Abstract

Despite the current progress in quantum computing, the reliability of quantum computers is very challenging. Near-term quantum computers referred to as Noisy Intermediate-Scale Quantum (NISQ) computers are expected to operate in the presence of errors. To run a quantum circuit on a NISQ computer, the circuit should be mapped to satisfy the physical constraints of the quantum architecture. The mapping process takes into account the error rates of the quantum hardware. It selects physical qubits and their movements, which minimize the circuit error rates. The output of the quantum circuit can be obtained through several runs on NISQ computers. What's important from a security perspective is that the output of the quantum circuit is inherently dependent on the error parameters of the quantum hardware. An adversary can, therefore, leverage such dependency to alter the functional behavior of the quantum circuit. We show that malicious changes in the error rates used for mapping quantum circuits can change their output. To detect this attack on NISQ architectures, we propose inserting test points into the quantum circuits to study their error rates with respect to other qubit allocations. We utilize superposition, classical, and un-compute tests to provide side-channel information of the quantum circuit. We study the effectiveness of our approach using IBMQ 16 Melbourne quantum computer and Qiskit tools as an exemplar.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.