TetrisLock: Quantum Circuit Split Compilation with Interlocking Patterns

๐Ÿ“… 2025-03-15
๐Ÿ“ˆ Citations: 0
โœจ Influential: 0
๐Ÿ“„ PDF
๐Ÿค– AI Summary
To address quantum circuit intellectual property (IP) leakage risks posed by untrusted quantum compilers, this paper proposes a lockstep-splittingโ€“based quantum circuit decomposition compilation method. The approach decomposes an original quantum circuit into two functionally tightly coupled subcircuits, neither of which is executable in isolation; full functionality is restored only upon strict recombination, thereby effectively thwarting reverse engineering and collusion attacks. Key contributions include: (i) the first lockstep decomposition mechanism that operates without requiring a trusted compiler; (ii) scalability to arbitrary qubit counts; and (iii) preservation of the original circuit depth with negligible resource overhead. Evaluated on the RevLib benchmark suite, the method incurs less than 1% functional accuracy loss and significantly reduces IP inference success rates.

Technology Category

Application Category

๐Ÿ“ Abstract
In quantum computing, quantum circuits are fundamental representations of quantum algorithms, which are compiled into executable functions for quantum solutions. Quantum compilers transform algorithmic quantum circuits into one compatible with target quantum computers, bridging quantum software and hardware. However, untrusted quantum compilers pose significant risks. They can lead to the theft of quantum circuit designs and compromise sensitive intellectual property (IP). In this paper, we propose TetrisLock, a split compilation method for quantum circuit obfuscation that uses an interlocking splitting pattern to effectively protect IP with minimal resource overhead. Our approach divides the quantum circuit into two interdependent segments, ensuring that reconstructing the original circuit functionality is possible only by combining both segments and eliminating redundancies. This method makes reverse engineering by an untrusted compiler unrealizable, as the original circuit is never fully shared with any single entity. Also, our approach eliminates the need for a trusted compiler to process the inserted random circuit, thereby relaxing the security requirements. Additionally, it defends against colluding attackers with mismatched numbers of qubits, while maintaining low overhead by preserving the original depth of the quantum circuit. We demonstrate our method by using established RevLib benchmarks, showing that it achieves a minimal impact on functional accuracy (less than 1%) while significantly reducing the likelihood of IP inference.
Problem

Research questions and friction points this paper is trying to address.

Protects quantum circuit designs from theft by untrusted compilers.
Ensures IP security by splitting circuits into interdependent segments.
Maintains low overhead and functional accuracy in quantum compilation.
Innovation

Methods, ideas, or system contributions that make the work stand out.

Split compilation method for quantum circuit obfuscation
Interlocking splitting pattern protects intellectual property
Minimal resource overhead with preserved circuit depth
๐Ÿ”Ž Similar Papers
No similar papers found.
Q
Qian Wang
Department of Electrical Engineering, University of California, Merced, CA, USA
J
Jayden John
Department of Electrical Engineering, University of California, Merced, CA, USA
Ben Dong
Ben Dong
PhD Student EECS, University of California, Merced
Hardware-Based SecuritySide-Channel AttacksQuantum ComputingQuantum Machine Learning
Y
Yuntao Liu
Department of Electrical and Computer Engineering, Lehigh University, PA, USA