-
QuBEC: Boosting Equivalence Checking for Quantum Circuits with QEC Embedding
Authors:
Chao Lu,
Navnil Choudhury,
Utsav Banerjee,
Abdullah Ash Saki,
Kanad Basu
Abstract:
Quantum computing has proven to be capable of accelerating many algorithms by performing tasks that classical computers cannot. Currently, Noisy Intermediate Scale Quantum (NISQ) machines struggle from scalability and noise issues to render a commercial quantum computer. However, the physical and software improvements of a quantum computer can efficiently control quantum gate noise. As the complex…
▽ More
Quantum computing has proven to be capable of accelerating many algorithms by performing tasks that classical computers cannot. Currently, Noisy Intermediate Scale Quantum (NISQ) machines struggle from scalability and noise issues to render a commercial quantum computer. However, the physical and software improvements of a quantum computer can efficiently control quantum gate noise. As the complexity of quantum algorithms and implementation increases, software control of quantum circuits may lead to a more intricate design. Consequently, the verification of quantum circuits becomes crucial in ensuring the correctness of the compilation, along with other processes, including quantum error correction and assertions, that can increase the fidelity of quantum circuits. In this paper, we propose a Decision Diagram-based quantum equivalence checking approach, QuBEC, that requires less latency compared to existing techniques, while accounting for circuits with quantum error correction redundancy. Our proposed methodology reduces verification time on certain benchmark circuits by up to $271.49 \times$, while the number of Decision Diagram nodes required is reduced by up to $798.31 \times$, compared to state-of-the-art strategies. The proposed QuBEC framework can contribute to the advancement of quantum computing by enabling faster and more efficient verification of quantum circuits, paving the way for the development of larger and more complex quantum algorithms.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
A Primer on Security of Quantum Computing
Authors:
Swaroop Ghosh,
Suryansh Upadhyay,
Abdullah Ash Saki
Abstract:
Quantum computing is an emerging computing paradigm that can potentially transform several application areas by solving some of the intractable problems from classical domain. Similar to classical computing systems, quantum computing stack including software and hardware rely extensively on third parties many of them could be untrusted or less-trusted or unreliable. Quantum computing stack may con…
▽ More
Quantum computing is an emerging computing paradigm that can potentially transform several application areas by solving some of the intractable problems from classical domain. Similar to classical computing systems, quantum computing stack including software and hardware rely extensively on third parties many of them could be untrusted or less-trusted or unreliable. Quantum computing stack may contain sensitive Intellectual Properties (IP) that requires protection. From hardware perspective, quantum computers suffer from crosstalk that couples two programs in a multi-tenant setting to facilitate traditionally known fault injection attacks. Furthermore, third party calibration services can report incorrect error rates of qubits or mis-calibrate the qubits to degrade the computation performance for denial-of-service attacks. Quantum computers are expensive and access queue is typically long for trusted providers. Therefore, users may be enticed to explore untrusted but cheaper and readily available quantum hardware which can enable stealth of IP and tampering of quantum programs and/or computation outcomes. Recent studies have indicated the evolution of efficient but untrusted compilation services which presents risks to the IPs present in the quantum circuits. The untrusted compiler can also inject Trojans and perform tampering. Although quantum computing can involve sensitive IP and private information and can solve problems with strategic impact, its security and privacy has received inadequate attention. This paper provides comprehensive overview of the basics of quantum computing, key vulnerabilities embedded in the quantum systems and the recent attack vectors and corresponding defenses. Future research directions are also provided to build a stronger community of quantum security investigators.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
Hypothesis Testing for Error Mitigation: How to Evaluate Error Mitigation
Authors:
Abdullah Ash Saki,
Amara Katabarwa,
Salonik Resch,
George Umbrarescu
Abstract:
In the noisy intermediate-scale quantum (NISQ) era, quantum error mitigation will be a necessary tool to extract useful performance out of quantum devices. However, there is a big gap between the noise models often assumed by error mitigation techniques and the actual noise on quantum devices. As a consequence, there arises a gap between the theoretical expectations of the techniques and their eve…
▽ More
In the noisy intermediate-scale quantum (NISQ) era, quantum error mitigation will be a necessary tool to extract useful performance out of quantum devices. However, there is a big gap between the noise models often assumed by error mitigation techniques and the actual noise on quantum devices. As a consequence, there arises a gap between the theoretical expectations of the techniques and their everyday performance. Cloud users of quantum devices in particular, who often take the devices as they are, feel this gap the most. How should they parametrize their uncertainty in the usefulness of these techniques and be able to make judgement calls between resources required to implement error mitigation and the accuracy required at the algorithmic level? To answer the first question, we introduce hypothesis testing within the framework of quantum error mitigation and for the second question, we propose an inclusive figure of merit that accounts for both resource requirement and mitigation efficiency of an error mitigation implementation. The figure of merit is useful to weigh the trade-offs between the scalability and accuracy of various error mitigation methods. Finally, using the hypothesis testing and the figure of merit, we experimentally evaluate $16$ error mitigation pipelines composed of singular methods such as zero noise extrapolation, randomized compilation, measurement error mitigation, dynamical decoupling, and mitigation with estimation circuits. In total our data involved running $275,640$ circuits on two IBM quantum computers.
