Quantum Position Verification, Quantum Nonlocal Computation, and Surprising Connections with Holography and Classical Cryptography
University of Amsterdam
HARRY BUHRMAN
QFort Workshop
16-4-2024
QUANTINUUM
World’s Leading Quantum Computing Company
Global teams in largest �quantum markets� (USA, UK, Europe, Japan)
FULL STACK
InQuanto™ Quantum chemistry software. TKET™ open-source developer tool kit. LAMBEQ™ open-source natural language processing
Collaborations and partnership with leading commercial and academic organization
>1,500,000
Downloads of TKET™ open-source tool kit
350+
scientists and engineers
(of which > 200PhDs)
>80
Scientific publications using H-Series hardware
H-SERIES
World class QCCD, ion trap hardware with industry-leading fidelity and scalability
LARGEST�PLAYER
in integrated quantum �hardware and software
WHO WE ARE
WHAT WE OFFER
USER COMMUNITY
> 400
Global users of H-Series hardware
CUSTOMERS & PARTNERS
Premier financial institutions:
JPMC | HSBC
Top industrials: HONEYWELL | BMW | AIRBUS
US Department of Energy Labs
Cloud service partner:
MICROSOFT AZURE QUANTUM
Quantinuum at-a-glance
Introducing H2
The world’s most powerful quantum computer
Includes all-to-all connectivity, mid-circuit measurement with conditional logic, qubit reuse, arbitrary angle 2-qubit gates
Highest performing
Most Benchmarked
Enabling what no other hardware can do
H-series: the #1 QPU platform
>1,000x QV1
512
524,288
Next closest
Quantinuum Average TQ gate fidelity
99.9%
3
IonQ AverageTQ gate fidelity
99.3%
4
18 benchmarks tested
All documented on GitHub
The state of the art today
System Model H2 ion-trap based on the QCCD architecture
32 qubits transported around the ion-trap 'racetrack'
Jenni
Created�the most reliable �logical qubits on record
Performed multiple successful active syndrome extractions
Achieved 800x improvement in logical error rate over physical
Putting theory into practice:
Demonstrating the next level of reliable quantum computing
Krysta
FIRST QUANTUM APPLICATIONS
Rene Allerstorfer
Wolgang Loeffler
Kirstin Kannenwerf
Alex May
Philip Verduyn-Lunel
Florian Speelman
Based on joint work with
© 2024 Quantinuum
NASA
The Great Moon-Landing Hoax?
1969: MAN ON THE MOON
POSITION VERIFICATION
POSITION VERIFICATION�ONE-DIMENSIONAL CASE�
POSITION VERIFICATION
Prover
Verifier 0
Verifier 1
POSITION VERIFICATION: FIRST TRY
time
Verifier 0
Verifier 1
Prover
distance bounding [Brands-Chaum’93]
Verifier 0
POSITION VERIFICATION: SECOND TRY
position verification is classically impossible! even using computational assumptions
[Chandran Goyal Moriarty
Ostrovsky’09]
time
Prover
Verifier 0
Verifier 1
EQUIVALENT GAME �FOR THE ATTACK��
mx =x
EQUIVALENT ATTACKING GAME
x
y
mx
my=y
a
b
messages mx and my
independent of each other
my
copying classical information
not possible quantumly
QUANTUM PROTOCOLS���
QUANTUM ATTEMPT
time
Verifier 0
Verifier 1
Prover
send to
Verifier b
if b=1
if b=0
random qubit
Let’s study attacking game
for Alice & Bob
ATTACKING GAME
if b=1
if b=0
b
& b=1
impossible!
[Chandran et.al. 2010]
possible with entanglement
TELEPORTATION���
TELEPORTATION
quantum
measurement
outcome
two bits
c1, c2
c1, c2
EPR-pair
transform
instantaneous!!
[Bennett, Brassard, Crépeau, Jozsa, Peres, Wootters ‘93]
ENTANGLEMENT ATTACK
teleportation
c1, c2
b
protocol
teleportation
d1, d2
b,d1,d2
c1, c2
recover
26
MORE COMPLICATED SCHEMES?
NO-GO THEOREM
Surprising connections with:
EFFICIENT SINGLE-QUBIT PROTOCOL����
SINGLE-QUBIT PROTOCOL: F-ROUTING
time
Verifier 0
Verifier 1
Prover
send to
Verifier f(x,y)
if f(x,y)=1
if f(x,y)=0
efficiently computable
[Kent-Munro-Spiller
2010]
ATTACKING GAME FOR F-ROUTING
if f(x,y)=1
if f(x,y)=0
COMPUTATIONAL COMPLEXITY INTUITION FOR ATTACK
In all these settings:
ADS/CFT CORRESPONDENCE�CHALLENGES INTUITION������
32
ADS/CFT CORRESPONDANCE
ADS Bulk
CFT
boundary
correspondence
Anti-de Sitter Space
Conformal Field Theory
model of spacetime used in theories of gravity
quantum field theory invariant under conformal transformations
Correspondence Tool for
3D
2D
ADS/CFT
�
ADS Bulk
Honest QPV protocol
CFT
boundary
Attack on QPV protocol
(non-local computation)
correspondence
CLASSICAL CRYPTOGRAPHY�������
Conditional Disclosure of Secrets �(CDS)
shared random bits
Example: XOR
Conditional Disclosure of Secrets �(CDS)
shared random bits
Conditional Disclosure of Secrets �(CDQS)
Purify the protocol
Conditional Disclosure of Secrets �(CDQS)
Purify the protocol
Conditional Disclosure of Secrets �(CDQS)
Purify the protocol
A-register
B-register
More Connections
Inversion 1
Inversion 2
game
[Allerstorfer-Buhrman-May-Speelman-Verduyn Lunel’23]
upper and lower bounds in complexity theory:
good upper bounds yield strong lower bounds
Quantum Position Verification
We get one of the two:
SUMMARY