A Survey and Tutorial on Security and Resilience of Quantum Computing

Abdullah Ash Saki, Mahabubul Alam, Koustubh Phalak, Aakarshitha Suresh, Rasit Onur Topaloglu, Swaroop Ghosh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Present-day quantum computers suffer from various noises or errors such as, gate error, relaxation, dephasing, readout error, and crosstalk. Besides, they offer a limited number of qubits with restrictive connectivity. Therefore, quantum programs running these computers face resilience issues and low output fidelities. The noise in the cloud-based access of quantum computers also introduce new modes of security and privacy issues. Furthermore, quantum computers face several threat models from insider and outsider adversaries including input tampering, program misallocation, fault injection, Reverse Engineering (RE) and Cloning. This paper provides an overview of various assets embedded in quantum computers and programs, vulnerabilities and attack models and the relation between resilience and security. We also cover countermeasures against the reliability and security issues and present future outlook for security of quantum computing.

Original languageEnglish (US)
Title of host publicationProceedings - 2021 IEEE European Test Symposium, ETS 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665418492
DOIs
StatePublished - May 24 2021
Event26th IEEE European Test Symposium, ETS 2021 - Virtual, Bruges, Belgium
Duration: May 24 2021May 28 2021

Publication series

NameProceedings of the European Test Workshop
Volume2021-May
ISSN (Print)1530-1877
ISSN (Electronic)1558-1780

Conference

Conference26th IEEE European Test Symposium, ETS 2021
Country/TerritoryBelgium
CityVirtual, Bruges
Period5/24/215/28/21

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Industrial and Manufacturing Engineering
  • Software

Fingerprint

Dive into the research topics of 'A Survey and Tutorial on Security and Resilience of Quantum Computing'. Together they form a unique fingerprint.

Cite this