1 of 44

2 of 44

Quantum Position Verification, Quantum Nonlocal Computation, and Surprising Connections with Holography and Classical Cryptography

University of Amsterdam

HARRY BUHRMAN

QFort Workshop

16-4-2024

3 of 44

QUANTINUUM

World’s Leading Quantum Computing Company

4 of 44

Global teams in largest �quantum markets� (USA, UK, Europe, Japan)

FULL STACK

InQuanto™ Quantum chemistry software. TKET™ open-source developer tool kit. LAMBEQ™ open-source natural language processing

Collaborations and partnership with leading commercial and academic organization

>1,500,000

Downloads of TKET™ open-source tool kit

350+

scientists and engineers

(of which > 200PhDs)

>80

Scientific publications using H-Series hardware

H-SERIES

World class QCCD, ion trap hardware with industry-leading fidelity and scalability

LARGEST�PLAYER

in integrated quantum �hardware and software

WHO WE ARE

WHAT WE OFFER

USER COMMUNITY

> 400

Global users of H-Series hardware

CUSTOMERS & PARTNERS

Premier financial institutions:  

JPMC | HSBC

Top industrials: HONEYWELL | BMW | AIRBUS

US Department of Energy Labs

Cloud service partner:

MICROSOFT AZURE QUANTUM

Quantinuum at-a-glance

5 of 44

Introducing H2

The world’s most powerful quantum computer

  • 32 fully connected qubits
  • 99.997% single-qubit gate fidelity
  • 99.9% two-qubit gate fidelity

Includes all-to-all connectivity, mid-circuit measurement with conditional logic, qubit reuse, arbitrary angle 2-qubit gates

6 of 44

Highest performing

Most Benchmarked

Enabling what no other hardware can do

H-series: the #1 QPU platform

>1,000x QV1

512

524,288

Next closest

  • Conditional logic
  • All-to-all connectivity
  • Long coherence times
  • Qubit reuse
  • Low cross-talk mid-circuit measurement

Quantinuum Average TQ gate fidelity

99.9%

3

IonQ AverageTQ gate fidelity

99.3%

4

18 benchmarks tested

All documented on GitHub

7 of 44

The state of the art today

System Model H2 ion-trap based on the QCCD architecture

32 qubits transported around the ion-trap 'racetrack'

Jenni

8 of 44

Created�the most reliable �logical qubits on record

Performed multiple successful active syndrome extractions

Achieved 800x improvement in logical error rate over physical

Putting theory into practice:

Demonstrating the next level of reliable quantum computing

Krysta

9 of 44

10 of 44

FIRST QUANTUM APPLICATIONS

  • Factorizing numbers [Shor]
    • Breaks frequently used cryptography
  • Quantum cryptography [Bennett-Brassard-Ekert]
    • Quantum-proof cryptography
  • Efficient communication
    • Quantum internet, entanglement etc.
  • Simulation of nature
    • Chemistry, material design, new medicines..
  • Optimization problems, Machine learning
    • Applications for society & industry
  • Quantum inspired algorithms
    • Machine learning, recommendation systems, optimization …

11 of 44

Rene Allerstorfer

Wolgang Loeffler

Kirstin Kannenwerf

Alex May

Philip Verduyn-Lunel

Florian Speelman

Based on joint work with

© 2024 Quantinuum

12 of 44

NASA

The Great Moon-Landing Hoax?

  • How can you prove that you are at a specific location?

1969: MAN ON THE MOON

13 of 44

POSITION VERIFICATION

  • Prove you are at a certain position
    • launching-missile command comes from within the Pentagon
    • talking to South-Korea and not North-Korea
    • pizza delivery problem
  • building block for other cryptographic tasks
    • authentication, position-based key-exchange
    • Can only decipher message at specific location

14 of 44

POSITION VERIFICATION�ONE-DIMENSIONAL CASE�

15 of 44

POSITION VERIFICATION

  • Prover convince verifiers he is at particular position
  • assumptions:
    • communication at speed of light
    • instantaneous computation
    • verifiers can coordinate
  • no coalition of (fake) provers, not at the claimed position, can convince verifiers

Prover

Verifier 0

Verifier 1

16 of 44

POSITION VERIFICATION: FIRST TRY

time

Verifier 0

Verifier 1

Prover

distance bounding [Brands-Chaum’93]

Verifier 0

17 of 44

POSITION VERIFICATION: SECOND TRY

position verification is classically impossible! even using computational assumptions

[Chandran Goyal Moriarty

Ostrovsky’09]

time

Prover

Verifier 0

Verifier 1

18 of 44

EQUIVALENT GAME �FOR THE ATTACK��

19 of 44

mx =x

EQUIVALENT ATTACKING GAME

x

y

mx

my=y

a

b

messages mx and my

independent of each other

my

copying classical information

not possible quantumly

20 of 44

QUANTUM PROTOCOLS���

21 of 44

QUANTUM ATTEMPT

time

Verifier 0

Verifier 1

Prover

send to

Verifier b

if b=1

if b=0

random qubit

Let’s study attacking game

for Alice & Bob

22 of 44

ATTACKING GAME

if b=1

if b=0

b

& b=1

impossible!