△ Less
Submitted 6 January, 2023;
originally announced January 2023.
-
A Shuttle-Efficient Qubit Mapper for Trapped-Ion Quantum Computers
Authors:
Suryansh Upadhyay,
Abdullah Ash Saki,
Rasit Onur Topaloglu,
Swaroop Ghosh
Abstract:
Trapped-ion (TI) quantum computer is one of the forerunner quantum technologies. However, TI systems can have a limited number of qubits in a single trap. Execution of meaningful quantum algorithms requires a multiple trap system. In such systems, the computation may frequently involve ions from two different traps for which the qubits must be co-located in the same trap, hence one of the ions nee…
▽ More
Trapped-ion (TI) quantum computer is one of the forerunner quantum technologies. However, TI systems can have a limited number of qubits in a single trap. Execution of meaningful quantum algorithms requires a multiple trap system. In such systems, the computation may frequently involve ions from two different traps for which the qubits must be co-located in the same trap, hence one of the ions needs to be shuttled (moved) between traps, increasing the vibrational energy, degrading fidelity, and increasing the program execution time. The choice of initial map** influences the number of shuttles. The existing Greedy policy counts the number of gates occurring between each pair of qubits and assigns edge weight. The qubits with high edge weights are placed close to each other. However, it neglects the stage of the program at which the gate is occurring. Intuitively, the contribution of the late-occurring gates to the initial map** reduces since the ions might have already shuttled to a different trap to satisfy other gate operations. In this paper, we target this gap and propose a new policy especially for programs with considerable depth and high number of qubits (valid for practical-scale quantum programs). Our policy is program adaptive and prioritizes the gates re-occurring at the initial stages of the program over late occurring gates. Our technique achieves an average reduction of 9% shuttles/program (with 21.3% at best) for 120 random circuits and enhances the program fidelity up to 3.3X (1.41X on average).
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
Muzzle the Shuttle: Efficient Compilation for Multi-Trap Trapped-Ion Quantum Computers
Authors:
Abdullah Ash Saki,
Rasit Onur Topaloglu,
Swaroop Ghosh
Abstract:
Trapped-ion systems can have a limited number of ions (qubits) in a single trap. Increasing the qubit count to run meaningful quantum algorithms would require multiple traps where ions need to shuttle between traps to communicate. The existing compiler has several limitations which result in a high number of shuttle operations and degraded fidelity. In this paper, we target this gap and propose co…
▽ More
Trapped-ion systems can have a limited number of ions (qubits) in a single trap. Increasing the qubit count to run meaningful quantum algorithms would require multiple traps where ions need to shuttle between traps to communicate. The existing compiler has several limitations which result in a high number of shuttle operations and degraded fidelity. In this paper, we target this gap and propose compiler optimizations to reduce the number of shuttles. Our technique achieves a maximum reduction of $51.17\%$ in shuttles (average $\approx 33\%$) tested over $125$ circuits. Furthermore, the improved compilation enhances the program fidelity up to $22.68$X with a modest increase in the compilation time.
△ Less
Submitted 15 November, 2021;
originally announced November 2021.
-
Shuttle-Exploiting Attacks and Their Defenses in Trapped-Ion Quantum Computers
Authors:
Abdullah Ash Saki,
Rasit Onur Topaloglu,
Swaroop Ghosh
Abstract:
Trapped-ion (TI) quantum bits are a front-runner technology for quantum computing. TI systems with multiple interconnected traps can overcome the hardware connectivity issue inherent in superconducting qubits and can solve practical problems at scale. With a sufficient number of qubits on the horizon, the multi-programming model for Quantum Computers (QC) has been proposed where multiple users sha…
▽ More
Trapped-ion (TI) quantum bits are a front-runner technology for quantum computing. TI systems with multiple interconnected traps can overcome the hardware connectivity issue inherent in superconducting qubits and can solve practical problems at scale. With a sufficient number of qubits on the horizon, the multi-programming model for Quantum Computers (QC) has been proposed where multiple users share the same QC for their computing. Multi-programming is enticing for quantum cloud providers as it can maximize device utilization, throughput, and profit for clouds. Users can also benefit from the short wait queue. However, shared access to quantum computers can create new security issues. This paper presents one such vulnerability in shared TI systems that require shuttle operations for communication among traps. Repeated shuttle operations increase quantum bit energy and degrade the reliability of computations (fidelity). We show adversarial program design approaches requiring numerous shuttles. We propose a random and systematic methodology for adversary program generation. Our analysis shows shuttle-exploiting attacks can substantially degrade the fidelities of victim programs by 2X to 63X. Finally, we present several countermeasures such as adopting a hybrid initial map** policy, padding victim programs with dummy qubits, and cap** maximum shuttles.
