Adaptive t Design Dummy-Gate Obfuscation for Cryogenic Scale Enforcement
- URL: http://arxiv.org/abs/2509.00812v1
- Date: Sun, 31 Aug 2025 12:12:48 GMT
- Title: Adaptive t Design Dummy-Gate Obfuscation for Cryogenic Scale Enforcement
- Authors: Samuel Punch, Krishnendu Guha,
- Abstract summary: Cloud quantum services can reveal circuit structure and timing through scheduler metadata, latency patterns, and co-tenant interference.<n>We introduce NADGO, a scheduling and obfuscation stack that enforces operational privacy for gate-model workloads.<n>We prototype the approach on a 4-qubit superconducting tile with cryo-CMOS control and evaluate both depth-varied local-random circuits and small QAOA instances.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cloud quantum services can reveal circuit structure and timing through scheduler metadata, latency patterns, and co-tenant interference. We introduce NADGO (Noise-Adaptive Dummy-Gate Obfuscation), a scheduling and obfuscation stack that enforces operational privacy for gate-model workloads by applying per-interval limits on observable information leakage. To support confidentiality and fair multi-tenancy, operators require a method to audit compliance at acceptable overheads. NADGO combines: (i) hardware-aware t-design padding for structured cover traffic, (ii) particle-filter timing randomization to mask queue patterns, (iii) CASQUE subcircuit routing across heterogeneous backends, and (iv) a per-interval leakage estimator with locked calibration artifacts and a dual-threshold kill-switch. We prototype the approach on a 4-qubit superconducting tile with cryo-CMOS control and evaluate both depth-varied local-random circuits and small QAOA instances. Monitoring runs at a 6.3 microsecond control interval, and per-interval decisions are recorded in an append-only, hash-chained audit log. Across Monte Carlo (Tier 1) and cloud-hardware emulation (Tier 2) evaluations, NADGO maintains leakage within budget in nominal operation (interval-abort rate below 1 percent) and under attack yields high separation with concentrated aborts. At matched leakage targets, microbenchmarks indicate lower latency and cryogenic power consumption than static padding, while end-to-end workloads maintain competitive cost envelopes.
Related papers
- Adversarial Learning Game for Intrusion Detection in Quantum Key Distribution [0.0]
This paper presents a high-fidelity simulation framework for intrusion detection in decoy-state Quantum Key Distribution (QKD)<n>The framework is modeled as a minimax game between a learning-based defender and an adaptive adversary.<n>Under adaptive attack scenarios, the system preserves $82text--92%$ of the honest finite-key rate while discarding only approximately $1.2%$ of traffic.
arXiv Detail & Related papers (2026-03-03T20:21:06Z) - TempoNet: Slack-Quantized Transformer-Guided Reinforcement Scheduler for Adaptive Deadline-Centric Real-Time Dispatchs [8.818252253980985]
TempoNet is a reinforcement learning scheduler that pairs a permutation-invariant Transformer with a deep Q-approximation.<n>A latency-aware sparse attention stack with blockwise top-k selection and locality-sensitive chunking enables global reasoning over unordered task sets.
arXiv Detail & Related papers (2026-02-20T09:56:23Z) - Time Is All It Takes: Spike-Retiming Attacks on Event-Driven Spiking Neural Networks [87.16809558673403]
Spiking neural networks (SNNs) compute with discrete spikes and exploit temporal structure.<n>We study a timing-only adversary that retimes existing spikes while preserving spike counts and amplitudes in event-driven SNNs.
arXiv Detail & Related papers (2026-02-03T09:06:53Z) - Polychronous Wave Computing: Timing-Native Address Selection in Spiking Networks [0.0]
Polychronous Wave Computing is a timing-native address-selection primitive.<n>Spike times are phase-encoded in a rotating frame and processed by a programmable multiport interferometer.<n>We derive the operating envelope imposed by phase wrapping and mutual coherence.
arXiv Detail & Related papers (2026-01-19T14:12:01Z) - ZK-SenseLM: Verifiable Large-Model Wireless Sensing with Selective Abstention and Zero-Knowledge Attestation [0.0]
ZK-SenseLM is a secure and auditable wireless sensing framework.<n>It pairs a large-model encoder for Wi-Fi channel state information with a policy-grounded decision layer and zero-knowledge proofs of inference.
arXiv Detail & Related papers (2025-10-29T16:43:07Z) - Unsupervised Conformal Inference: Bootstrapping and Alignment to Control LLM Uncertainty [49.19257648205146]
We propose an unsupervised conformal inference framework for generation.<n>Our gates achieve close-to-nominal coverage and provide tighter, more stable thresholds than split UCP.<n>The result is a label-free, API-compatible gate for test-time filtering.
