ABSTRACT
Quantum computing, with its transformative computational potential, is gaining prominence in the technological landscape. As a new and exotic technology, quantum computers involve innumerable Intellectual Property (IP) in the form of fabrication recipe, control electronics and software techniques, to name a few. Furthermore, complexity of quantum systems necessitates extensive involvement of third party tools, equipment and services which could risk the IPs and the Quality of Service and enable other attack surfaces. This paper is a first attempt to explore the quantum computing ecosystem, from the fabrication of quantum processors to the development of specialized software tools and hardware components, from a security perspective. By investigating the publicly disclosed information from industry front runners like IBM, Google, Honeywell and more, we piece together various components of quantum computing supply chain. We also uncover some potential vulnerabilities and attack models and suggest defenses. We highlight the need to scrutinize the quantum computing supply chain further through the lens of security.
- Nikita Acharya and Samah Mohamed Saeed. 2020. A lightweight approach to detect malicious/unexpected changes in the error rates of NISQ computers. In Proceedings of the 39th International Conference on Computer-Aided Design. 1–9.Google ScholarDigital Library
- Garrelt JN Alberts, M Adriaan Rol, Thorsten Last, Benno W Broer, Cornelis C Bultink, Matthijs SC Rijlaarsdam, and Amber E Van Hauwermeiren. 2021. Accelerating quantum computer developments. EPJ Quantum Technology 8, 1 (2021), 18.Google ScholarCross Ref
- AQT 2023. AQT Technology. Retrieved August 13, 2023 from https://www.aqt.eu/technology/Google Scholar
- Bleximo. 2022. Cryogenic Hardware at Bleximo: Superconducting Quantum Processor Packaging and Shielding. Retrieved August 13, 2023 from https://medium.com/bleximo/cryogenic-hardware-at-bleximo-superconducting-quantum-processor-packaging-and-shielding-d0d2b84b47d3Google Scholar
- Bleximo 2023. Powering Innovation Through Quantum Computing. Retrieved August 13, 2023 from https://bleximo.com/Google Scholar
- Andrew W Cross, Lev S Bishop, John A Smolin, and Jay M Gambetta. 2017. Open quantum assembly language. arXiv preprint arXiv:1707.03429 (2017).Google Scholar
- James A Crunkleton. 1992. Cryogenic refrigeration apparatus. Technical Report. Boreas Inc.Google Scholar
- James Dargan. 2022. 81 Quantum Computing Companies: An Ultimate 2023 List. Retrieved August 13, 2023 from https://thequantuminsider.com/2022/09/05/quantum-computing-companies-ultimate-list-for-2022/Google Scholar
- Michel H Devoret and Robert J Schoelkopf. 2013. Superconducting circuits for quantum information: an outlook. Science 339, 6124 (2013), 1169–1174.Google Scholar
- DWave 2023. How D-Wave Systems Work. Retrieved August 13, 2023 from https://www.dwavesys.com/learn/quantum-computing/Google Scholar
- Fujitsu 2023. Fujitsu Digital Annealer. Retrieved August 13, 2023 from https://www.fujitsu.com/global/services/business-services/digital-annealer/Google Scholar
- Swaroop Ghosh, Suryansh Upadhyay, and Abdullah Ash Saki. 2023. A Primer on Security of Quantum Computing. arXiv preprint arXiv:2305.02505 (2023).Google Scholar
- GoogleQuantumLab 2023. Google Quantum AI: Our Lab. Retrieved August 13, 2023 from https://quantumai.google/hardware/our-labGoogle Scholar
- Gian Giacomo Guerreschi, Justin Hogaboam, Fabio Baruffa, and Nicolas P D Sawaya. 2020. Intel Quantum Simulator: a cloud-ready high-performance simulator of quantum circuits. Quantum Science and Technology 5, 3 (may 2020), 034007. https://doi.org/10.1088/2058-9565/ab8505Google ScholarCross Ref
