Secure Quantum Circuit Compilation Methodology for Untrusted Compilers

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The success of quantum circuits in providing reliable outcomes for a given problem depends on the gate count and depth in near-term noisy quantum computers. A circuit (that implements a given function) with a low gate count and short depth is more likely to give a correct solution than the circuit variant with a higher gate count and depth. As such, quantum circuit compilers that decompose high-level gates to native gates of the hardware and optimize the circuit play a key role in quantum computing. However, the quality and time complexity of the optimization process can vary significantly especially for practically relevant large-scale quantum circuits. As a result, third-party (often less-trusted/untrusted/unreliable) compilers have emerged, claiming to provide better and faster optimization of complex quantum circuits than so-called trusted compilers. However, untrusted compilers, with their varying adversarial motives ranging from semi-honest to malicious can pose severe security risks such as counterfeiting the sensitive intellectual property (IP) embedded within the quantum circuit. We propose an obfuscation technique for quantum circuits using randomized reversible gates to protect them from such attacks during compilation. The idea is to insert a small random circuit into the original circuit and send it to the untrusted compiler. Since the circuit function is corrupted, the adversary (i.e., an untrusted compiler) may get incorrect IP. However, the user may also get incorrect output post-compilation (even though highly optimized). To circumvent this issue, we concatenate the inverse of the random circuit in the compiled circuit to recover the original functionality. We demonstrate the practicality of our method by conducting exhaustive experiments on a set of benchmark circuits and measuring the quality of obfuscation by calculating the Total Variation Distance (TVD) and Degree of Functional Corruption (DFC) metrics. Our method achieves TVD of up to 1.92, indicating substantial functional corruption, and performs at least 2 x better than a previously reported obfuscation method. We also attained a DFC as low as -0.75, approaching the -1 score that represents maximal functional corruption, further ensuring the robustness of our proposed method against counterfeiting. We also propose a novel adversarial reverse engineering (RE) approach and show that the proposed obfuscation is resilient against RE attacks. The proposed technique introduces minimal degradation in fidelity (∼ 1% to ∼ 3% on average).

Original languageEnglish (US)
Title of host publicationTechnical Papers Program
EditorsCandace Culhane, Greg Byrd, Hausi Muller, Andrea Delgado, Stephan Eidenbenz
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2191-2201
Number of pages11
ISBN (Electronic)9798331557362
DOIs
StatePublished - 2025
Event6th IEEE International Conference on Quantum Computing and Engineering, QCE 2025 - Albuquerque, United States
Duration: Aug 31 2025Sep 5 2025

Publication series

NameProceedings - IEEE Quantum Week 2025, QCE 2025
Volume1

Conference

Conference6th IEEE International Conference on Quantum Computing and Engineering, QCE 2025
Country/TerritoryUnited States
CityAlbuquerque
Period8/31/259/5/25

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • Computational Theory and Mathematics
  • Hardware and Architecture
  • Signal Processing
  • Electrical and Electronic Engineering
  • Computational Mathematics

Fingerprint

Dive into the research topics of 'Secure Quantum Circuit Compilation Methodology for Untrusted Compilers'. Together they form a unique fingerprint.

Cite this