arXiv Detail & Related papers (2025-09-26T23:40:47Z) - MAESTROCUT: Dynamic, Noise-Adaptive, and Secure Quantum Circuit Cutting on Near-Term Hardware [0.0]
MaestroCut tracks a variance proxy in real time, triggers re-cutting when accuracy degrades, and routes shots using topology-aware priors.<n>Tier-1 simulations show consistent variance contraction and reduced mean-squared error versus uniform and proportional baselines.<n>Tier-2 emulation with realistic queueing and noise demonstrates stable latency targets, high reliability, and 1% software overhead under stress scenarios.
arXiv Detail & Related papers (2025-08-31T12:01:16Z) - Context-aware gate set tomography: Improving the self-consistent characterization of trapped-ion universal gate sets by leveraging non-Markovianity [49.1574468325115]
Gate set tomography ( GST) estimates the complete set of noisy quantum gates, state preparations, and measurements.<n>In its original incarnation, GST improves the estimation precision by applying the gates sequentially.<n>We show that context dependence can be incorporated in the parametrization of the gate set, allowing us to reduce the sampling cost of GST.
arXiv Detail & Related papers (2025-07-03T11:37:36Z) - A microwave-activated high-fidelity three-qubit gate scheme for fixed-frequency superconducting qubits [18.285015455084935]
We propose a microwave-activated three-qubit gate protocol for fixed-frequency transmon qubits in the large-detuning regime.<n> numerical simulations demonstrate a high average gate fidelity exceeding $99.9%$.<n>This strategy advances scalable quantum computing systems by improving coherence properties, reducing spectral congestion, and expanding the experimental toolkit for error-resilient quantum operations.
arXiv Detail & Related papers (2025-04-30T06:16:16Z) - Realizing a Continuous Set of Two-Qubit Gates Parameterized by an Idle Time [34.99747682571461]
Continuous gate sets are a key ingredient for near-term quantum algorithms.<n>We demonstrate a hardware-efficient, continuous set of controlled arbitrary-phase gates acting on transmon qubits.<n>This native gate set has the potential to reduce the depth and improve the performance of near-term quantum algorithms.
arXiv Detail & Related papers (2025-03-14T08:49:47Z) - PCA-Featured Transformer for Jamming Detection in 5G UAV Networks [0.5999777817331317]
Unmanned Aerial Vehicles (UAVs) face significant security risks from jamming attacks, which can compromise network functionality.<n>Traditional detection methods often fall short when confronting AI-powered jamming that dynamically modifies its behavior.<n>We introduce a novel U-shaped transformer architecture to refine feature representations for improved wireless security.
arXiv Detail & Related papers (2024-12-19T16:13:04Z) - Code-as-Monitor: Constraint-aware Visual Programming for Reactive and Proactive Robotic Failure Detection [56.66677293607114]
We propose Code-as-Monitor (CaM) for both open-set reactive and proactive failure detection.<n>To enhance the accuracy and efficiency of monitoring, we introduce constraint elements that abstract constraint-related entities.<n>Experiments show that CaM achieves a 28.7% higher success rate and reduces execution time by 31.8% under severe disturbances.
arXiv Detail & Related papers (2024-12-05T18:58:27Z) - DA-Flow: Dual Attention Normalizing Flow for Skeleton-based Video Anomaly Detection [52.74152717667157]
We propose a lightweight module called Dual Attention Module (DAM) for capturing cross-dimension interaction relationships in-temporal skeletal data.
It employs the frame attention mechanism to identify the most significant frames and the skeleton attention mechanism to capture broader relationships across fixed partitions with minimal parameters and flops.
arXiv Detail & Related papers (2024-06-05T06:18:03Z) - MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network [9.305680247704542]
Control Area Network (CAN) is an essential communication protocol that interacts between Electronic Control Units (ECUs) in the vehicular network.
CAN is facing stringent security challenges due to innate security risks.
We propose a self-supervised multi-knowledge fused anomaly detection model, called MKF-ADS.
arXiv Detail & Related papers (2024-03-07T07:40:53Z) - Robust Control for Dynamical Systems With Non-Gaussian Noise via Formal
Abstractions [59.605246463200736]
We present a novel controller synthesis method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous control system into a finite-state model that captures noise by probabilistic transitions between discrete states.
We use state-of-the-art verification techniques to provide guarantees on the interval Markov decision process and compute a controller for which these guarantees carry over to the original control system.
arXiv Detail & Related papers (2023-01-04T10:40:30Z) - Over-the-Air Federated Learning with Privacy Protection via Correlated
Additive Perturbations [57.20885629270732]
We consider privacy aspects of wireless federated learning with Over-the-Air (OtA) transmission of gradient updates from multiple users/agents to an edge server.
Traditional perturbation-based methods provide privacy protection while sacrificing the training accuracy.
In this work, we aim at minimizing privacy leakage to the adversary and the degradation of model accuracy at the edge server.
arXiv Detail & Related papers (2022-10-05T13:13:35Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.