Certifiable randomness from a single quantum device
THOMAS VIDICK
CALIFORNIA INSTITUTE OF TECHNOLOGY
Joint work with Zvika Brakerski (Weizmann), Paul Christiano, Urmila Mahadev, and Umesh Vazirani (UC Berkeley)
from a single quantum device THOMAS VIDICK CALIFORNIA INSTITUTE OF - - PowerPoint PPT Presentation
Certifiable randomness from a single quantum device THOMAS VIDICK CALIFORNIA INSTITUTE OF TECHNOLOGY Joint work with Zvika Brakerski (Weizmann), Paul Christiano, Urmila Mahadev, and Umesh Vazirani (UC Berkeley) Quantum Computing 1.0
THOMAS VIDICK
CALIFORNIA INSTITUTE OF TECHNOLOGY
Joint work with Zvika Brakerski (Weizmann), Paul Christiano, Urmila Mahadev, and Umesh Vazirani (UC Berkeley)
… but nearing experimental test of extended Church-Turing thesis?
security in quantum cryptography
Fault-tolerant quantum computers can factor in polynomial time
challenge to the efficient Church-Turing thesis
Google 72-qubit “Bristlecone” chip The D-Wave 2000Q
Boson Sampling
Random quantum circuits
50 noisy qubits: verified quantum advantage 2000 perfect qubits (× 100 for QEC) break ECC
verifiable quantumness ?
[Bremner-Jozsa-Shepherd’10] Instantaneous Quantum Computation (IQP)
post-quantum secure cryptographic scheme
Classical verifier Quantum device
challenge 0/1 response 𝑠0/𝑠
1
public parameters 𝑞𝑙
0 and 𝑠 1
1 2 :
classical devices can be rewound!
commitment 𝑧
Function 𝑔: 0,1 𝑜+1 → 0,1 𝑜 such that:
1 2 𝑦0 + 1 2 |𝑦1〉
hard to find (𝑦0 or 𝑦1) and (𝑒 s.t. 𝑒 ⋅ 𝑦0 ⊕ 𝑦1 = 0 )
𝑦0 𝑦1 𝑧
𝑑 = 1: 𝑒 s.t. 𝑒 ⋅ 𝑦0 ⊕ 𝑦1 = 0 challenge 𝑑 = 0/1 𝑑 = 0: 𝑦0 or 𝑦1 public parameters 𝑞𝑙
commitment 𝑧
Device Verifier
→ randomness accumulation
𝑑 = 1: 𝑒 s.t. 𝑒 ⋅ 𝑦0 ⊕ 𝑦1 = 0 challenge 𝑑 = 0/1 𝑑 = 0: 𝑦0 or 𝑦1 public parameters 𝑞𝑙
commitment 𝑧
Device Verifier
𝑑 = 1: 𝑒 s.t. 𝑒 ⋅ 𝑦0 ⊕ 𝑦1 = 0 challenge 𝑑 = 0/1 𝑑 = 0: 𝑦0 or 𝑦1 public parameters 𝑞𝑙
→ computational basis measurement generates randomness
commitment 𝑧
Device Verifier
EPR pair + Pauli measurements (rigidity)
→ device measured a qubit!
Randomness secure from unbounded adversary entangled with device
Can the protocol be fine-tuned?