Entrapping Nature Elham Kashefi University of Edinburgh UK - - PowerPoint PPT Presentation

entrapping nature
SMART_READER_LITE
LIVE PREVIEW

Entrapping Nature Elham Kashefi University of Edinburgh UK - - PowerPoint PPT Presentation

Entrapping Nature Elham Kashefi University of Edinburgh UK Networked Quantum Information Technologies Hub CNRS, Pierre and Marie Curie University Paris Centre for Quantum Computing Profile of a Quantum Person Profile of a Quantum Person


slide-1
SLIDE 1

Elham Kashefi

University of Edinburgh UK Networked Quantum Information Technologies Hub CNRS, Pierre and Marie Curie University Paris Centre for Quantum Computing

Entrapping Nature

slide-2
SLIDE 2

Profile of a Quantum Person

slide-3
SLIDE 3

Profile of a Quantum Person

Mathematics

slide-4
SLIDE 4

Profile of a Quantum Person

Mathematics ComputerScience

Track

A

Track

B

slide-5
SLIDE 5

Profile of a Quantum Person

Mathematics Physics ComputerScience

Track

A

Track

B

slide-6
SLIDE 6

Profile of a Quantum Person

Mathematics Physics Experiment ComputerScience

Track

A

Track

B

slide-7
SLIDE 7

Profile of a Quantum Person

Mathematics Physics Experiment Industry ComputerScience

Track

A

Track

B

slide-8
SLIDE 8

Profile of a Quantum Person

Mathematics Physics Experiment Industry ComputerScience

Track

A

Track

B Chemistry Engineering Philosophy

slide-9
SLIDE 9

Feynman Vision - 82

Quantum Computing as the technology for simulating quantum systems

slide-10
SLIDE 10

Feynman Vision - 82

Quantum Computing as the technology for simulating quantum systems from complexity theory to cryptography from simulation to sampling from tomography to implementation from foundation to interpretation

Spectacular Progress

slide-11
SLIDE 11

Hardware

QSoft Vision of Quantum Technology

Hardware

Communication Network Computing Device

slide-12
SLIDE 12

Hardware Interface

Verification/Benchmarking Abstraction/Modeling/Encoding

QSoft Vision of Quantum Technology

Hardware

Communication Network Computing Device

slide-13
SLIDE 13

Hardware Interface

Verification/Benchmarking Abstraction/Modeling/Encoding Secrecy Speed

Application

QSoft Vision of Quantum Technology

Hardware

Communication Network Computing Device

slide-14
SLIDE 14

National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada

Quantum Era

Quantum Machines

Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies

5

slide-15
SLIDE 15

National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada

Quantum Era

Quantum Machines

Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies

5

slide-16
SLIDE 16

National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada

Quantum Era

Quantum Machines

Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies

Target: > 50 qubits Device

5

slide-17
SLIDE 17

National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada

Quantum Era

Quantum Machines

Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies

Target: > 50 qubits Device Feature: Not Simulatable Classically

5

slide-18
SLIDE 18

National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada

Quantum Era

Quantum Machines

Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies

Target: > 50 qubits Device Feature: Not Simulatable Classically Problem: Testing, Validation, BenchMarking, Certification, Verification …

5

slide-19
SLIDE 19

National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada

Quantum Era

Quantum Machines

Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies

Target: > 50 qubits Device Feature: Not Simulatable Classically Problem: Testing, Validation, BenchMarking, Certification, Verification …

5

Can we BOOTSTRAP a smaller quantum device to test a bigger one?

slide-20
SLIDE 20

Efficient verification methods for realistic quantum devices

Quantum Verification

slide-21
SLIDE 21

Efficient verification methods for realistic quantum devices

Quantum Verification

  • Correctness of the outcome
  • Operation monitoring
  • Quantum property testing
slide-22
SLIDE 22

Efficient verification methods for realistic quantum devices

Quantum Verification

  • Correctness of the outcome
  • Operation monitoring
  • Quantum property testing
  • Architectural constraints
  • Experimental imperfections
slide-23
SLIDE 23

Efficient verification methods for realistic quantum devices

Quantum Verification

  • Correctness of the outcome
  • Operation monitoring
  • Quantum property testing
  • Architectural constraints
  • Experimental imperfections

Non-universal: D-Wave machine Quantum Simulator Current Q2020 architecture

slide-24
SLIDE 24

Efficient verification methods for realistic quantum devices

Quantum Verification

  • Correctness of the outcome
  • Operation monitoring
  • Quantum property testing
  • Architectural constraints
  • Experimental imperfections

