Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3559380acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

Securing Reset Operations in NISQ Quantum Computers

Published: 07 November 2022 Publication History

Abstract

A secure reset operation could be an enabling technology that allows sharing of a quantum computer among different users, or among different quantum programs of the same user. Today, the dominant method to erase the qubit state is a full system wipe, which effectively resets all the qubits at the same time. In today's superconducting qubit machines from IBM, for example, a full system wipe takes up to 1000 μs, and it fully erases all information in the system. However, with a full system wipe there is no means for only a few qubits to be cleared and assigned to a new user or program; everything has to be erased at the same time. A secure reset operation could allow resetting only a subset of qubits, and it could be built upon existing (insecure) reset operation available from superconducting qubit machines from IBM, for example. The (insecure) reset operation is available today, which can be used to reset the state of a qubit in a time on the order of 10 μs down to 1 μs. The reset operation is thus much faster than a full system wipe. However, as this work demonstrates, it is possible to leak some information across the (insecure) reset operation as it does not perfectly reset the qubit state between two users or programs who may be sequentially scheduled on the same qubit. Further, crosstalk-like effects are observed where reset behavior of one qubit can be inferred from an adjacent qubit. This work analyzes the existing (insecure) reset operation in order to understand how a secure reset operation could be built upon it. This work then describes the design, implementation, and evaluation of the proposed secure reset operation which can reset qubits without leaking information, and retains a factor of 300 speedup over a full system~wipe.

Supplementary Material

MP4 File (CCS22-fp0288.mp4)
Presentation of "Securing Reset Operations in NISQ Quantum Computers" by Allen Mi, Shuwen Deng, and Jakub Szefer

Cited By

View all
  • (2024)Leveraging Data Locality in Quantum Convolutional ClassifiersEntropy10.3390/e2606046126:6(461)Online publication date: 28-May-2024
  • (2024)Optimal Partitioning of Quantum Circuits Using Gate Cuts and Wire CutsIEEE Transactions on Quantum Engineering10.1109/TQE.2023.33471065(1-10)Online publication date: 2024
  • (2024)Extending and Defending Attacks on Reset Operations in Quantum Computers2024 International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED61283.2024.00018(73-83)Online publication date: 16-May-2024
  • Show More Cited By

Index Terms

  1. Securing Reset Operations in NISQ Quantum Computers

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
      November 2022
      3598 pages
      ISBN:9781450394505
      DOI:10.1145/3548606
      This work is licensed under a Creative Commons Attribution-ShareAlike International 4.0 License.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 November 2022

      Check for updates

      Author Tags

      1. information leakage
      2. quantum computers
      3. reset gates

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS '22
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)357
      • Downloads (Last 6 weeks)42
      Reflects downloads up to 22 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Leveraging Data Locality in Quantum Convolutional ClassifiersEntropy10.3390/e2606046126:6(461)Online publication date: 28-May-2024
      • (2024)Optimal Partitioning of Quantum Circuits Using Gate Cuts and Wire CutsIEEE Transactions on Quantum Engineering10.1109/TQE.2023.33471065(1-10)Online publication date: 2024
      • (2024)Extending and Defending Attacks on Reset Operations in Quantum Computers2024 International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED61283.2024.00018(73-83)Online publication date: 16-May-2024
      • (2024)CDQKL: Consensus-Based Distributed Quantum Kernel Learning2024 International Conference on Quantum Communications, Networking, and Computing (QCNC)10.1109/QCNC62729.2024.00015(33-40)Online publication date: 1-Jul-2024
      • (2024)Counting Bases from Number of Qubits: Inferring VRP from Quantum Circuits2024 IEEE International Conference on Quantum Computing and Engineering (QCE)10.1109/QCE60285.2024.00150(1264-1269)Online publication date: 15-Sep-2024
      • (2024)NISQ Quantum Computing: A Security-Centric Tutorial and Survey [Feature]IEEE Circuits and Systems Magazine10.1109/MCAS.2024.334966524:1(14-32)Online publication date: Sep-2025
      • (2024)A Survey of Side-Channel Attacks in Superconducting Quantum Computers2024 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)10.1109/ISVLSI61997.2024.00074(373-378)Online publication date: 1-Jul-2024
      • (2024)All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55342.2024.10545404(415-419)Online publication date: 6-May-2024
      • (2024)A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)10.1109/HOST55342.2024.10545386(55-65)Online publication date: 6-May-2024
      • (2023)SoK: A First Order Survey of Quantum Supply Dynamics and Threat LandscapesProceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy10.1145/3623652.3623664(82-90)Online publication date: 29-Oct-2023
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media