A Quantum Computer Trusted Execution Environment

被引:0
|
作者
Trochatos, Theodoros [1 ]
Xu, Chuanqi [1 ]
Deshpande, Sanjay [1 ]
Lu, Yao [1 ]
Ding, Yongshan [1 ]
Szefer, Jakub [1 ]
机构
[1] Yale Univ, New Haven, CT 06520 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present the first architecture for a trusted execution environment for quantum computers. In the architecture, to protect the user's circuits, they are obfuscated with decoy control pulses added during circuit transpilation by the user. The decoy pulses are removed, i.e. attenuated, by the trusted hardware inside the superconducting quantum computer's fridge before they reach the qubits. This preliminary work demonstrates that protection from possibly malicious cloud providers is feasible with minimal hardware cost.
引用
收藏
页码:613 / 613
页数:1
相关论文
共 50 条
  • [21] A solution to make trusted execution environment more trustworthy
    Kun X.
    Lei L.
    [J]. International Journal of Performability Engineering, 2018, 14 (09) : 2127 - 2136
  • [22] Privacy Computing with Right to Be Forgotten in Trusted Execution Environment
    Liu, Hui
    Luo, Hongzhi
    Li, Shaofeng
    Dong, Tian
    Chen, Guoxing
    Meng, Yan
    Zhu, Haojin
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2566 - 2571
  • [23] HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment
    Gangal, Akshay
    Ye, Mengmei
    Wei, Sheng
    [J]. PROCEEDINGS OF THE 2020 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2020,
  • [24] A novel method of APK-based automated execution and traversal with a trusted execution environment
    Chang, Rui
    Jiang, Liehui
    Yin, Qing
    Liu, Wei
    Zhang, Shengqiao
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 254 - 258
  • [25] HyperEnclave: An Open and Cross-platform Trusted Execution Environment
    Jia, Yuekai
    Liu, Shuang
    Wang, Wenhao
    Chen, Yu
    Zhai, Zhengde
    Yan, Shoumeng
    He, Zhengyu
    [J]. PROCEEDINGS OF THE 2022 USENIX ANNUAL TECHNICAL CONFERENCE, 2022, : 437 - 454
  • [26] Dynamic trustworthiness verification mechanism for trusted cloud execution environment
    Liu, Chuan-Yi
    Lin, Jie
    Tang, Bo
    [J]. Ruan Jian Xue Bao/Journal of Software, 2014, 25 (03): : 662 - 674
  • [27] DM-TEE: Trusted Execution Environment for Disaggregated Memory
    Xia, Ke
    Wei, Sheng
    [J]. PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 204 - 209
  • [28] One Secure Access Scheme based on Trusted Execution Environment
    Fan, Yongkai
    Liu, Shengle
    Tan, Gang
    Lin, Xiaodong
    Zhao, Guanqun
    Bai, Jianrong
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 16 - 21
  • [29] Index Obfuscation for Oblivious Document Retrieval in a Trusted Execution Environment
    Shao, Jinjin
    Ji, Shiyu
    Glova, Alvin Oliver
    Qiao, Yifan
    Yang, Tao
    Sherwood, Tim
    [J]. CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, : 1345 - 1354
  • [30] Trusted Execution Environment-Based Authentication Gauge (TEEBAG)
    Balisane, Ranjbar A.
    Martin, Andrew
    [J]. PROCEEDINGS OF THE 2016 NEW SECURITY PARADIGMS WORKSHOP (NSPW'16), 2016, : 61 - 67