△ Less
Submitted 2 August, 2021;
originally announced August 2021.
-
A Survey and Tutorial on Security and Resilience of Quantum Computing
Authors:
Abdullah Ash Saki,
Mahabubul Alam,
Koustubh Phalak,
Aakarshitha Suresh,
Rasit Onur Topaloglu,
Swaroop Ghosh
Abstract:
Present-day quantum computers suffer from various noises or errors such as gate error, relaxation, dephasing, readout error, and crosstalk. Besides, they offer a limited number of qubits with restrictive connectivity. Therefore, quantum programs running these computers face resilience issues and low output fidelities. The noise in the cloud-based access of quantum computers also introduces new mod…
▽ More
Present-day quantum computers suffer from various noises or errors such as gate error, relaxation, dephasing, readout error, and crosstalk. Besides, they offer a limited number of qubits with restrictive connectivity. Therefore, quantum programs running these computers face resilience issues and low output fidelities. The noise in the cloud-based access of quantum computers also introduces new modes of security and privacy issues. Furthermore, quantum computers face several threat models from insider and outsider adversaries including input tampering, program misallocation, fault injection, Reverse Engineering (RE), and Cloning. This paper provides an overview of various assets embedded in quantum computers and programs, vulnerabilities and attack models, and the relation between resilience and security. We also cover countermeasures against the reliability and security issues and present a future outlook for the security of quantum computing.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
A Quantum Circuit Obfuscation Methodology for Security and Privacy
Authors:
Aakarshitha Suresh,
Abdullah Ash Saki,
Mahabubul Alam,
Rasit o Topalaglu,
Dr. Swaroop Ghosh
Abstract:
Optimization of quantum circuits using an efficient compiler is key to its success for NISQ computers. Several 3rd party compilers are evolving to offer improved performance for large quantum circuits. These 3rd parties, or just a certain release of an otherwise trustworthy compiler, may possibly be untrusted and this could lead to an adversary to Reverse Engineer (RE) the quantum circuit for extr…
▽ More
Optimization of quantum circuits using an efficient compiler is key to its success for NISQ computers. Several 3rd party compilers are evolving to offer improved performance for large quantum circuits. These 3rd parties, or just a certain release of an otherwise trustworthy compiler, may possibly be untrusted and this could lead to an adversary to Reverse Engineer (RE) the quantum circuit for extracting sensitive aspects e.g., circuit topology, program, and its properties. In this paper, we propose obfuscation of quantum circuits to hide the functionality. Quantum circuits have inherent margin between correct and incorrect outputs. Therefore, obfuscation (i.e., corruption of functionality) by inserting dummy gates is nontrivial. We insert dummy SWAP gates one at a time for maximum corruption of functionality before sending the quantum circuit to an untrusted compiler. If an untrusted party clones the design, they get incorrect functionality. The designer removes the dummy SWAP gate post-compilation to restore the correct functionality. Compared to a classical counterpart, the quantum chip does not reveal the circuit functionality. Therefore, an adversary cannot guess the SWAP gate and location/validate using an oracle model. Evaluation of realistic quantum circuit with/without SWAP insertion is impossible in classical computers. Therefore, we propose a metric-based SWAP gate insertion process. The objective of the metric is to ensure maximum corruption of functionality measured using Total Variation Distance (TVD). The proposed approach is validated using IBM default noisy simulation model. Our metric-based approach predicts the SWAP position to achieve TVD of upto 50%, and performs 7.5% better than average TVD, and performs within 12.3% of the best obtainable TVD for the benchmarks. We obtain an overhead of < 5% for the number of gates and circuit depth after SWAP addition.
△ Less
Submitted 13 April, 2021;
originally announced April 2021.