[Chandran et.al. 2010]

possible with entanglement

23 of 44

TELEPORTATION���

24 of 44

TELEPORTATION

quantum

measurement

outcome

two bits

c1, c2

c1, c2

EPR-pair

transform

instantaneous!!

 [Bennett, Brassard, Crépeau, Jozsa, Peres, Wootters ‘93]

25 of 44

ENTANGLEMENT ATTACK

teleportation

c1, c2

b

protocol

teleportation

d1, d2

b,d1,d2

c1, c2

  • b=1 keep
  • teleport
  • b=0 recover
  • b=0 teleport back

recover

26 of 44

26

MORE COMPLICATED SCHEMES?

  • Different schemes proposed
    • Chandran, Fehr, Gelles, Goyal, Ostrovsky [2010]
    • Malaney [2010]
    • Kent, Munro, Spiller [2010]
    • Lau, Lo [2010]
  • Unfortunately they can all be broken
    • general no-go theorem [B,Chandran,Fehr,Gelles,Goyal, Ostrovsky, Schaffner 2010]
    • More efficiënt attack [Beigi-König 2011 ]
    • Proof uses teleportation & port-based teleportation
    • Exponential amount of entanglement

27 of 44

NO-GO THEOREM

  • Any position-verification protocol broken with exponential # of EPR-pairs
  • Best lower bound: linear # of EPR-pairs
  • Question 1: is there a better lower bound?
    • exist a protocol:
    • attack requires many EPR-pairs
    • honest prover & verifiers efficient
  • Question 2: Realize protocols experimentally
    • deal with imperfections and errors
    • photon loss, errors, actual speed of light etc.

Surprising connections with:

  • Computational Complexity Theory
  • Classical Cryptography
  • String Theory
  • Functional Analysis

28 of 44

EFFICIENT SINGLE-QUBIT PROTOCOL����

29 of 44

SINGLE-QUBIT PROTOCOL: F-ROUTING

time

Verifier 0

Verifier 1

Prover

send to

Verifier f(x,y)

if f(x,y)=1

if f(x,y)=0

efficiently computable

[Kent-Munro-Spiller

2010]

30 of 44

ATTACKING GAME FOR F-ROUTING

if f(x,y)=1

if f(x,y)=0

 

 

 

 

31 of 44

COMPUTATIONAL COMPLEXITY INTUITION FOR ATTACK

 

In all these settings:

  • Best upper bound exponential
  • Best lower bound linear

32 of 44

ADS/CFT CORRESPONDENCE�CHALLENGES INTUITION������

32

33 of 44

ADS/CFT CORRESPONDANCE

ADS Bulk

CFT

boundary

correspondence

Anti-de Sitter Space

Conformal Field Theory

model of spacetime used in theories of gravity

quantum field theory invariant under conformal transformations

Correspondence Tool for

  • Quantum Gravity
  • Black Hole Physics: Quantum Chromodynamics
  • Condensed Matter Physics

3D

2D

34 of 44

ADS/CFT

  • Intriguing connection with ADS/CFT [May’21, Dolev-Cree’22]

ADS Bulk

Honest QPV protocol

CFT

boundary

Attack on QPV protocol

(non-local computation)

correspondence

 

  • What about the other barriers in CS?
  • Are they connected to QPV?
  • Does ADS/CFT have baring on them?

35 of 44

CLASSICAL CRYPTOGRAPHY�������

36 of 44

Conditional Disclosure of Secrets �(CDS)

 

 

 

 

shared random bits

 

 

 

 

Example: XOR

 

 

 

 

 

 

 

 

 

 

37 of 44

Conditional Disclosure of Secrets �(CDS)

 

 

 

 

shared random bits

 

 

 

 

 

 

 

 

38 of 44

Conditional Disclosure of Secrets �(CDQS)

 

 

 

 

 

 

 

 

Purify the protocol

 

 

39 of 44

Conditional Disclosure of Secrets �(CDQS)

 

 

 

 

 

 

Purify the protocol

 

 

 

40 of 44

Conditional Disclosure of Secrets �(CDQS)

 

 

 

 

 

Purify the protocol

 

 

 

 

 

 

 

A-register

B-register

41 of 44

 

  •  

42 of 44

More Connections

Inversion 1

  • Attacks on QPV: communication game

Inversion 2

  • Efficient QCDS equivalent communication

game

[Allerstorfer-Buhrman-May-Speelman-Verduyn Lunel’23]

upper and lower bounds in complexity theory:

good upper bounds yield strong lower bounds

Quantum Position Verification

We get one of the two:

  1. Secure QPV protocol
  2. Efficient QCDS

43 of 44

SUMMARY

  • Quantum Position Verification
    • Not possible Classical,
    • Not possible Quantum, but attack seems to need exponential resources
    • Simple protocol: f-routing
    • Security for f in P tie in with unresolved complexity theoretical questions
    • Connected with classical cryptographic protocols: CDS, Secret sharing, PSM
    • CS intuition is that f-routing is secure for functions in Polynomial time.
    • ADS/CFT intuition: not secure
    • Many open problems remain!
  • Separate stream designing efficient and secure implementations

44 of 44