Hardware Architecture for a Quantum Computer Trusted Execution Environment

Theodoros Trochatos,Chuanqi Xu,Sanjay Deshpande,Yao Lu,Yongshan Ding,Jakub Szefer
2023-08-08
Abstract:The cloud-based environments in which today's and future quantum computers will operate, raise concerns about the security and privacy of user's intellectual property. Quantum circuits submitted to cloud-based quantum computer providers represent sensitive or proprietary algorithms developed by users that need protection. Further, input data is hard-coded into the circuits, and leakage of the circuits can expose users' data. To help protect users' circuits and data from possibly malicious quantum computer cloud providers, this work presented the first hardware architecture for a trusted execution environment for quantum computers. To protect the user's circuits and data, the quantum computer control pulses are obfuscated with decoy control pulses. While digital data can be encrypted, analog control pulses cannot and this paper proposed the novel decoy pulse approach to obfuscate the analog control pulses. The proposed decoy pulses can easily be added to the software by users. Meanwhile, the hardware components of the architecture proposed in this paper take care of eliminating, i.e. attenuating, the decoy pulses inside the superconducting quantum computer's dilution refrigerator before they reach the qubits. The hardware architecture also contains tamper-resistant features to protect the trusted hardware and users' information. The work leverages a new metric of variational distance to analyze the impact and scalability of hardware protection. The variational distance of the circuits protected with our scheme, compared to unprotected circuits, is in the range of only $0.16$ to $0.26$. This work demonstrates that protection from possibly malicious cloud providers is feasible and all the hardware components needed for the proposed architecture are available today.
Emerging Technologies,Quantum Physics
What problem does this paper attempt to address?
The paper aims to address the security and privacy issues of user circuits and data when current quantum computers operate in a cloud environment. Specifically, the paper proposes a new hardware architecture—Quantum Computer Trusted Execution Environment (QC-TEE)—to protect users' quantum circuits and embedded data from being reverse-engineered by cloud service providers. ### Main Contributions Include: 1. **Introduction of Fake Control Pulses**: By adding fake control pulses on the user side to hide the actual quantum gates being executed, making it difficult for cloud service providers to easily identify which pulses are real and which are fake. 2. **Utilization of Simple RF Switches**: Using simple RF switches within the dilution refrigerator of the quantum computer to attenuate the fake control pulses, ensuring these pulses do not affect the actual qubit operations. 3. **Design of a Hardware Security Manager**: Developing a hardware security manager to control the RF switches and support different levels of obfuscation and random output protection. 4. **Tamper-Resistance Features**: Proposing tamper-resistance features to detect any tampering with the trusted boundary formed by the dilution refrigerator. ### Problems Addressed: 1. **Protection Against Passive Attacks**: The paper primarily defends against "honest but curious" cloud service providers, preventing them from obtaining the content of user quantum circuits by observing transmitted digital or analog information. 2. **Security During Transmission**: Since user circuits are only unobfuscated on the user side and within the dilution refrigerator, this scheme also implicitly protects the security of user circuits during network transmission. In summary, this research proposes a feasible method to protect users from potentially malicious cloud service providers, and all required hardware components are currently achievable.