Non-universal: D-Wave machine Quantum Simulator Current Q2020 architecture

Goal Criteria to test emerging quantum devices

slide-25
SLIDE 25

What is Verification

slide-26
SLIDE 26

What is Verification

A mechanism that when witness is accepted the outcome is good

slide-27
SLIDE 27

What is Verification

A mechanism that when witness is accepted the outcome is not bad A mechanism that when witness is accepted the outcome is good

slide-28
SLIDE 28

What is Verification

A mechanism that when witness is accepted the outcome is not bad A mechanism that probability of witness is accepted and the outcome is bad is bounded A mechanism that when witness is accepted the outcome is good

slide-29
SLIDE 29

What is Verification

A mechanism that prob of witness is acc and outcome is bad is bounded

slide-30
SLIDE 30

What is Verification

A mechanism that prob of witness is acc and outcome is bad is bounded

. . .

Prover/Device/Eve/Noise Verifier

slide-31
SLIDE 31

What is Verification

A mechanism that prob of witness is acc and outcome is bad is bounded

ν

random parameters

. . .

Prover/Device/Eve/Noise Verifier

slide-32
SLIDE 32

What is Verification

A mechanism that prob of witness is acc and outcome is bad is bounded

ν

random parameters

. . .

Prover/Device/Eve/Noise Verifier

B(⌫)

density operator of classical and quantum output

slide-33
SLIDE 33

What is Verification

A mechanism that prob of witness is acc and outcome is bad is bounded

ν

random parameters

. . .

Prover/Device/Eve/Noise Verifier

B(⌫)

density operator of classical and quantum output

Abort/Acc

slide-34
SLIDE 34

What is Verification

prover verifier

ν

. . .

B(⌫)

A mechanism that prob of witness is acc and outcome is bad is bounded

slide-35
SLIDE 35

What is Verification

prover verifier

ν

. . .

B(⌫)

P ν

incorrect := P⊥ ⌦ |accihacc|

A mechanism that prob of witness is acc and outcome is bad is bounded

slide-36
SLIDE 36

What is Verification

P ν

incorrect := P⊥ ⌦ |accihacc|

prover verifier

ν

. . .

B(⌫)

A mechanism that prob of witness is acc and outcome is bad is bounded

slide-37
SLIDE 37

What is Verification

P ν

incorrect := P⊥ ⌦ |accihacc|

P

ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏

prover verifier

ν

. . .

B(⌫)

A mechanism that prob of witness is acc and outcome is bad is bounded

slide-38
SLIDE 38

What is the challenge

P ν

incorrect := P⊥ ⌦ |accihacc|

P

ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏

prover verifier

ν

. . .

B(⌫)

A mechanism that prob of witness is acc and outcome is bad is bounded

slide-39
SLIDE 39

What is the challenge

P ν

incorrect := P⊥ ⌦ |accihacc|

P

ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏

prover verifier

ν

. . .

B(⌫) Ω

A mechanism that prob of witness is acc and outcome is bad is bounded

slide-40
SLIDE 40

What is the challenge

P ν

incorrect := P⊥ ⌦ |accihacc|

P

ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏

prover verifier

ν

. . .

B(⌫)

A mechanism that prob of witness is acc and outcome is bad is bounded

slide-41
SLIDE 41

How to deal with deviation

P

ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏

slide-42
SLIDE 42

How to deal with deviation

P

ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏

Different toolkits / Different tasks / Different witness / Different properties / Different assumptions / …..

slide-43
SLIDE 43

How to deal with deviation

P

ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏

Different toolkits / Different tasks / Different witness / Different properties / Different assumptions / …..

Hypothesis Test, Certification, Self Testing, Entanglement detection, Quantum signature, Proof System, Hardware Testing, Post-hoc verification, Randomised benchmarking, Authentication, Blind Verification