-
Qubit Sensing: A New Attack Model for Multi-programming Quantum Computing
Authors:
Abdullah Ash Saki,
Swaroop Ghosh
Abstract:
Noisy quantum computers suffer from readout or measurement error. It is a classical bit-flip error due to which state "1" is read out as "0" and vice-versa. The probability of readout error shows a state dependence i.e., flip** probability of state "1" may differ from flip** probability of state "0". Moreover, the probability shows correlation across qubits. These state-dependent and correlate…
▽ More
Noisy quantum computers suffer from readout or measurement error. It is a classical bit-flip error due to which state "1" is read out as "0" and vice-versa. The probability of readout error shows a state dependence i.e., flip** probability of state "1" may differ from flip** probability of state "0". Moreover, the probability shows correlation across qubits. These state-dependent and correlated error probability introduces a signature of victim outputs on adversary output when two programs are run simultaneously on the same quantum computer. This can be exploited to sense victim output which may contain sensitive information. In this paper, we systematically show that such readout error-dependent signatures exist and that an adversary can use such signature to infer a user output. We experimentally demonstrate the attack (inference) on 3 public IBM quantum computers. Using Jensen-Shannon Distance (JSD) a measure for statistical inference, we show that our approach identifies victim output with an accuracy of 96% on real hardware. We also present randomized output flip** as a lightweight yet effective countermeasure to thwart such information leakage attacks. Our analysis shows the countermeasure incurs a minor penalty of 0.05% in terms of fidelity.
△ Less
Submitted 12 April, 2021;
originally announced April 2021.
-
MUQUT: Multi-Constraint Quantum Circuit Map** on Noisy Intermediate-Scale Quantum Computers
Authors:
Debjyoti Bhattacharjee,
Abdullah Ash Saki,
Mahabubul Alam,
Anupam Chattopadhyay,
Swaroop Ghosh
Abstract:
Rapid advancement in the domain of quantum technologies has opened up researchers to the real possibility of experimenting with quantum circuits and simulating small-scale quantum programs. Nevertheless, the quality of currently available qubits and environmental noise poses a challenge in the smooth execution of the quantum circuits. Therefore, efficient design automation flows for map** a give…
▽ More
Rapid advancement in the domain of quantum technologies has opened up researchers to the real possibility of experimenting with quantum circuits and simulating small-scale quantum programs. Nevertheless, the quality of currently available qubits and environmental noise poses a challenge in the smooth execution of the quantum circuits. Therefore, efficient design automation flows for map** a given algorithm to the Noisy Intermediate Scale Quantum (NISQ) computer becomes of utmost importance. State-of-the-art quantum design automation tools are primarily focused on reducing logical depth, gate count and qubit count with the recent emphasis on topology-aware (nearest-neighbor compliance) map**. In this work, we extend the technology map** flows to simultaneously consider the topology and gate fidelity constraints while kee** logical depth and gate count as optimization objectives. We provide a comprehensive problem formulation and multi-tier approach towards solving it. The proposed automation flow is compatible with commercial quantum computers, such as IBM QX and Rigetti. Our simulation results over 10 quantum circuit benchmarks show that the fidelity of the circuit can be improved up to 3.37X with an average improvement of 1.87X.
△ Less
Submitted 16 November, 2019;
originally announced November 2019.
-
Study of Decoherence in Quantum Computers: A Circuit-Design Perspective
Authors:
Abdullah Ash Saki,
Mahabubul Alam,
Swaroop Ghosh
Abstract:
Decoherence of quantum states is a major hurdle towards scalable and reliable quantum computing. Lower decoherence (i.e., higher fidelity) can alleviate the error correction overhead and obviate the need for energy-intensive noise reduction techniques e.g., cryogenic cooling. In this paper, we performed a noise-induced decoherence analysis of single and multi-qubit quantum gates using physics-base…
▽ More
Decoherence of quantum states is a major hurdle towards scalable and reliable quantum computing. Lower decoherence (i.e., higher fidelity) can alleviate the error correction overhead and obviate the need for energy-intensive noise reduction techniques e.g., cryogenic cooling. In this paper, we performed a noise-induced decoherence analysis of single and multi-qubit quantum gates using physics-based simulations. The analysis indicates that (i) decoherence depends on the input state and the gate type. Larger number of $|1\rangle$ states worsen the decoherence; (ii) amplitude dam** is more detrimental than phase dam**; (iii) shorter depth implementation of a quantum function can achieve lower decoherence. Simulations indicate 20\% improvement in the fidelity of a quantum adder when realized using lower depth topology. The insights developed in this paper can be exploited by the circuit designer to choose the right gates and logic implementation to optimize the system-level fidelity.
△ Less
Submitted 8 April, 2019;
originally announced April 2019.