-
Q-COSMIC: Quantum Software Metrics Based on COSMIC (ISO/IEC19761)
Authors:
Francisco Valdes-Souto,
Hector G. Perez-Gonzalez,
Carlos A. Perez-Delgado
Abstract:
Quantum engineering seeks to exploit quantum information to build, among others, computing, cybersecurity, and metrology technologies. Quantum Software Engineering (QSE) focuses on the information processing side of these technologies. Historically, quantum (software) engineering has focused on development in controlled research environments and 'in the small'. As the field progresses, we should e…
▽ More
Quantum engineering seeks to exploit quantum information to build, among others, computing, cybersecurity, and metrology technologies. Quantum Software Engineering (QSE) focuses on the information processing side of these technologies. Historically, quantum (software) engineering has focused on development in controlled research environments and 'in the small'. As the field progresses, we should expect to see more large-scale quantum systems to be deployed as 'real-world' products and services. An essential tool in (classical) software engineering and development has been software size metrics. Calculating/estimating the size of a piece of software, to be developed or pre-existing, is an essential step in its engineering. Quantum software will be no different. Here we introduce Q-COSMIC, a technique for measuring the functional size of quantum software, based on the well-regarded COSMIC standard (ISO/IEC19761) for classical software
△ Less
Submitted 13 February, 2024;
originally announced February 2024.
-
Quantum Blockchain Miners Provide Massive Energy Savings
Authors:
Joseph Kearney,
Carlos A Perez-Delgado
Abstract:
Blockchain-based cryptocurrencies have become an extremely important, highly-used, technology. A major criticism of cryptocurrencies, however, is their energy consumption. In May 2022 Bitcoin alone was reported to be consuming 150 terawatt-hours of electricity annually; more than many entire countries. Hence, any meaningful efficiency increase in this process would have a tremendous positive impac…
▽ More
Blockchain-based cryptocurrencies have become an extremely important, highly-used, technology. A major criticism of cryptocurrencies, however, is their energy consumption. In May 2022 Bitcoin alone was reported to be consuming 150 terawatt-hours of electricity annually; more than many entire countries. Hence, any meaningful efficiency increase in this process would have a tremendous positive impact. Meanwhile, practical applications of quantum information technologies, and in particular of near-term quantum computers (NISQ) continue to be an important research question. Here, we study the efficiency benefits of moving cryptocurrency mining from current ASIC-based miners to quantum, and in particular NISQ, miners. While the time-efficiency benefits of quantum technologies is extremely well-studied, here we focus on energy savings. We show that the transition to quantum-based mining could incur an energy saving, by relatively conservative estimates, of about roughly 126.7TWH, or put differently the total energy consumption of Sweden in 2020.
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
Quantum Advantage on Proof of Work
Authors:
Dan A. Bard,
Joseph J. Kearney,
Carlos A. Perez-Delgado
Abstract:
Proof-of-Work (PoW) is a fundamental underlying technology behind most major blockchain cryptocurrencies. It has been previously pointed out that quantum devices provide a computational advantage in performing PoW in the context of Bitcoin. Here we make the case that this quantum advantage extends not only to all existing PoW mechanisms, but to any possible PoW as well. This has strong consequence…
▽ More
Proof-of-Work (PoW) is a fundamental underlying technology behind most major blockchain cryptocurrencies. It has been previously pointed out that quantum devices provide a computational advantage in performing PoW in the context of Bitcoin. Here we make the case that this quantum advantage extends not only to all existing PoW mechanisms, but to any possible PoW as well. This has strong consequences regarding both quantum-based attacks on the integrity of the entirety of the blockchain, as well as more legitimate uses of quantum computation for the purpose of mining Bitcoin and other cryptocurrencies. For the first case, we estimate when these quantum attacks will become feasible, for various cryptocurrencies, and discuss the impact of such attacks. For the latter, we derive a precise formula to calculate the economic incentive for switching to quantum-based cryptocurrency miners. Using this formula, we analyze several test scenarios, and conclude that investing in quantum hardware for cryptocurrency mining has the potential to pay off immensely.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
Vulnerability of Blockchain Technologies to Quantum Attacks
Authors:
Joseph J. Kearney,
Carlos A. Perez-Delgado
Abstract:
Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub-routines. Some of these protocols, but not all, are open to quantum attacks. Here we ana…
▽ More
Quantum computation represents a threat to many cryptographic protocols in operation today. It has been estimated that by 2035, there will exist a quantum computer capable of breaking the vital cryptographic scheme RSA2048. Blockchain technologies rely on cryptographic protocols for many of their essential sub-routines. Some of these protocols, but not all, are open to quantum attacks. Here we analyze the major blockchain-based cryptocurrencies deployed today -- including Bitcoin, Ethereum, Litecoin and ZCash, and determine their risk exposure to quantum attacks. We finish with a comparative analysis of the studied cryptocurrencies and their underlying blockchain technologies and their relative levels of vulnerability to quantum attacks.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
Towards a Quantum Software Modeling Language
Authors:
Carlos A. Perez-Delgado,
Hector G. Perez-Gonzalez
Abstract:
We set down the principles behind a modeling language for quantum software. We present a minimal set of extensions to the well-known Unified Modeling Language (UML) that allows it to effectively model quantum software. These extensions are separate and independent of UML as a whole. As such they can be used to extend any other software modeling language, or as a basis for a completely new language…
▽ More
We set down the principles behind a modeling language for quantum software. We present a minimal set of extensions to the well-known Unified Modeling Language (UML) that allows it to effectively model quantum software. These extensions are separate and independent of UML as a whole. As such they can be used to extend any other software modeling language, or as a basis for a completely new language. We argue that these extensions are both necessary and sufficient to model, abstractly, any piece of quantum software. Finally, we provide a small set of examples that showcase the effectiveness of the extension set.