- Hartmut Häffner, Christian F Roos, and Rainer Blatt. 2008. Quantum computing with trapped ions. Physics reports 469, 4 (2008), 155–203.Google Scholar
- Honeywell 2023. Honeywell Quantum. Retrieved August 13, 2023 from https://www.honeywell.com/us/en/company/quantumGoogle Scholar
- IBM Quantum 2023. IBM Quantum Computing Research. Retrieved August 13, 2023 from https://research.ibm.com/quantum-computingGoogle Scholar
- Intel 2023. Intel Quantum Computing. Retrieved August 13, 2023 from https://www.intel.com/content/www/us/en/research/quantum-computing.htmlGoogle Scholar
- IonQ 2023. IonQ Technology. Retrieved August 13, 2023 from https://ionq.com/technologyGoogle Scholar
- Toshinari Itoko and Takashi Imamichi. 2020. Scheduling of operations in quantum compiler. In 2020 IEEE International Conference on Quantum Computing and Engineering (QCE). IEEE, 337–344.Google ScholarCross Ref
- Tadashi Kadowaki and Hidetoshi Nishimori. 1998. Quantum annealing in the transverse Ising model. Physical Review E 58, 5 (1998), 5355.Google ScholarCross Ref
- Morten Kjaergaard, Mollie E Schwartz, Jochen Braumüller, Philip Krantz, Joel I-J Wang, Simon Gustavsson, and William D Oliver. 2020. Superconducting qubits: Current state of play. Annual Review of Condensed Matter Physics 11 (2020), 369–395.Google ScholarCross Ref
- Mauritz Kop, Mateo Aboy, and Timo Minssen. 2022. Intellectual property in quantum computing and market power: a theoretical discussion and empirical analysis. Journal of Intellectual Property Law and Practice 17, 8 (2022), 613–628.Google ScholarCross Ref
- Sebastian Krinner, Simon Storz, Philipp Kurpiers, Paul Magnard, Johannes Heinsoo, Raphael Keller, Janis Luetolf, Christopher Eichler, and Andreas Wallraff. 2019. Engineering cryogenic setups for 100-qubit scale superconducting circuit systems. EPJ Quantum Technology 6, 1 (2019), 2.Google ScholarCross Ref
- Yao Lu, Srivatsan Chakram, Ngainam Leung, Nathan Earnest, Ravi K Naik, Ziwen Huang, Peter Groszkowski, Eliot Kapit, Jens Koch, and David I Schuster. 2017. Universal stabilization of a parametrically coupled qubit. Physical review letters 119, 15 (2017), 150502.Google Scholar
- Erik Lucero, Max Hofheinz, Markus Ansmann, Radoslaw C Bialczak, N Katz, Matthew Neeley, AD O’Connell, H Wang, AN Cleland, and John M Martinis. 2008. High-fidelity gates in a single Josephson qubit. Physical review letters 100, 24 (2008), 247001.Google Scholar
- John M Martinis, Ken B Cooper, Robert McDermott, Matthias Steffen, Markus Ansmann, KD Osborn, Katarina Cicak, Seongshik Oh, David P Pappas, Raymond W Simmonds, 2005. Decoherence in Josephson qubits from dielectric loss. Physical review letters 95, 21 (2005), 210503.Google Scholar
- Allen Mi, Shuwen Deng, and Jakub Szefer. 2022. Securing Reset Operations in NISQ Quantum Computers. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2279–2293.Google ScholarDigital Library
- Microsoft 2015. The Quantum Quest at Microsoft. Retrieved August 13, 2023 from https://www.microsoft.com/en-us/research/blog/the-quantum-quest-at-microsoft/Google Scholar
- Masoud Mohseni, Peter Read, Hartmut Neven, Sergio Boixo, Vasil Denchev, Ryan Babbush, Austin Fowler, Vadim Smelyanskiy, and John Martinis. 2017. Commercialize quantum technologies in five years. Nature 543, 7644 (2017), 171–174.Google Scholar
- Chetan Nayak, Steven H Simon, Ady Stern, Michael Freedman, and Sankar Das Sarma. 2008. Non-Abelian anyons and topological quantum computation. Reviews of Modern Physics 80, 3 (2008), 1083.Google ScholarCross Ref
- C Neill, A Megrant, R Barends, Yu Chen, B Chiaro, J Kelly, JY Mutus, PJJ O’Malley, D Sank, J Wenner, 2013. Fluctuations from edge defects in superconducting resonators. Applied Physics Letters 103, 7 (2013).Google ScholarCross Ref
