2019 International Conference On Computer Aided Design

The Premier Conference Devoted to Technical Innovations in Electronic Design Automation

November 4-7, 2019The Westin Westminster Westminster, CO

MP Associates, Inc.
TUESDAY November 05, 1:45pm - 3:45pm | Westminster III
Quantum Computing - Resilience and Security
Rolf Drechsler - Univ. of Bremen
Swaroop Ghosh - Pennsylvania State Univ.
Anupam Chattopadhyay - Nanyang Technological Univ.
Following Feynman’s idea of computing based on the intricate principles of quantum mechanics the scientific community has embarked on a quest to tap into the unprecedented potential of quantum computing. The concerted effort by industry/academia has produced commercial quantum computers and algorithms that offer speed-up over classical counterparts (at least in principle). The basic building block of a quantum computer is a qubit that has to satisfy DiVincenzo criteria. Several quantum systems satisfy them e.g., superconducting, ion-trap and solid-state qubits each with its own merits/caveats. In spite of the promises and potentials, quantum computers are still in nascent stage. On the device front, the qubits are fragile and susceptible to noise and error due to decoherence and is usually characterized by relaxation time T1 and dephasing time T2 (~tens of microseconds). This is specifically true for Noisy Intermediate Scale Quantum (NISQ) Computers. Any sequence of gate operation (~tens of nanoseconds) has to be completed before the relaxation time which limits the maximum number of allowed gate operations to thousands at the very best. This is not sufficient to sustain ~1010 gate operations that may be required for meaningful system implementation. New noise tolerant qubits and their accurate modeling is needed to quantify the reliability (or fidelity) of the output. Quantum error correction (QEC) e.g., Shor code, Steane code, Surface code increases the overhead substantially e.g., 20X in surface code. Therefore, advances in low-cost resiliency techniques is indispensable. EDA techniques are required to model the noise and enhance the resilience by exploring trade-off opportunities present at various levels of design hierarchy e.g., accuracy of optimization problem, mapping gates to appropriate qubits, training of circuits and so on. Advancement in EDA is required to accommodate wide variety of qubits and their system architecture. Once we address the resilience of quantum computing it will be capable to break conventional crypto-systems as prophesized using techniques e.g., Shor’s factorization. This mandates the need to explore protection against such powerful computing platform. Cryptographic algorithms known as Post-Quantum Cryptography (PQC) is being developed however, their real deployment in a wide range of computing devices faces several challenges that need to be resolved. Quantum systems also bring new security promises in terms of Quantum Key Distribution (QKD), quantum-enabled security primitives e.g., TRNG. This 2 hour special session will provide in-depth treatment of both sides of the coin namely the resilience and security of NISQ era quantum computers including PQC/QKD. It will include 5 invited talks (20min talk+4min Q&A) by speakers from academia, industry and government agency. Talk-1 will describe a holistic quantum computer architecture for interfacing with Intel’s quantum computer. Talk-2 will present NASA’s perspective on algorithmic to device optimization for resilience. Talk-2 will introduce a single-pass qubit allocation and technology mapping flow for noise resilience. Talk-4 will discuss the security of quantum cryptography. Talk-5 will cover new approaches in lattice-based post-quantum cryptography.

6D.1Quantum Computing: From Qubits to Quantum Accelerator
 Speaker: Koen Bertels - Delft Univ. of Technology
 Author: Koen Bertels - Delft Univ. of Technology
6D.2A NASA Perspective on Quantum Computing
 Speaker: Zhihui Wang - NASA Ames Research Center
 Authors: Eleanor Rieffel - NASA Ames Research Center
Zhihui Wang - NASA Ames Research Center
6D.3MUQUT: Multi-Constraint Quantum Circuit Mapping on Noisy Intermediate-Scale Quantum Computers
 Speaker: Swaroop Ghosh - Pennsylvania State Univ.
 Authors: Debjyoti Bhattacharjee - Nanyang Technological Univ.
Abdullah-Ash Saki - Pennsylvania State Univ.
Mahabubul Alam - Pennsylvania State Univ.
Anupam Chattopadhyay - Nanyang Technological Univ.
Swaroop Ghosh - Pennsylvania State Univ.
6D.4Security of Quantum Cryptography
 Speaker: Anindita Banerjee - QuNu Labs
 Authors: Anindita Banerjee - QuNu Labs
MT Karunakaran - QuNu labs, India
6D.5Engineering Lattice-based Post-Quantum Cryptography
 Speaker: Sujoy Sinha Roy - Univ. of Birmingham
 Author: Sujoy Sinha Roy - Univ. of Birmingham