Elham Kashefi
University of Edinburgh UK Networked Quantum Information Technologies Hub CNRS, Pierre and Marie Curie University Paris Centre for Quantum Computing
Entrapping Nature Elham Kashefi University of Edinburgh UK - - PowerPoint PPT Presentation
Entrapping Nature Elham Kashefi University of Edinburgh UK Networked Quantum Information Technologies Hub CNRS, Pierre and Marie Curie University Paris Centre for Quantum Computing Profile of a Quantum Person Profile of a Quantum Person
Elham Kashefi
University of Edinburgh UK Networked Quantum Information Technologies Hub CNRS, Pierre and Marie Curie University Paris Centre for Quantum Computing
Profile of a Quantum Person
Profile of a Quantum Person
Mathematics
Profile of a Quantum Person
Mathematics ComputerScience
Track
A
Track
B
Profile of a Quantum Person
Mathematics Physics ComputerScience
Track
A
Track
B
Profile of a Quantum Person
Mathematics Physics Experiment ComputerScience
Track
A
Track
B
Profile of a Quantum Person
Mathematics Physics Experiment Industry ComputerScience
Track
A
Track
B
Profile of a Quantum Person
Mathematics Physics Experiment Industry ComputerScience
Track
A
Track
B Chemistry Engineering Philosophy
Feynman Vision - 82
Quantum Computing as the technology for simulating quantum systems
Feynman Vision - 82
Quantum Computing as the technology for simulating quantum systems from complexity theory to cryptography from simulation to sampling from tomography to implementation from foundation to interpretation
Spectacular Progress
Hardware
QSoft Vision of Quantum Technology
Hardware
Communication Network Computing Device
Hardware Interface
Verification/Benchmarking Abstraction/Modeling/Encoding
QSoft Vision of Quantum Technology
Hardware
Communication Network Computing Device
Hardware Interface
Verification/Benchmarking Abstraction/Modeling/Encoding Secrecy Speed
Application
QSoft Vision of Quantum Technology
Hardware
Communication Network Computing Device
National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada
Quantum Era
Quantum Machines
Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies
5
National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada
Quantum Era
Quantum Machines
Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies
5
National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada
Quantum Era
Quantum Machines
Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies
Target: > 50 qubits Device
5
National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada
Quantum Era
Quantum Machines
Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies
Target: > 50 qubits Device Feature: Not Simulatable Classically
5
National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada
Quantum Era
Quantum Machines
Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies
Target: > 50 qubits Device Feature: Not Simulatable Classically Problem: Testing, Validation, BenchMarking, Certification, Verification …
5
National Investments Europe 1bn€ UK 270M £ Netherlands 80M $ China Billions ! US, Singapore,Canada
Quantum Era
Quantum Machines
Private Investments Google, IBM, Intel,ATOS,Alibaba Big VC founds Startups Companies
Target: > 50 qubits Device Feature: Not Simulatable Classically Problem: Testing, Validation, BenchMarking, Certification, Verification …
5
Can we BOOTSTRAP a smaller quantum device to test a bigger one?
Efficient verification methods for realistic quantum devices
Quantum Verification
Efficient verification methods for realistic quantum devices
Quantum Verification
Efficient verification methods for realistic quantum devices
Quantum Verification
Efficient verification methods for realistic quantum devices
Quantum Verification
Non-universal: D-Wave machine Quantum Simulator Current Q2020 architecture
Efficient verification methods for realistic quantum devices
Quantum Verification
Non-universal: D-Wave machine Quantum Simulator Current Q2020 architecture
Goal Criteria to test emerging quantum devices
What is Verification
What is Verification
A mechanism that when witness is accepted the outcome is good
What is Verification
A mechanism that when witness is accepted the outcome is not bad A mechanism that when witness is accepted the outcome is good
What is Verification
A mechanism that when witness is accepted the outcome is not bad A mechanism that probability of witness is accepted and the outcome is bad is bounded A mechanism that when witness is accepted the outcome is good
What is Verification
A mechanism that prob of witness is acc and outcome is bad is bounded
What is Verification
A mechanism that prob of witness is acc and outcome is bad is bounded
. . .
Prover/Device/Eve/Noise Verifier
What is Verification
A mechanism that prob of witness is acc and outcome is bad is bounded
ν
random parameters
. . .
