NISQ Quantum Computing: A Security-Centric Tutorial and Survey [Feature]

被引:0
|
作者
Chen, Fan [1 ]
Jiang, Lei [1 ]
Muller, Hausi [2 ]
Richerme, Philip [3 ]
Chu, Cheng [1 ]
Fu, Zhenxiao
Yang, Min [1 ]
机构
[1] Indiana Univ, Dept Intelligent Syst Engn, Bloomington, IN 47405 USA
[2] Univ Victoria, Dept Comp Sci, Victoria, BC V8P 5C2, Canada
[3] Indiana Univ, Dept Phys, Bloomington, IN 47405 USA
关键词
Quantum computing; quantum security; NISQ;
D O I
10.1109/MCAS.2024.3349665
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Quantum computing (QC) demonstrates substantial theoretical promise in addressing classically intractable problems. Recent investments and advancements across QC system stacks, including hardware, software, and algorithms, underscore a pivotal shift from theoretical exploration to the practical realization of applications. Despite this progress, the prevailing emphasis has predominantly centered on performance enhancement, often overlooking security considerations. In response to this gap, our article presents a comprehensive tutorial and survey aimed at identifying and categorizing vulnerabilities inherent in quantum computing systems. Beginning with an overview encompassing essential principles, ecosystem components, and unique attributes in the quantum computing system stack, we also provide a summary of development resources to facilitate efficient initiation in this domain. Building on this foundational knowledge, we introduce a taxonomy of QC security organized by victim layer and security attack objectives. Utilizing this taxonomy as a guiding framework, the article delivers an extensive survey of the latest advancements in QC security, with the overarching goal of equipping the reader with a comprehensive understanding of quantum computing system principles and an informed awareness of diverse and dynamic QC security threats. The intention is to benefit both industry stakeholders and research communities, ultimately aiming to proactively identify and mitigate security concerns within QC systems, thereby establishing a robust foundation for secure quantum computing environments.
引用
收藏
页码:14 / 32
页数:19
相关论文
共 50 条
  • [41] Research directions for trust and security in human-centric computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 83 - 91
  • [42] A Comprehensive Survey on Security in Cloud Computing
    Ramachandra, Gururaj
    Iftikhar, Mohsin
    Khan, Farrukh Aslam
    14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS, 2017, 110 : 465 - 472
  • [43] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [44] A Survey on the Security of Hypervisors in Cloud Computing
    Riddle, Andrew R.
    Chung, Soon M.
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2015, : 100 - 104
  • [45] Quantum computing for data-centric engineering and science
    Herbert, Steven
    DATA-CENTRIC ENGINEERING, 2022, 3 (04):
  • [46] Vehicular Cloud Computing Security: A Survey
    Hadjer Goumidi
    Zibouda Aliouat
    Saad Harous
    Arabian Journal for Science and Engineering, 2020, 45 : 2473 - 2499
  • [47] A Survey of Security Challenges in Cloud Computing
    El Moctar, Cheikh Brahim Ould Mohamed
    Konate, Karim
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 843 - 849
  • [48] Security and Privacy in Cloud Computing: A Survey
    Shankarwar, Mahesh U.
    Pawar, Ambika V.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 1 - 11
  • [49] A Survey of Security Attacks in Information-Centric Networking
    AbdAllah, Eslam G.
    Hassanein, Hossam S.
    Zulkernine, Mohammad
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1441 - 1454
  • [50] A Survey on Information Security in Cloud Computing
    Orantes Jimenez, Sandra Dinora
    Aguirre Anaya, Eleazar
    COMPUTACION Y SISTEMAS, 2020, 24 (02): : 819 - 833