As quantum computers are expensive and hard to
maintain, the typical model for performing quantum computation is to send the
circuit to a quantum cloud provider. This leads to privacy concerns for
commercial entities as an untrusted server can learn protected information from
the provided circuit. Current proposals for Secure Quantum Computing (SQC)
either rely on emerging technologies (such as quantum networks) or incur
prohibitive overheads (for Quantum Homomorphic Encryption). The goal of our
paper is to enable low-cost privacy-preserving quantum computation that can be
used with current systems.
We propose Enigma, a suite of privacy-preserving schemes specifically
designed for the Quantum Approximate Optimization Algorithm (QAOA). Unlike
previous SQC techniques that obfuscate quantum circuits, Enigma transforms the
input problem of QAOA, such that the resulting circuit and the outcomes are
unintelligible to the server. We introduce three variants of Enigma. Enigma-I
protects the coefficients of QAOA using random phase flipping and fudging of
values. Enigma-II protects the nodes of the graph by introducing decoy qubits,
which are indistinguishable from primary ones. Enigma-III protects the edge
information of the graph by modifying the graph such that each node has an
identical number of connections. For all variants of Enigma, we demonstrate
that we can still obtain the solution for the original problem. We evaluate
Enigma using IBM quantum devices and show that the privacy improvements of
Enigma come at only a small reduction in fidelity (1%-13%).
Related papers
- Designing Hash and Encryption Engines using Quantum Computing [2.348041867134616]
We explore quantum-based hash functions and encryption to fortify data security.
The integration of quantum and classical methods demonstrates potential in securing data in the era of quantum computing.
arXiv Detail & Related papers (2023-10-26T14:49:51Z) - Toward Privacy in Quantum Program Execution On Untrusted Quantum Cloud
Computing Machines for Business-sensitive Quantum Needs [2.711804179660095]
SPYCE is the first known solution to obfuscate quantum code and output to prevent the leaking of any confidential information over the cloud.
SPYCE implements a lightweight, scalable, and effective solution based on the unique principles of quantum computing to achieve this task.
arXiv Detail & Related papers (2023-07-31T16:07:37Z) - Obfuscating Quantum Hybrid-Classical Algorithms for Security and Privacy [5.444459446244819]
Quantum classical algorithms like QAOA encode the graph properties to solve a graph maxcut problem.
Usage of untrusted hardware could present the risk of intellectual property (IP) theft.
We propose an edge pruning obfuscation method for QAOA along with a split iteration methodology.
arXiv Detail & Related papers (2023-05-03T18:35:14Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Delegated variational quantum algorithms based on quantum homomorphic
encryption [69.50567607858659]
Variational quantum algorithms (VQAs) are one of the most promising candidates for achieving quantum advantages on quantum devices.
The private data of clients may be leaked to quantum servers in such a quantum cloud model.
A novel quantum homomorphic encryption (QHE) scheme is constructed for quantum servers to calculate encrypted data.
arXiv Detail & Related papers (2023-01-25T07:00:13Z) - Iterative Qubits Management for Quantum Index Searching in a Hybrid
System [56.39703478198019]
IQuCS aims at index searching and counting in a quantum-classical hybrid system.
We implement IQuCS with Qiskit and conduct intensive experiments.
Results demonstrate that it reduces qubits consumption by up to 66.2%.
arXiv Detail & Related papers (2022-09-22T21:54:28Z) - From Quantum Graph Computing to Quantum Graph Learning: A Survey [86.8206129053725]
We first elaborate the correlations between quantum mechanics and graph theory to show that quantum computers are able to generate useful solutions.
For its practicability and wide-applicability, we give a brief review of typical graph learning techniques.
We give a snapshot of quantum graph learning where expectations serve as a catalyst for subsequent research.
arXiv Detail & Related papers (2022-02-19T02:56:47Z) - Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted
Data [4.825895794318393]
Proposed quantum principal component extraction algorithm (QPCE)
A quantum homomorphic ciphertext dimension reduction scheme (QHEDR)
A quantum ciphertext dimensionality reduction scheme implemented in the quantum cloud.
arXiv Detail & Related papers (2020-11-19T07:16:22Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - QUANTIFY: A framework for resource analysis and design verification of
quantum circuits [69.43216268165402]
QUANTIFY is an open-source framework for the quantitative analysis of quantum circuits.
It is based on Google Cirq and is developed with Clifford+T circuits in mind.
For benchmarking purposes QUANTIFY includes quantum memory and quantum arithmetic circuits.
arXiv Detail & Related papers (2020-07-21T15:36:25Z) - Anti-Forging Quantum Data: Cryptographic Verification of Quantum
Computational Power [1.9737117321211988]
Quantum cloud computing is emerging as a popular model for users to experience the power of quantum computing through the internet.
How can users be sure that the output strings sent by the server are really from a quantum hardware?
arXiv Detail & Related papers (2020-05-04T14:28:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.