entrapping nature
play

Entrapping Nature Elham Kashefi University of Edinburgh UK - PowerPoint PPT Presentation

Entrapping Nature Elham Kashefi University of Edinburgh UK Networked Quantum Information Technologies Hub CNRS, Pierre and Marie Curie University Paris Centre for Quantum Computing Profile of a Quantum Person Profile of a Quantum Person


  1. Entrapping Nature Elham Kashefi University of Edinburgh UK Networked Quantum Information Technologies Hub CNRS, Pierre and Marie Curie University Paris Centre for Quantum Computing

  2. Profile of a Quantum Person

  3. Profile of a Quantum Person Mathematics

  4. Profile of a Quantum Person Track Track A B Mathematics ComputerScience

  5. Profile of a Quantum Person Track Track A B Mathematics ComputerScience Physics

  6. Profile of a Quantum Person Track Track A B Mathematics ComputerScience Physics Experiment

  7. Profile of a Quantum Person Track Track A B Mathematics ComputerScience Physics Experiment Industry

  8. Profile of a Quantum Person Track Track A B Mathematics ComputerScience Physics Experiment Industry Philosophy Engineering Chemistry

  9. Feynman Vision - 82 Quantum Computing as the technology for simulating quantum systems

  10. Feynman Vision - 82 Quantum Computing as the technology for simulating quantum systems Spectacular Progress from complexity theory to cryptography from simulation to sampling from tomography to implementation from foundation to interpretation

  11. QSoft Vision of Quantum Technology Hardware Hardware Computing Device Communication Network

  12. QSoft Vision of Quantum Technology Interface Abstraction/Modeling/Encoding Verification/Benchmarking Hardware Hardware Computing Device Communication Network

  13. QSoft Vision of Quantum Technology Application Speed Secrecy Interface Abstraction/Modeling/Encoding Verification/Benchmarking Hardware Hardware Computing Device Communication Network

  14. Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada 5

  15. Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada 5

  16. Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada Target: > 50 qubits Device 5

  17. Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada Target: > 50 qubits Device Feature: Not Simulatable Classically 5

  18. Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada Target: > 50 qubits Device Feature: Not Simulatable Classically Problem: Testing, Validation, BenchMarking, Certification, Verification … 5

  19. Quantum Era National Investments Private Investments Europe 1bn € Quantum Machines Google, IBM, Intel,ATOS,Alibaba UK 270M £ Big VC founds Netherlands 80M $ Startups Companies China Billions ! US, Singapore,Canada Target: > 50 qubits Device Feature: Not Simulatable Classically Problem: Testing, Validation, BenchMarking, Certification, Verification … Can we BOOTSTRAP a smaller quantum device to test a bigger one? 5

  20. Quantum Verification E ffi cient verification methods for realistic quantum devices

  21. Quantum Verification E ffi cient verification methods for realistic quantum devices - Correctness of the outcome - Operation monitoring - Quantum property testing

  22. Quantum Verification E ffi cient verification methods for realistic quantum devices - Correctness of the outcome - Architectural constraints - Operation monitoring - Experimental imperfections - Quantum property testing

  23. Quantum Verification E ffi cient verification methods for realistic quantum devices Non-universal: - Correctness of the outcome - Architectural constraints D-Wave machine - Operation monitoring - Experimental imperfections Quantum Simulator - Quantum property testing Current Q2020 architecture

  24. Quantum Verification E ffi cient verification methods for realistic quantum devices Non-universal: - Correctness of the outcome - Architectural constraints D-Wave machine - Operation monitoring - Experimental imperfections Quantum Simulator - Quantum property testing Current Q2020 architecture Goal Criteria to test emerging quantum devices

  25. What is Verification

  26. What is Verification A mechanism that when witness is accepted the outcome is good

  27. What is Verification A mechanism that when witness is accepted the outcome is good A mechanism that when witness is accepted the outcome is not bad

  28. What is Verification A mechanism that when witness is accepted the outcome is good A mechanism that when witness is accepted the outcome is not bad A mechanism that probability of witness is accepted and the outcome is bad is bounded

  29. What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded

  30. What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded Verifier Prover/Device/Eve/Noise . . .

  31. What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded Verifier Prover/Device/Eve/Noise ν . . random parameters .

  32. What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded Verifier Prover/Device/Eve/Noise ν . . random parameters . B ( ⌫ ) density operator of classical and quantum output

  33. What is Verification A mechanism that prob of witness is acc and outcome is bad is bounded Verifier Prover/Device/Eve/Noise ν . . random parameters . Abort/Acc B ( ⌫ ) density operator of classical and quantum output

  34. What is Verification verifier prover ν . . . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded

  35. What is Verification verifier prover ν . . . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded P ν incorrect := P ⊥ ⌦ | acc ih acc |

  36. What is Verification verifier prover ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded

  37. What is Verification verifier prover ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏

  38. What is the challenge verifier prover ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏

  39. What is the challenge verifier prover B ( ⌫ ) Ω ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . A mechanism that prob of witness is acc and outcome is bad is bounded P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏

  40. What is the challenge verifier prover ν . . P ν incorrect := P ⊥ ⌦ | acc ih acc | . B ( ⌫ ) A mechanism that prob of witness is acc and outcome is bad is bounded Ω P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏

  41. How to deal with deviation P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏ Ω

  42. How to deal with deviation P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏ Ω Di ff erent toolkits / Di ff erent tasks / Di ff erent witness / Di ff erent properties / Di ff erent assumptions / …..

  43. How to deal with deviation P ν p ( ⌫ ) Tr ( P ν incorrect B ( ⌫ )) ≤ ✏ Ω Di ff erent toolkits / Di ff erent tasks / Di ff erent witness / Di ff erent properties / Di ff erent assumptions / ….. Hypothesis Test, Certification, Self Testing, Entanglement detection, Quantum signature, Proof System, Hardware Testing, Post-hoc verification, Randomised benchmarking, Authentication, Blind Verification

  44. Most General Deviation Ω Eve,system Quantum Hiding

  45. Most General Deviation Ω Eve,system Quantum Hiding σ testsubspace

  46. Most General Deviation Ω Eve,system Quantum Hiding σ testsubspace Practical Protocols with No assumptions whatsoever

  47. Most General Deviation Ω Eve,system Quantum Hiding Classically Impossible σ testsubspace Practical Protocols with No assumptions whatsoever

  48. Entrapping Nature Untrusted Quantum Theory Falsifiable via Trusted Quantum Measurement

  49. Entrapping Nature Untrusted Relativistic Quantum Theory Falsifiable via Trusted Wave Packet

  50. Global Directions on Verification

  51. Global Directions on Verification via Hiding : Cloud-based Crypto App Distributed Network

  52. Global Directions on Verification via Hiding : Cloud-based Crypto App Distributed Network Computation ����������� Computation ����������� Test Run ������������ �������� ������ Computation ����������� Test Run ������������ ��� Computation ����������� Computation �����������

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend