3.8 Proceedings Paper

Reconstructing quantum circuits through side-channel information on cloud-based superconducting quantum computers

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/QCE53715.2022.00045

Keywords

side-channel; attack; superconducting; quantum; computation; decoherence; experiment; classification; cryptography

Funding

  1. DDAI COMET Module within the COMET -Competence Centers for Excellent Technologies Program - Austrian Federal Ministry (BMK)
  2. Austrian Research Promotion Agency (FFG)
  3. province of Styria (SFG)
  4. DDAI COMET Module within the COMET -Competence Centers for Excellent Technologies Program - Austrian Federal Ministry (BMDW)

Ask authors/readers for more resources

This study presents experimental evidence of a side-channel attack on superconducting cloud-based quantum computers, showing that information about a quantum circuit can be acquired indirectly using data before and after its execution. The findings of this study are important for further research on hardware and system stability of quantum computers as well as for understanding more nuanced systems-level attacks.
Our aim in this paper is to present experimental evidence of a side-channel attack on superconducting cloud-based quantum computers, demonstrating that a quantum circuit can be analyzed indirectly using data gathered before and after its execution on a quantum computer. We hope that this can motivate further research into hardware and system stability of quantum computers as well as into more-nuanced systems-level attacks. Although much work has been done on establishing error correcting codes to address issues of decoherence, and schemes can be utilized to leverage quantum effects for the sake of intrusion detection over quantum communication channels, there is a lack of literature in the field regarding side-channel attacks on transpiled quantum circuits, particularly those which leverage quantum effects to gather information about quantum circuits running in the cloud. We explored issues of decoherence by examining quantum circuit behavior both before and after a specified circuit was executed in order to ascertain decalibration rates and potential sources of decoherence: our data clearly shows that information on an interim circuit can be acquired in this manner. Using convenient data classification techniques and various circuit diagrams consisting of one quantum gate and several measurements, we were able to distinguish between these various circuits when executed at position n in the interim phase by training our classifier on data from probing circuits executed at queue positions n-1 and n+1. This shows that there is sufficient information residing in the data before and after a circuit is executed on a cloud-based superconducting quantum computer to allow an attacker to ascertain information about an otherwise unknown third-party circuit and shows potential to form the basis of a side-channel attack in cases where queue positions can be examined to target a third party's transpiled circuit during experimentation. This side channel attack merits further examination and extrapolation to identify more-complex circuits, and deeper statistical consideration to determine potential sources of information leakage and mitigation strategies.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available