slide-44
SLIDE 44

Most General Deviation

Quantum Hiding

ΩEve,system

slide-45
SLIDE 45

Most General Deviation

Quantum Hiding

ΩEve,system σtestsubspace

slide-46
SLIDE 46

Most General Deviation

Practical Protocols with No assumptions whatsoever

Quantum Hiding

ΩEve,system σtestsubspace

slide-47
SLIDE 47

Most General Deviation

Practical Protocols with No assumptions whatsoever

Quantum Hiding

ΩEve,system σtestsubspace

Classically Impossible

slide-48
SLIDE 48

Entrapping Nature

Falsifiable via

Untrusted Quantum Theory Trusted Quantum Measurement

slide-49
SLIDE 49

Entrapping Nature

Falsifiable via

Untrusted Relativistic Quantum Theory Trusted Wave Packet

slide-50
SLIDE 50

Global Directions on Verification

slide-51
SLIDE 51

Global Directions on Verification

via Hiding : Cloud-based Crypto App Distributed Network

slide-52
SLIDE 52

Global Directions on Verification

via Hiding : Cloud-based Crypto App Distributed Network

  • Test Run

Computation Computation Computation Computation Computation Test Run

slide-53
SLIDE 53

Global Directions on Verification

via Hiding : Cloud-based Crypto App Distributed Network

  • Test Run

Computation Computation Computation Computation Computation Test Run

Blind Quantum Computing

slide-54
SLIDE 54

Global Directions on Verification

via Hiding : Cloud-based Crypto App Distributed Network

slide-55
SLIDE 55

Global Directions on Verification

via Hiding : Cloud-based Crypto App Distributed Network via Proof System : Quantum Simulation

slide-56
SLIDE 56

Global Directions on Verification

via Hiding : Cloud-based Crypto App Distributed Network via Proof System : Quantum Simulation via Hypothesis Testing : Bench Marking Quantum Supremacy

slide-57
SLIDE 57

Global Directions on Verification

via Hiding : Cloud-based Crypto App Distributed Network via Proof System : Quantum Simulation via Hypothesis Testing : Bench Marking Quantum Supremacy

  • EPSRC UK
  • NRF Singapore
  • USAirforce
  • EU QFlagship
slide-58
SLIDE 58

Global Directions on Verification

via Hiding : Cloud-based Crypto App Distributed Network via Proof System : Quantum Simulation via Hypothesis Testing : Bench Marking Quantum Supremacy

  • EPSRC UK
  • NRF Singapore
  • USAirforce
  • EU QFlagship
  • Number Crunching
  • Noise Handling
  • Architecture Adaptation
  • New Methods Development
slide-59
SLIDE 59

Verification Status

slide-60
SLIDE 60

Verification Status

Trust Worthy Quantum Information TyQi17 Paris

  • It exists
  • It is expanding
slide-61
SLIDE 61

Verification Status

Trust Worthy Quantum Information TyQi17 Paris

  • It exists
  • It is expanding
  • The overhead depends on the level of trust

aaaaaaaaaa a

Measurements Entanglement Trusted Semi-trusted (i.i.d.) Untrusted

Trusted O(N) O(N4logN) O(N13log(N)) Untrusted O(N4logN) O(N4logN) O(N64)

slide-62
SLIDE 62

Verification Status

Trust Worthy Quantum Information TyQi17 Paris

  • It exists
  • It is expanding
  • The overhead depends on the level of trust

aaaaaaaaaa a

Measurements Entanglement Trusted Semi-trusted (i.i.d.) Untrusted

Trusted O(N) O(N4logN) O(N13log(N)) Untrusted O(N4logN) O(N4logN) O(N64)

arXiv:1709.06984 Verification of quantum computation: An overview of existing approaches Alexandru Gheorghiu, Theodoros Kapourniotis, Elham Kashefi

slide-63
SLIDE 63

Verification Challenge

slide-64
SLIDE 64

Verification Challenge

Standardisation ??? Given the unknown nature of the emerging devices

  • uniform platform versus tailored made
slide-65
SLIDE 65

Verification Challenge

Standardisation ??? Given the unknown nature of the emerging devices

  • uniform platform versus tailored made
  • Academic versus Industry’s need

??? Objective improvements

slide-66
SLIDE 66

Quantum Era

Target: > 50 qubits Device Feature: Noisy Qubits Problem: What are they useful for Do we need to wait till error correcting codes became feasible

slide-67
SLIDE 67

Classical - Quantum Collaboration Landscape

Quantum Tech Cyber Security

Efficient Certification Enhanced-Security

slide-68
SLIDE 68

Protocols for hybrid classical-quantum communication network

Quantum Cryptography

  • Electronic voting
  • Fingerprinting
  • Digital currency
  • Secure cloud
  • Blockchain
  • Secure multi-party computing
slide-69
SLIDE 69

Protocols for hybrid classical-quantum communication network

Quantum Cryptography

  • Practical Security Analysis
  • Electronic voting
  • Fingerprinting
  • Digital currency
  • Secure cloud
  • Blockchain
  • Secure multi-party computing
slide-70
SLIDE 70

