2 research outputs found
A Quantum Circuit Obfuscation Methodology for Security and Privacy
Optimization of quantum circuits using an efficient compiler is key to its
success for NISQ computers. Several 3rd party compilers are evolving to offer
improved performance for large quantum circuits. These 3rd parties, or just a
certain release of an otherwise trustworthy compiler, may possibly be untrusted
and this could lead to an adversary to Reverse Engineer (RE) the quantum
circuit for extracting sensitive aspects e.g., circuit topology, program, and
its properties. In this paper, we propose obfuscation of quantum circuits to
hide the functionality. Quantum circuits have inherent margin between correct
and incorrect outputs. Therefore, obfuscation (i.e., corruption of
functionality) by inserting dummy gates is nontrivial. We insert dummy SWAP
gates one at a time for maximum corruption of functionality before sending the
quantum circuit to an untrusted compiler. If an untrusted party clones the
design, they get incorrect functionality. The designer removes the dummy SWAP
gate post-compilation to restore the correct functionality. Compared to a
classical counterpart, the quantum chip does not reveal the circuit
functionality. Therefore, an adversary cannot guess the SWAP gate and
location/validate using an oracle model. Evaluation of realistic quantum
circuit with/without SWAP insertion is impossible in classical computers.
Therefore, we propose a metric-based SWAP gate insertion process. The objective
of the metric is to ensure maximum corruption of functionality measured using
Total Variation Distance (TVD). The proposed approach is validated using IBM
default noisy simulation model. Our metric-based approach predicts the SWAP
position to achieve TVD of upto 50%, and performs 7.5% better than average TVD,
and performs within 12.3% of the best obtainable TVD for the benchmarks. We
obtain an overhead of < 5% for the number of gates and circuit depth after SWAP
addition.Comment: Submitted to IEEE transactions in quantum engineering (TQE
A Survey and Tutorial on Security and Resilience of Quantum Computing
Present-day quantum computers suffer from various noises or errors such as
gate error, relaxation, dephasing, readout error, and crosstalk. Besides, they
offer a limited number of qubits with restrictive connectivity. Therefore,
quantum programs running these computers face resilience issues and low output
fidelities. The noise in the cloud-based access of quantum computers also
introduces new modes of security and privacy issues. Furthermore, quantum
computers face several threat models from insider and outsider adversaries
including input tampering, program misallocation, fault injection, Reverse
Engineering (RE), and Cloning. This paper provides an overview of various
assets embedded in quantum computers and programs, vulnerabilities and attack
models, and the relation between resilience and security. We also cover
countermeasures against the reliability and security issues and present a
future outlook for the security of quantum computing.Comment: 11 pages, 11 figures, EUROPEAN TEST SYMPOSIUM 202