Hardware Security Module for secure delegated Quantum Cloud Computing

Lead Research Organisation: University of Edinburgh
Department Name: Sch of Informatics

Abstract

The objective of this project is to develop a standalone trusted execution module that enables secure cloud quantum computing. This module will undergo validation within the project by demonstrating a full stack software-hardware integration of the world's first secure optical access to a photonic quantum computing implementation for multi-user quantum cloud applications.

Over the next three years, the consortium will conduct a (1) study, (2) development, (3) testing, (4) validation, and (5) demonstration of the HSM-QCC concept to obscure the computational task of the cloud computer. This project builds on a decade of research and development in several complementary domains, including hardware security, Quantum Cloud Computing, Photonic experiment, and software compilation.

The original theoretical idea of a trusted execution environment in the quantum setting, namely QEnclave, was proposed by the members of the consortium which demonstrated that scrambling input states by single-qubit rotations in a trusted environment is sufficient to secure any universal quantum computing. However, the implementation of this core idea requires the multidisciplinary complementary expertise of this consortium to ensure all pieces can be assembled together to demonstrate and validate the vision.

The target trusted environment will be a modified Hardware Security Module (HSM) with single-qubit quantum rotation functionalities, co-located with a scalable quantum cloud platform. A remote user, utilizing a classical cryptographic link to a quantum cloud platform,
can securely obfuscate its desired quantum computation. The scrambling of the state will be performed according to the principle of Universal Blind Quantum Computing inside the HSM.

To achieve this goal, the consortium will employ a general-purpose compiler that maps the target quantum algorithm of a user to an interactive client-server protocol and tailor it for our secure module.

Publications

10 25 50