Protocols for hybrid classical-quantum communication network

Quantum Cryptography

  • Practical Security Analysis
  • Standard telecom technology
  • Long distance
  • Long term stability
  • Silicon-integrated
  • Small scale devices
  • Electronic voting
  • Fingerprinting
  • Digital currency
  • Secure cloud
  • Blockchain
  • Secure multi-party computing
slide-71
SLIDE 71

Quantum Crypto Status

slide-72
SLIDE 72

Quantum Crypto Status

Quantum Cryptography QCrypt17 Cambridge

  • It exists
  • It is expanding
slide-73
SLIDE 73

Quantum Crypto Status

Quantum Cryptography QCrypt17 Cambridge

  • It exists
  • It is expanding
  • Quantum Protocols for Quantum Webs
  • Q Fingerprinting
  • Q Money
  • Q Secure cloud
  • Q Byzantine Agreement
  • Q Secure multi-party computing
slide-74
SLIDE 74

Quantum Crypto Status

Quantum Cryptography QCrypt17 Cambridge

  • It exists
  • It is expanding
  • Quantum Protocols for Quantum Webs
  • Q Fingerprinting
  • Q Money
  • Q Secure cloud
  • Q Byzantine Agreement
  • Q Secure multi-party computing

They need few qubits …. works with noisy one too

slide-75
SLIDE 75

Quantum Crypto Challenge

slide-76
SLIDE 76

Quantum Crypto Challenge

How to exploit them for Classical Web ?

slide-77
SLIDE 77

Quantum Crypto Challenge

How to exploit them for Classical Web ?

  • Academic versus Industry’s need

Objective improvements

slide-78
SLIDE 78

Quantum Crypto Challenge

How to exploit them for Classical Web ?

  • Academic versus Industry’s need

Objective improvements Performances / Cost / Added values

slide-79
SLIDE 79

Practical Classical SMPC

First large-scale practical experiment with SMPC to implement a secure auction 08 Recently: Efficient (low communication) computational SMPC Computation represented by a series of additions and multiplications of elements in Fp.
 easy Linear Verifiable Secret Sharing

r1 x1

|0>

CLIENT SIDE SERVER

r2 x2 r3 x3 r4 x4 ixed at 0° global XOR

  • pi/8

pi/4 pi/8

Wollaston

15m PM ibre 15m PM ibre

single photon source 1550nm

Half waveplates:

needs few qubits

slide-80
SLIDE 80

The Edinburgh-Paris Team

Development Deployment Q-enhanced Cloud In the lab Certification Multi-party QC Research Verification

slide-81
SLIDE 81

The Edinburgh-Paris Team

Development Deployment Q-enhanced Cloud In the lab Certification Multi-party QC Research Verification Alexandru Cojocaru Andru Gheorghiu Daniel Mills Luka Music Ulysse Chabaud Tom Douce

Interns: Ieva Cepaite Iskren Vankov Phivos Sofokleous Kelsey Horan Léo Colisson

Petros Wallden Ellen Derbyshire Brian Coyle

slide-82
SLIDE 82

Other collaborators

Theory Experiment Damian Markham (LIP6) Joe Fitzsimons (SUTD) Anna Pappa (UCL) Anne Broadbent (Ottawa) Vedran Dunjko (Innsbruck) Anthony Leverrier (INREA) Animesh Datta (Warwick) Theodoros Kapourniotis (Warwick) Stefanie Barz (Vienna,Oxford) Philip Walther (Vienna) Ian Walmsley (Oxford)

slide-83
SLIDE 83

Other collaborators

Theory Experiment Damian Markham (LIP6) Joe Fitzsimons (SUTD) Anna Pappa (UCL) Anne Broadbent (Ottawa) Vedran Dunjko (Innsbruck) Anthony Leverrier (INREA) Animesh Datta (Warwick) Theodoros Kapourniotis (Warwick) Stefanie Barz (Vienna,Oxford) Philip Walther (Vienna) Ian Walmsley (Oxford)

slide-84
SLIDE 84

A girl simple dream

28

slide-85
SLIDE 85

A girl simple dream

28

(b)

Quantum Devices

slide-86
SLIDE 86

A girl simple dream

28

QKD Network

(b)

Quantum Devices

slide-87
SLIDE 87

A girl simple dream

28

QKD Network

(b)

Quantum Devices Global Verifiable Secure Quantum Web