Secret extraction attacks against obfuscated IQP circuits
- URL: http://arxiv.org/abs/2312.10156v1
- Date: Fri, 15 Dec 2023 19:08:35 GMT
- Title: Secret extraction attacks against obfuscated IQP circuits
- Authors: David Gross and Dominik Hangleiter
- Abstract summary: In 2008, Shepherd and Bremner proposed a protocol in which a verifier constructs a unitary from the comparatively easy-to-implement family of IQP circuits.
The challenge problem is designed to contain an obfuscated secret, which can be turned into a statistical test.
Kahanamoku-Meyer found an efficient classical secret extraction attack.
Bremner, Cheng, and Ji very recently followed up by constructing a wide-ranging generalization of the original protocol.
- Score: 0.92463347238923
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Quantum computing devices can now perform sampling tasks which, according to
complexity-theoretic and numerical evidence, are beyond the reach of classical
computers. This raises the question of how one can efficiently verify that a
quantum computer operating in this regime works as intended. In 2008, Shepherd
and Bremner proposed a protocol in which a verifier constructs a unitary from
the comparatively easy-to-implement family of so-called IQP circuits, and
challenges a prover to execute it on a quantum computer. The challenge problem
is designed to contain an obfuscated secret, which can be turned into a
statistical test that accepts samples from a correct quantum implementation. It
was conjectured that extracting the secret from the challenge problem is
NP-hard, so that the ability to pass the test constitutes strong evidence that
the prover possesses a quantum device and that it works as claimed.
Unfortunately, about a decade later, Kahanamoku-Meyer found an efficient
classical secret extraction attack. Bremner, Cheng, and Ji very recently
followed up by constructing a wide-ranging generalization of the original
protocol. Their IQP Stabilizer Scheme has been explicitly designed to
circumvent the known weakness. They also suggested that the original
construction can be made secure by adjusting the problem parameters. In this
work, we develop a number of secret extraction attacks which are effective
against both new approaches in a wide range of problem parameters. The
important problem of finding an efficient and reliable verification protocol
for sampling-based proofs of quantum supremacy thus remains open.
Related papers
- Quantum Subroutine for Variance Estimation: Algorithmic Design and Applications [80.04533958880862]
Quantum computing sets the foundation for new ways of designing algorithms.
New challenges arise concerning which field quantum speedup can be achieved.
Looking for the design of quantum subroutines that are more efficient than their classical counterpart poses solid pillars to new powerful quantum algorithms.
arXiv Detail & Related papers (2024-02-26T09:32:07Z) - IQP Sampling and Verifiable Quantum Advantage: Stabilizer Scheme and
Classical Security [1.7586417032126085]
We introduce a family of IQP sampling protocols called the emphstabilizer scheme, which builds on results linking IQP circuits, the stabilizer formalism, coding theory, and an efficient characterization of IQP circuit correlation functions.
To assess classical security, we explore a class of attacks based on secret extraction, including the Kahanamoku-Meyer's attack as a special case.
arXiv Detail & Related papers (2023-08-14T14:03:33Z) - Quantum Imitation Learning [74.15588381240795]
We propose quantum imitation learning (QIL) with a hope to utilize quantum advantage to speed up IL.
We develop two QIL algorithms, quantum behavioural cloning (Q-BC) and quantum generative adversarial imitation learning (Q-GAIL)
Experiment results demonstrate that both Q-BC and Q-GAIL can achieve comparable performance compared to classical counterparts.
arXiv Detail & Related papers (2023-04-04T12:47:35Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - On Zero-Knowledge Proofs over the Quantum Internet [0.0]
This paper presents a new method for quantum identity authentication (QIA) protocols.
The logic of classical zero-knowledge proofs (ZKPs) due to Schnorr is applied in quantum circuits and algorithms.
arXiv Detail & Related papers (2022-12-06T14:57:00Z) - Experimental Implementation of an Efficient Test of Quantumness [49.588006756321704]
A test of quantumness is a protocol where a classical user issues challenges to a quantum device to determine if it exhibits non-classical behavior.
Recent attempts to implement such tests on current quantum computers rely on either interactive challenges with efficient verification, or non-interactive challenges with inefficient (exponential time) verification.
arXiv Detail & Related papers (2022-09-28T18:00:04Z) - Depth-efficient proofs of quantumness [77.34726150561087]
A proof of quantumness is a type of challenge-response protocol in which a classical verifier can efficiently certify quantum advantage of an untrusted prover.
In this paper, we give two proof of quantumness constructions in which the prover need only perform constant-depth quantum circuits.
arXiv Detail & Related papers (2021-07-05T17:45:41Z) - A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds [12.525959293825318]
We construct a constant round interactive proof for NP that satisfies statistical soundness and black-box $epsilon$-zero-knowledge against quantum attacks.
At the heart of our results is a new quantum rewinding technique that enables a simulator to extract a committed message of a malicious verifier.
arXiv Detail & Related papers (2020-11-05T05:40:05Z) - Anti-Forging Quantum Data: Cryptographic Verification of Quantum
Computational Power [1.9737117321211988]
Quantum cloud computing is emerging as a popular model for users to experience the power of quantum computing through the internet.
How can users be sure that the output strings sent by the server are really from a quantum hardware?
arXiv Detail & Related papers (2020-05-04T14:28:14Z) - Using Quantum Metrological Bounds in Quantum Error Correction: A Simple
Proof of the Approximate Eastin-Knill Theorem [77.34726150561087]
We present a proof of the approximate Eastin-Knill theorem, which connects the quality of a quantum error-correcting code with its ability to achieve a universal set of logical gates.
Our derivation employs powerful bounds on the quantum Fisher information in generic quantum metrological protocols.
arXiv Detail & Related papers (2020-04-24T17:58:10Z) - Forging quantum data: classically defeating an IQP-based quantum test [0.0]
We describe a classical algorithm that can convince the verifier that the (classical) prover is quantum.
We show that the key extraction algorithm is efficient in practice for problem sizes of hundreds of qubits.
arXiv Detail & Related papers (2019-12-11T19:00:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.