Prover/Device/Eve/Noise Verifier
What is Verification
A mechanism that prob of witness is acc and outcome is bad is bounded
ν
random parameters
. . .
Prover/Device/Eve/Noise Verifier
B(⌫)
density operator of classical and quantum output
What is Verification
A mechanism that prob of witness is acc and outcome is bad is bounded
ν
random parameters
. . .
Prover/Device/Eve/Noise Verifier
B(⌫)
density operator of classical and quantum output
Abort/Acc
What is Verification
prover verifier
ν
. . .
B(⌫)
A mechanism that prob of witness is acc and outcome is bad is bounded
What is Verification
prover verifier
ν
. . .
B(⌫)
P ν
incorrect := P⊥ ⌦ |accihacc|
A mechanism that prob of witness is acc and outcome is bad is bounded
What is Verification
P ν
incorrect := P⊥ ⌦ |accihacc|
prover verifier
ν
. . .
B(⌫)
A mechanism that prob of witness is acc and outcome is bad is bounded
What is Verification
P ν
incorrect := P⊥ ⌦ |accihacc|
P
ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏
prover verifier
ν
. . .
B(⌫)
A mechanism that prob of witness is acc and outcome is bad is bounded
What is the challenge
P ν
incorrect := P⊥ ⌦ |accihacc|
P
ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏
prover verifier
ν
. . .
B(⌫)
A mechanism that prob of witness is acc and outcome is bad is bounded
What is the challenge
P ν
incorrect := P⊥ ⌦ |accihacc|
P
ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏
prover verifier
ν
. . .
B(⌫) Ω
A mechanism that prob of witness is acc and outcome is bad is bounded
What is the challenge
P ν
incorrect := P⊥ ⌦ |accihacc|
P
ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏
prover verifier
ν
. . .
B(⌫)
A mechanism that prob of witness is acc and outcome is bad is bounded
How to deal with deviation
P
ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏
How to deal with deviation
P
ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏
Different toolkits / Different tasks / Different witness / Different properties / Different assumptions / …..
How to deal with deviation
P
ν p(⌫) Tr (P ν incorrect B(⌫)) ≤ ✏
Different toolkits / Different tasks / Different witness / Different properties / Different assumptions / …..
Hypothesis Test, Certification, Self Testing, Entanglement detection, Quantum signature, Proof System, Hardware Testing, Post-hoc verification, Randomised benchmarking, Authentication, Blind Verification
Most General Deviation
Quantum Hiding
Most General Deviation
Quantum Hiding
Most General Deviation
Practical Protocols with No assumptions whatsoever
Quantum Hiding
Most General Deviation
Practical Protocols with No assumptions whatsoever
Quantum Hiding
Classically Impossible
Entrapping Nature
Falsifiable via
Untrusted Quantum Theory Trusted Quantum Measurement
Entrapping Nature
Falsifiable via
Untrusted Relativistic Quantum Theory Trusted Wave Packet
Global Directions on Verification
Global Directions on Verification
via Hiding : Cloud-based Crypto App Distributed Network
Global Directions on Verification
via Hiding : Cloud-based Crypto App Distributed Network
Computation Computation Computation Computation Computation Test Run
Global Directions on Verification
via Hiding : Cloud-based Crypto App Distributed Network
Computation Computation Computation Computation Computation Test Run
Blind Quantum Computing
Global Directions on Verification
via Hiding : Cloud-based Crypto App Distributed Network
Global Directions on Verification
via Hiding : Cloud-based Crypto App Distributed Network via Proof System : Quantum Simulation
Global Directions on Verification
via Hiding : Cloud-based Crypto App Distributed Network via Proof System : Quantum Simulation via Hypothesis Testing : Bench Marking Quantum Supremacy
Global Directions on Verification
via Hiding : Cloud-based Crypto App Distributed Network via Proof System : Quantum Simulation via Hypothesis Testing : Bench Marking Quantum Supremacy