△ Less
Submitted 30 June, 2020;
originally announced June 2020.
-
Fast graph operations in quantum computation
Authors:
Liming Zhao,
Carlos A. Pérez-Delgado,
Joseph F. Fitzsimons
Abstract:
The connection between certain entangled states and graphs has been heavily studied in the context of measurement-based quantum computation as a tool for understanding entanglement. Here we show that this correspondence can be harnessed in the reverse direction to yield a graph data structure which allows for more efficient manipulation and comparison of graphs than any possible classical structur…
▽ More
The connection between certain entangled states and graphs has been heavily studied in the context of measurement-based quantum computation as a tool for understanding entanglement. Here we show that this correspondence can be harnessed in the reverse direction to yield a graph data structure which allows for more efficient manipulation and comparison of graphs than any possible classical structure. We introduce efficient algorithms for many transformation and comparison operations on graphs represented as graph states, and prove that no classical data structure can have similar performance for the full set of operations studied.
△ Less
Submitted 13 October, 2015;
originally announced October 2015.
-
Device-Independent Verifiable Blind Quantum Computation
Authors:
Michal Hajdušek,
Carlos A. Pérez-Delgado,
Joseph F. Fitzsimons
Abstract:
As progress on experimental quantum processors continues to advance, the problem of verifying the correct operation of such devices is becoming a pressing concern. The recent discovery of protocols for verifying computation performed by entangled but non-communicating quantum processors holds the promise of certifying the correctness of arbitrary quantum computations in a fully device-independent…
▽ More
As progress on experimental quantum processors continues to advance, the problem of verifying the correct operation of such devices is becoming a pressing concern. The recent discovery of protocols for verifying computation performed by entangled but non-communicating quantum processors holds the promise of certifying the correctness of arbitrary quantum computations in a fully device-independent manner. Unfortunately, all known schemes have prohibitive overhead, with resources scaling as extremely high degree polynomials in the number of gates constituting the computation. Here we present a novel approach based on a combination of verified blind quantum computation and Bell state self-testing. This approach has dramatically reduced overhead, with resources scaling as only $O(m^4\ln m)$ in the number of gates.
△ Less
Submitted 2 December, 2015; v1 submitted 9 February, 2015;
originally announced February 2015.
-
Limitations on information theoretically secure quantum homomorphic encryption
Authors:
Li Yu,
Carlos A. Perez-Delgado,
Joseph F. Fitzsimons
Abstract:
Homomorphic encryption is a form of encryption which allows computation to be carried out on the encrypted data without the need for decryption. The success of quantum approaches to related tasks in a delegated computation setting has raised the question of whether quantum mechanics may be used to achieve information theoretically secure fully homomorphic encryption. Here we show, via an informati…
▽ More
Homomorphic encryption is a form of encryption which allows computation to be carried out on the encrypted data without the need for decryption. The success of quantum approaches to related tasks in a delegated computation setting has raised the question of whether quantum mechanics may be used to achieve information theoretically secure fully homomorphic encryption. Here we show, via an information localisation argument, that deterministic fully homomorphic encryption necessarily incurs exponential overhead if perfect security is required.
△ Less
Submitted 10 June, 2014;
originally announced June 2014.
-
Optimal Blind Quantum Computation
Authors:
Atul Mantri,
Carlos A. Perez-Delgado,
Joseph F. Fitzsimons
Abstract:
Blind quantum computation allows a client with limited quantum capabilities to interact with a remote quantum computer to perform an arbitrary quantum computation, while kee** the description of that computation hidden from the remote quantum computer. While a number of protocols have been proposed in recent years, little is currently understood about the resources necessary to accomplish the ta…
▽ More
Blind quantum computation allows a client with limited quantum capabilities to interact with a remote quantum computer to perform an arbitrary quantum computation, while kee** the description of that computation hidden from the remote quantum computer. While a number of protocols have been proposed in recent years, little is currently understood about the resources necessary to accomplish the task. Here we present general techniques for upper and lower bounding the quantum communication necessary to perform blind quantum computation, and use these techniques to establish a concrete bounds for common choices of the client's quantum capabilities. Our results show that the UBQC protocol of Broadbent, Fitzsimons and Kashefi [1], comes within a factor of 8/3 of optimal when the client is restricted to preparing single qubits. However, we describe a generalization of this protocol which requires exponentially less quantum communication when the client has a more sophisticated device.
△ Less
Submitted 16 June, 2013;
originally announced June 2013.
-
Cellular Automata as a Model of Physical Systems
Authors:
Donny Cheung,
Carlos A. Perez-Delgado
Abstract:
Cellular Automata (CA), as they are presented in the literature, are abstract mathematical models of computation. In this pa- per we present an alternate approach: using the CA as a model or theory of physical systems and devices. While this approach abstracts away all details of the underlying physical system, it remains faithful to the fact that there is an underlying physical reality which it…
▽ More
Cellular Automata (CA), as they are presented in the literature, are abstract mathematical models of computation. In this pa- per we present an alternate approach: using the CA as a model or theory of physical systems and devices. While this approach abstracts away all details of the underlying physical system, it remains faithful to the fact that there is an underlying physical reality which it describes. This imposes certain restrictions on the types of computations a CA can physically carry out, and the resources it needs to do so. In this paper we explore these and other consequences of our reformalization.
△ Less
Submitted 10 September, 2008;
originally announced September 2008.