Security Advantage of Quantum-Based Computers

A secure approach for cloud-based quantum computing utilizes the data encryption capability of quantum mechanics.

 

Although quantum technology has advanced rapidly, the day when every household or business will have a quantum computer is still far off. The initial quantum computing will likely rely on a quantum "cloud" where consumers send their computing tasks and data to a state-of-the-art quantum computer hosted by companies like Google, IBM, or others.

 

Security Advantage of Quantum-Based Computers

But is this strategy secure? It is possible because quantum-based protocols provide unbreakable privacy. In a recent study, trapped ions were used to demonstrate a form of "blind quantum computing". Since the protocol is scalable, it can be integrated into larger quantum computing platforms.

 

Quantum computers could be revolutionary in computationally challenging areas such as drug discovery and material design. The use of a cloud-based quantum computer will raise questions in these fiercely competitive industries. According to Peter Drmota from the University of Oxford, "a company looking for a new miracle drug or a high-performance battery material wouldn't want to expose their trade secrets." However, theoretically, computations can be performed on a remote quantum computer while keeping the data and operations performed on it hidden. Drmota suggests that "a customer might feel safer using a quantum computer that performs blind quantum computation."

 

Previous research on blind quantum computation using photonic methods has been conducted by various groups. The fundamental drawback of these configurations is their probabilistic nature, requiring repeated attempts due to the success or failure of quantum entanglement operations and the selection of the desired output afterwards.

 

Joe Fitzsimons from Horizon Quantum Computing, a company producing integrated software for quantum computers, says, "Performing blind quantum computation solely with photons is challenging due to the lack of deterministic entanglement operations." Fitzsimons, not involved in this study, expects the community to anticipate a demonstration of blind quantum computation using matter-based qubits rather than photon-based qubits.

 

Drmota and his colleagues successfully demonstrated this using a basic blind quantum computation setup consisting of two trapped ions, one made of strontium and the other calcium. With extended coherence times, the calcium ion serves as a memory qubit, while the strontium ion acts as a network qubit transmitting photons to a "client". Together, the two ions form the "server" of the quantum cloud system.

 

The network qubit sends a photon to the client via an optical fiber as the first step of the team's blind computation protocol. Since the polarization of the photon is entangled with the electronic state of the network ion, the two objects are quantum entangled. The client uses this entanglement to "steer" the ion's state by measuring the state of the photon.

 

Crucially, the client secretly selects the direction of the polarization measurement while measuring the photon's polarization. Using this measurement, the client prepares the state of the network qubit. According to Dominik Leichtle from Sorbonne University, "The entire system 'collapses' to a specific state known only to the client." "The server doesn't know which state the network qubit collapsed to because it's unaware of the measurement."

 

However, the information of the network qubit can be processed by the server through a laser-based procedure intertwining the network and memory qubits. Furthermore, to better guarantee the security of the protocol, the data is encrypted using a technique known as "one-time-pad encryption". With this method, a list of random integers is generated by adding additional rotations to the instructions given by the client to the server. According to Drmota, "everything leaving the client and everything returned to the client is meaningless."

 

Additionally, the client has a tool to verify that the computation is performed correctly. According to Leichtle, such verification is crucial for trusting an untrusted or error-prone quantum computer. Previous verification techniques had been developed, but they often required a significant amount of computing power. Leichtle and his colleagues devised a more effective methodology that involves testing fake inputs and replacing real data with them.

 

The researchers implemented this protocol using a two-ion setup and demonstrated how a client can confirm the accuracy of their quantum computations.

 

The group's initial presentation revealed that a client could instruct the server to perform a simple quantum operation known as qubit rotation. When the data is analyzed and the encryptions are decrypted, the client discovered the expected fringe pattern. By adding more memory qubits, the trapped ion system can be made more powerful and capable of performing more complex computations. Connecting all these qubits will not be easy, but quantum information experts have shown that they can connect tens of trapped ions and propose systems with 1000 ions.

 

According to Drmota and Leichtle, the blind quantum computation method they developed is "scalable" as this term is defined as the client device and interface remain unchanged regardless of the server's size.

 

According to Broadbent from the University of Ottawa, "the final demonstration of blind quantum computation using trapped ions and photonic detection represents a significant milestone towards scalable and secure quantum communication." "These developments open the door to a quantum internet that guarantees privacy and verifiability as practical use approaches." Fitzsimons agrees, noting that researchers have had to overcome significant technological hurdles to connect matter qubits to a photon-based communication network. "However, more work will be needed to enable blind quantum computation on quantum processors with higher qubit counts because the current demonstration is still limited by a small number of qubits," he adds.

MMC

Post a Comment

Previous Post Next Post