Global Directions on Verification
via Hiding : Cloud-based Crypto App Distributed Network via Proof System : Quantum Simulation via Hypothesis Testing : Bench Marking Quantum Supremacy
Verification Status
Verification Status
Trust Worthy Quantum Information TyQi17 Paris
Verification Status
Trust Worthy Quantum Information TyQi17 Paris
aaaaaaaaaa a
Measurements Entanglement Trusted Semi-trusted (i.i.d.) Untrusted
Trusted O(N) O(N4logN) O(N13log(N)) Untrusted O(N4logN) O(N4logN) O(N64)
Verification Status
Trust Worthy Quantum Information TyQi17 Paris
aaaaaaaaaa a
Measurements Entanglement Trusted Semi-trusted (i.i.d.) Untrusted
Trusted O(N) O(N4logN) O(N13log(N)) Untrusted O(N4logN) O(N4logN) O(N64)
arXiv:1709.06984 Verification of quantum computation: An overview of existing approaches Alexandru Gheorghiu, Theodoros Kapourniotis, Elham Kashefi
Verification Challenge
Verification Challenge
Standardisation ??? Given the unknown nature of the emerging devices
Verification Challenge
Standardisation ??? Given the unknown nature of the emerging devices
??? Objective improvements
Quantum Era
Target: > 50 qubits Device Feature: Noisy Qubits Problem: What are they useful for Do we need to wait till error correcting codes became feasible
Classical - Quantum Collaboration Landscape
Quantum Tech Cyber Security
Efficient Certification Enhanced-Security
Protocols for hybrid classical-quantum communication network
Quantum Cryptography
Protocols for hybrid classical-quantum communication network
Quantum Cryptography
Protocols for hybrid classical-quantum communication network
Quantum Cryptography
Quantum Crypto Status
Quantum Crypto Status
Quantum Cryptography QCrypt17 Cambridge
Quantum Crypto Status
Quantum Cryptography QCrypt17 Cambridge
Quantum Crypto Status
Quantum Cryptography QCrypt17 Cambridge
They need few qubits …. works with noisy one too
Quantum Crypto Challenge
Quantum Crypto Challenge
How to exploit them for Classical Web ?
Quantum Crypto Challenge
How to exploit them for Classical Web ?
Objective improvements
Quantum Crypto Challenge
How to exploit them for Classical Web ?
Objective improvements Performances / Cost / Added values
Practical Classical SMPC
First large-scale practical experiment with SMPC to implement a secure auction 08 Recently: Efficient (low communication) computational SMPC Computation represented by a series of additions and multiplications of elements in Fp. easy Linear Verifiable Secret Sharing
r1 x1
|0>
CLIENT SIDE SERVER
r2 x2 r3 x3 r4 x4 ixed at 0° global XOR
pi/4 pi/8
Wollaston
15m PM ibre 15m PM ibre
single photon source 1550nm
Half waveplates:
needs few qubits
The Edinburgh-Paris Team
Development Deployment Q-enhanced Cloud In the lab Certification Multi-party QC Research Verification
The Edinburgh-Paris Team
Development Deployment Q-enhanced Cloud In the lab Certification Multi-party QC Research Verification Alexandru Cojocaru Andru Gheorghiu Daniel Mills Luka Music Ulysse Chabaud Tom Douce
Interns: Ieva Cepaite Iskren Vankov Phivos Sofokleous Kelsey Horan Léo Colisson
Petros Wallden Ellen Derbyshire Brian Coyle
Other collaborators
Theory Experiment Damian Markham (LIP6) Joe Fitzsimons (SUTD) Anna Pappa (UCL) Anne Broadbent (Ottawa) Vedran Dunjko (Innsbruck) Anthony Leverrier (INREA) Animesh Datta (Warwick) Theodoros Kapourniotis (Warwick) Stefanie Barz (Vienna,Oxford) Philip Walther (Vienna) Ian Walmsley (Oxford)
Other collaborators
Theory Experiment Damian Markham (LIP6) Joe Fitzsimons (SUTD) Anna Pappa (UCL) Anne Broadbent (Ottawa) Vedran Dunjko (Innsbruck) Anthony Leverrier (INREA) Animesh Datta (Warwick) Theodoros Kapourniotis (Warwick) Stefanie Barz (Vienna,Oxford) Philip Walther (Vienna) Ian Walmsley (Oxford)
A girl simple dream
28
A girl simple dream
28
(b)Quantum Devices
A girl simple dream
28
QKD Network
(b)Quantum Devices
A girl simple dream
28
QKD Network
(b)Quantum Devices Global Verifiable Secure Quantum Web