Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy

Suresh Aakarshitha, Saki Abdullah Ash, Alam Mahababul, Onur Topaloglu Rasit, Ghosh Swaroop

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In the Noisy Intermediate-Scale Quantum (NISQ) realm, efficient quantum circuit compilation is critical to ensure successful computation. Several third-party compilers are improving the compilation times and depth/gate counts. Untrusted third parties or a particular version of a trusted compiler may allow an attacker to steal, clone, and/or reverse engineer the quantum circuit. We propose to obfuscate quantum circuits by employing dummy CNOT gates to prevent such threats. If the adversary clones the obfuscated design, he/she will get faulty results. We propose a metric-based dummy gate insertion process to ensure maximum corruption of functionality measured using Total Variation Distance (TVD) and validated using IBM's noisy simulators. Our metric guided dummy gate insertion process achieves TVD of up to 28.83%, and performs 10.14% better than the average TVD and performs within 12.45% of the best obtainable TVD for the test benchmarks. The removal of dummy gates by the designer post-compilation to restore functionality as well as other finer details have been addressed.

Original languageEnglish (US)
Title of host publicationHASP 2021 - Workshop on Hardware and Architectural Support for Security and Privacy
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450396141
DOIs
StatePublished - Oct 18 2021
EventWorkshop on Hardware and Architectural Support for Security and Privacy, HASP 2021 - Virtual, Online, United States
Duration: Oct 18 2021 → …

Publication series

NameACM International Conference Proceeding Series

Conference

ConferenceWorkshop on Hardware and Architectural Support for Security and Privacy, HASP 2021
Country/TerritoryUnited States
CityVirtual, Online
Period10/18/21 → …

All Science Journal Classification (ASJC) codes

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy'. Together they form a unique fingerprint.

Cite this