Entrapping Nature Elham Kashefi University of Edinburgh UK Networked Quantum Information Technologies Hub CNRS, Pierre and Marie Curie University Paris Centre for Quantum Computing
Profile of a Quantum Person
Profile of a Quantum Person Mathematics
Profile of a Quantum Person Track Track A B Mathematics ComputerScience
Profile of a Quantum Person Track Track A B Mathematics ComputerScience Physics
Profile of a Quantum Person Track Track A B Mathematics ComputerScience Physics Experiment
Profile of a Quantum Person Track Track A B Mathematics ComputerScience Physics Experiment Industry
Profile of a Quantum Person Track Track A B Mathematics ComputerScience Physics Experiment Industry Philosophy Engineering Chemistry
Feynman Vision - 82 Quantum Computing as the technology for simulating quantum systems
Feynman Vision - 82 Quantum Computing as the technology for simulating quantum systems Spectacular Progress from complexity theory to cryptography from simulation to sampling from tomography to implementation from foundation to interpretation
QSoft Vision of Quantum Technology Hardware Hardware Computing Device Communication Network
QSoft Vision of Quantum Technology Interface Abstraction/Modeling/Encoding Verification/Benchmarking Hardware Hardware Computing Device Communication Network
QSoft Vision of Quantum Technology Application Speed Secrecy Interface Abstraction/Modeling/Encoding Verification/Benchmarking Hardware Hardware Computing Device Communication Network
Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada 5
Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada 5
Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada Target: > 50 qubits Device 5
Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada Target: > 50 qubits Device Feature: Not Simulatable Classically 5
Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada Target: > 50 qubits Device Feature: Not Simulatable Classically Problem: Testing, Validation, BenchMarking, Certification, Verification … 5
Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada Target: > 50 qubits Device Feature: Not Simulatable Classically Problem: Testing, Validation, BenchMarking, Certification, Verification … Can we BOOTSTRAP a smaller quantum device to test a bigger one? 5
Quantum Verification E ffi cient verification methods for realistic quantum devices
Quantum Verification E ffi cient verification methods for realistic quantum devices - Correctness of the outcome - Operation monitoring - Quantum property testing
Quantum Verification E ffi cient verification methods for realistic quantum devices - Correctness of the outcome - Architectural constraints - Operation monitoring - Experimental imperfections - Quantum property testing
Quantum Verification E ffi cient verification methods for realistic quantum devices Non-universal: - Correctness of the outcome - Architectural constraints D-Wave machine - Operation monitoring - Experimental imperfections Quantum Simulator - Quantum property testing Current Q2020 architecture
Quantum Verification E ffi cient verification methods for realistic quantum devices Non-universal: - Correctness of the outcome - Architectural constraints D-Wave machine - Operation monitoring - Experimental imperfections Quantum Simulator - Quantum property testing Current Q2020 architecture Goal Criteria to test emerging quantum devices
What is Verification
What is Verification A mechanism that when witness is accepted the outcome is good
What is Verification A mechanism that when witness is accepted the outcome is good A mechanism that when witness is accepted the outcome is not bad
What is Verification A mechanism that when witness is accepted the outcome is good A mechanism that when witness is accepted the outcome is not bad A mechanism that probability of witness is accepted and the outcome is bad is bounded
What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded
What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded Verifier Prover/Device/Eve/Noise . . .
What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded Verifier Prover/Device/Eve/Noise ν . . random parameters .
What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded Verifier Prover/Device/Eve/Noise ν . . random parameters . B ( ⌫ ) density operator of classical and quantum output
What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded Verifier Prover/Device/Eve/Noise ν . . random parameters . Abort/Acc B ( ⌫ ) density operator of classical and quantum output
What is Verification verifier prover ν . . . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded
What is Verification verifier prover ν . . . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded P ν incorrect := P ⊥ ⌦ | acc ih acc |
What is Verification verifier prover ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded
What is Verification verifier prover ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏
What is the challenge verifier prover ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏
What is the challenge verifier prover B ( ⌫ ) Ω ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . A mechanism that prob of witness is acc and outcome is bad is bounded P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏
What is the challenge verifier prover ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded Ω P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏
How to deal with deviation P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏ Ω
How to deal with deviation P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏ Ω Di ff erent toolkits / Di ff erent tasks / Di ff erent witness / Di ff erent properties / Di ff erent assumptions / …..
How to deal with deviation P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏ Ω Di ff erent toolkits / Di ff erent tasks / Di ff erent witness / Di ff erent properties / Di ff erent assumptions / ….. Hypothesis Test, Certification, Self Testing, Entanglement detection, Quantum signature, Proof System, Hardware Testing, Post-hoc verification, Randomised benchmarking, Authentication, Blind Verification
Most General Deviation Ω Eve,system Quantum Hiding
Most General Deviation Ω Eve,system Quantum Hiding σ testsubspace
Most General Deviation Ω Eve,system Quantum Hiding σ testsubspace Practical Protocols with No assumptions whatsoever
Most General Deviation Ω Eve,system Quantum Hiding Classically Impossible σ testsubspace Practical Protocols with No assumptions whatsoever
Entrapping Nature Untrusted Quantum Theory Falsifiable via Trusted Quantum Measurement
Entrapping Nature Untrusted Relativistic Quantum Theory Falsifiable via Trusted Wave Packet
Global Directions on Verification
Global Directions on Verification via Hiding : Cloud-based Crypto App Distributed Network
Global Directions on Verification via Hiding : Cloud-based Crypto App Distributed Network Computation ����������� Computation ����������� Test Run ������������ �������� ������ Computation ����������� Test Run ������������ ��� Computation ����������� Computation �����������
Recommend
More recommend