- Michael A Nielsen and Isaac L Chuang. 2001. Quantum computation and quantum information. Phys. Today 54, 2 (2001), 60.Google ScholarCross Ref
- Dan O’Shea. 2021. IBM-Bluefors partnership promises really cool quantum future. Retrieved August 13, 2023 from https://www.insidequantumtechnology.com/news-archive/ibm-bluefors-partnership-promises-really-cool-quantum-future/Google Scholar
- PennyLane Website 2023. PennyLane. Retrieved August 13, 2023 from https://pennylane.ai/Google Scholar
- Pittsburg Quantum Institute 2023. Workshop on Cybersecurity of Quantum Computing. Retrieved August 13, 2023 from https://www.pqi.org/news/workshop-cybersecurity-quantum-computingGoogle Scholar
- John Preskill. 2018. Quantum computing in the NISQ era and beyond. Quantum 2 (2018), 79.Google ScholarCross Ref
- PyQuil 2023. PyQuil Documentation. Retrieved August 13, 2023 from https://pyquil-docs.rigetti.com/en/v2.7.2/Google Scholar
- Qiskit 2023. Qiskit. Retrieved August 13, 2023 from https://qiskit.org/Google Scholar
- Rigetti 2023. Rigetti: What We Build. Retrieved August 13, 2023 from https://www.rigetti.com/what-we-buildGoogle Scholar
- Michiel Adriaan Rol. 2020. Control for programmable superconducting quantum systems. (2020).Google Scholar
- Masoud Rostami, Farinaz Koushanfar, and Ramesh Karri. 2014. A primer on hardware security: Models, methods, and metrics. Proc. IEEE 102, 8 (2014), 1283–1295.Google ScholarCross Ref
- Shuntaro Takeda and Akira Furusawa. 2019. Toward large-scale fault-tolerant universal photonic quantum computing. APL Photonics 4, 6 (2019).Google Scholar
- Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, and Jakub Szefer. 2023. Hardware Architecture for a Quantum Computer Trusted Execution Environment. arXiv preprint arXiv:2308.03897 (2023).Google Scholar
- Jeff Wesler. 2018. IBM Collaborating With Top Startups to Accelerate Quantum Computing. Retrieved August 13, 2023 from https://newsroom.ibm.com/IBM-research?item=30420Google Scholar
- Kyle Wiggers. 2019. Google’s new cryogenic quantum controller uses less than 2 milliwatts. Retrieved August 13, 2023 from https://venturebeat.com/mobile/googles-new-cryogenic-quantum-controller-uses-less-than-2-milliwatts/Google Scholar
- Xanadu Website 2023. Xanadu. Retrieved August 13, 2023 from https://www.xanadu.ai/Google Scholar
- Chuanqi Xu, Ferhat Erata, and Jakub Szefer. 2023. Exploration of Quantum Computer Power Side-Channels. arXiv preprint arXiv:2304.03315 (2023).Google Scholar
Index Terms
- SoK: A First Order Survey of Quantum Supply Dynamics and Threat Landscapes
Recommendations
A threat pattern for the "cross-site scripting (XSS)" attack
PLoP '15: Proceedings of the 22nd Conference on Pattern Languages of ProgramsWe present a threat pattern that describes cross-site scripting (XSS) attacks. In this attack attackers insert scripts in web applications that will lead to misuses in a target web application. Cross-Site Scripting is listed as number three risk on the ...
Integrable quantum computation
Integrable quantum computation is defined as quantum computing via the integrable condition, in which two-qubit gates are either nontrivial unitary solutions of the Yang---Baxter equation or the Swap gate (permutation). To make the definition clear, in ...
Contextuality Supplies the Magic for Quantum Computation
ISMVL '15: Proceedings of the 2015 IEEE 45th International Symposium on Multiple-Valued LogicWe know that quantum mechanics enables the performance of computational and cryptographic tasks that are impossible (or impracticable) using only classical physics. It seems natural to examine manifestations of inherently quantum behaviour as potential ...
Comments