Reconstructing quantum circuits through side-channel information on cloud-based superconducting quantum computers

Brennan Bell*, Andreas Trugler

*Korrespondierende/r Autor/-in für diese Arbeit

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Our aim in this paper is to present experimental evidence of a side-channel attack on superconducting cloud-based quantum computers, demonstrating that a quantum circuit can be analyzed indirectly using data gathered before and after its execution on a quantum computer. We hope that this can motivate further research into hardware and system stability of quantum computers as well as into more-nuanced systems-level attacks. Although much work has been done on establishing error correcting codes to address issues of decoherence, and schemes can be utilized to leverage quantum effects for the sake of intrusion detection over quantum communication channels, there is a lack of literature in the field regarding side-channel attacks on transpiled quantum circuits, particularly those which leverage quantum effects to gather information about quantum circuits running in the cloud. We explored issues of decoherence by examining quantum circuit behavior both before and after a specified circuit was executed in order to ascertain decalibration rates and potential sources of decoherence: our data clearly shows that information on an interim circuit can be acquired in this manner. Using convenient data classification techniques and various circuit diagrams consisting of one quantum gate and several measurements, we were able to distinguish between these various circuits when executed at position n in the interim phase by training our classifier on data from probing circuits executed at queue positions n-1 and n+1. This shows that there is sufficient information residing in the data before and after a circuit is executed on a cloud-based superconducting quantum computer to allow an attacker to ascertain information about an otherwise unknown third-party circuit and shows potential to form the basis of a side-channel attack in cases where queue positions can be examined to target a third party's transpiled circuit during experimentation. This side channel attack merits further examination and extrapolation to identify more-complex circuits, and deeper statistical consideration to determine potential sources of information leakage and mitigation strategies.

Originalspracheenglisch
TitelProceedings - 2022 IEEE International Conference on Quantum Computing and Engineering, QCE 2022
Herausgeber (Verlag)Institute of Electrical and Electronics Engineers
Seiten259-264
Seitenumfang6
ISBN (elektronisch)9781665491136
DOIs
PublikationsstatusVeröffentlicht - 2022
Veranstaltung3rd IEEE International Conference on Quantum Computing and Engineering: QCE 2022 - Broomfield, USA / Vereinigte Staaten
Dauer: 18 Sept. 202223 Sept. 2022

Konferenz

Konferenz3rd IEEE International Conference on Quantum Computing and Engineering
KurztitelQCE 2022
Land/GebietUSA / Vereinigte Staaten
OrtBroomfield
Zeitraum18/09/2223/09/22

ASJC Scopus subject areas

  • Artificial intelligence
  • Theoretische Informatik und Mathematik
  • Angewandte Informatik
  • Steuerung und Optimierung
  • Atom- und Molekularphysik sowie Optik

Fingerprint

Untersuchen Sie die Forschungsthemen von „Reconstructing quantum circuits through side-channel information on cloud-based superconducting quantum computers“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren