NISQ Quantum Computing: A Security-Centric Tutorial and Survey [Feature]

被引:0
|
作者
Chen, Fan [1 ]
Jiang, Lei [1 ]
Muller, Hausi [2 ]
Richerme, Philip [3 ]
Chu, Cheng [1 ]
Fu, Zhenxiao
Yang, Min [1 ]
机构
[1] Indiana Univ, Dept Intelligent Syst Engn, Bloomington, IN 47405 USA
[2] Univ Victoria, Dept Comp Sci, Victoria, BC V8P 5C2, Canada
[3] Indiana Univ, Dept Phys, Bloomington, IN 47405 USA
关键词
Quantum computing; quantum security; NISQ;
D O I
10.1109/MCAS.2024.3349665
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Quantum computing (QC) demonstrates substantial theoretical promise in addressing classically intractable problems. Recent investments and advancements across QC system stacks, including hardware, software, and algorithms, underscore a pivotal shift from theoretical exploration to the practical realization of applications. Despite this progress, the prevailing emphasis has predominantly centered on performance enhancement, often overlooking security considerations. In response to this gap, our article presents a comprehensive tutorial and survey aimed at identifying and categorizing vulnerabilities inherent in quantum computing systems. Beginning with an overview encompassing essential principles, ecosystem components, and unique attributes in the quantum computing system stack, we also provide a summary of development resources to facilitate efficient initiation in this domain. Building on this foundational knowledge, we introduce a taxonomy of QC security organized by victim layer and security attack objectives. Utilizing this taxonomy as a guiding framework, the article delivers an extensive survey of the latest advancements in QC security, with the overarching goal of equipping the reader with a comprehensive understanding of quantum computing system principles and an informed awareness of diverse and dynamic QC security threats. The intention is to benefit both industry stakeholders and research communities, ultimately aiming to proactively identify and mitigate security concerns within QC systems, thereby establishing a robust foundation for secure quantum computing environments.
引用
收藏
页码:14 / 32
页数:19
相关论文
共 50 条
  • [31] Survey of Ubiquitous Computing Security
    Li Y.
    Chen Y.
    Zhao J.
    Yue X.
    Zheng C.
    Wu Y.
    Wu G.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1054 - 1081
  • [32] Quantum-centric high performance computing for quantum chemistry
    Liu, Jie
    Ma, Huan
    Shang, Honghui
    Li, Zhenyu
    Yang, Jinlong
    PHYSICAL CHEMISTRY CHEMICAL PHYSICS, 2024, 26 (22) : 15831 - 15843
  • [33] Security and Quantum Computing: An Overview
    Ravi, Prasanna
    Chattopadhyay, Anupam
    Bhasin, Shivam
    2022 23RD IEEE LATIN-AMERICAN TEST SYMPOSIUM (LATS 2022), 2022,
  • [34] A Primer on Security of Quantum Computing
    Ghosh, Swaroop
    Upadhyay, Suryansh
    Saki, Abdullah Ash
    arXiv, 2023,
  • [35] Quantum Computing Through the Lens of Control: A Tutorial Introduction
    Berberich, Julian
    Fink, Daniel
    IEEE CONTROL SYSTEMS MAGAZINE, 2024, 44 (06): : 24 - 49
  • [36] Quantum PUF for Security and Trust in Quantum Computing
    Phalak, Koustubh
    Ash-Saki, Abdullah
    Alam, Mahabubul
    Topaloglu, Rasit Onur
    Ghosh, Swaroop
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 333 - 342
  • [37] The security implications of quantum cryptography and quantum computing
    Cavaliere F.
    Mattsson J.
    Smeets B.
    1600, Elsevier Ltd (2020): : 9 - 15
  • [38] A tutorial-based survey on feature selection: Recent advancements on feature selection
    Moslemi, Amir
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 126
  • [39] Generalization error bound for quantum machine learning in NISQ era-a survey
    Khanal, Bikram
    Rivas, Pablo
    Sanjel, Arun
    Sooksatra, Korn
    Quevedo, Ernesto
    Rodriguez, Alejandro
    QUANTUM MACHINE INTELLIGENCE, 2024, 6 (02)
  • [40] Towards Data-Centric Security in Ubiquitous Computing Environments
    Ransom, Stefan
    Werner, Christian
    PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 26 - 30