TY - GEN
T1 - Robust and Secure Hybrid Quantum-Classical Computation on Untrusted Cloud-Based Quantum Hardware
AU - Upadhyay, Suryansh
AU - Ghosh, Swaroop
N1 - Publisher Copyright:
© 2022 ACM.
PY - 2022/10/1
Y1 - 2022/10/1
N2 - Quantum computers are currently accessible through a cloud-based platform that allows users to run their programs on a suite of quantum hardware. As the quantum computing ecosystem grows in popularity and utility, it is reasonable to expect more companies, including untrustworthy/untrustworthy/unreliable vendors, to begin offering quantum computers as hardware-As-A-service at various price/performance points. Since computing time on quantum hardware is expensive and the access queue may be long, users will be enticed to use less expensive but less reliable/trustworthy hardware. Less-Trusted vendors may tamper with the results and/or parameters of quantum circuits, providing the user with a sub-optimal solution or incurring a cost of higher iterations. In this paper, we model and simulate adversarial tampering of input parameters and measurement outcomes on an exemplary hybrid quantum classical algorithm namely, Quantum Approximate Optimization Algorithm (QAOA). We observe a maximum performance degradation of . To achieve comparable performance with minimal parameter tampering, the user incurs a minimum cost of 20X higher iteration. We propose distributing the computation (iterations) equally among the various hardware options to ensure trustworthy computing for a mix of trusted and untrusted hardware. In the chosen performance metrics, we observe a maximum improvement of ≈ 30%. In addition, we propose re-initialization of the parameters after a few initial iterations to fully recover the original program performance and an intelligent run adaptive split heuristic, which allows users to identify tampered/untrustworthy hardware at runtime and allocate more iterations to the reliable hardware, resulting in a maximum improvement of ≈ .
AB - Quantum computers are currently accessible through a cloud-based platform that allows users to run their programs on a suite of quantum hardware. As the quantum computing ecosystem grows in popularity and utility, it is reasonable to expect more companies, including untrustworthy/untrustworthy/unreliable vendors, to begin offering quantum computers as hardware-As-A-service at various price/performance points. Since computing time on quantum hardware is expensive and the access queue may be long, users will be enticed to use less expensive but less reliable/trustworthy hardware. Less-Trusted vendors may tamper with the results and/or parameters of quantum circuits, providing the user with a sub-optimal solution or incurring a cost of higher iterations. In this paper, we model and simulate adversarial tampering of input parameters and measurement outcomes on an exemplary hybrid quantum classical algorithm namely, Quantum Approximate Optimization Algorithm (QAOA). We observe a maximum performance degradation of . To achieve comparable performance with minimal parameter tampering, the user incurs a minimum cost of 20X higher iteration. We propose distributing the computation (iterations) equally among the various hardware options to ensure trustworthy computing for a mix of trusted and untrusted hardware. In the chosen performance metrics, we observe a maximum improvement of ≈ 30%. In addition, we propose re-initialization of the parameters after a few initial iterations to fully recover the original program performance and an intelligent run adaptive split heuristic, which allows users to identify tampered/untrustworthy hardware at runtime and allocate more iterations to the reliable hardware, resulting in a maximum improvement of ≈ .
UR - http://www.scopus.com/inward/record.url?scp=85174497044&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85174497044&partnerID=8YFLogxK
U2 - 10.1145/3569562.3569569
DO - 10.1145/3569562.3569569
M3 - Conference contribution
AN - SCOPUS:85174497044
T3 - ACM International Conference Proceeding Series
SP - 45
EP - 52
BT - Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2022
PB - Association for Computing Machinery
T2 - 11th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2022
Y2 - 1 October 2022
ER -