Verification of quantum technologies, applications & systems
Verification of quantum technologies, applications & systems
Disciplines
Mathematics (30%); Physics, Astronomy (70%)
Keywords
-
Quantum Information,
Certification Of Quantum Properties,
Device-Independent Protocols
Primary researchers involved VERIqTAS is a European consortium with the following partners: Remigiusz Augusiak (Center for Theoretical Physics, Polish Academy of Sciences), Antonio Acn (Institute of Photonic Sciences), Omar Fawzi (Centre de Recherche Inria Grenoble-Rhône-Alpes), Laura Mancinska (University of Copenhagen), Stefano Pironio (Université libre de Bruxelles) and Miguel Navascués (Institute of Quantum Optics and Quantum Information Vienna, Austrian Academy of Sciences). Quantum technologies have already been around for a while. Think of quantum key distribution: in 1984, Bennett and Brassard conceived a protocol that allowed the secret transmission of information between two separate locations. The security of their scheme, which required the two locations to send laser pulses to one another, was guaranteed by the laws of quantum mechanics. Many experiments followed, and in 2001, ID quantique, the oldest quantum cryptography provider, was founded. Nowadays there exists a quantum key distribution network connecting Beijing and Shanghai, and there are plans to build a similar one in the European Union. In parallel, in the last few years we have seen a proliferation of Noisy Intermediate-Scale Quantum (NISQ) devices. Such are complex quantum systems over which we have an extraordinary level of control, but which nonetheless are not sophisticated enough to make a quantum computer. Since conventional computers cannot predict the behavior NISQ devices, there is hope that they can be used to solve demanding computational tasks, such as medicine design. In fact, there already exist theoretical proposals to use NISQ devices as an aid in financial investment. On this beautiful blue sky there are, however, a few clouds: commercial QKD systems have been hacked repeatedly, and NISQ devices are known to sometimes output the wrong answers. In all cases, there was a hardware problem involved. Namely, one of the parts of the overall system, or their joint interaction, was not working as expected. The goal of project VERIqTAS is to develop protocols and methods to verify whether complex quantum systems, such as networks or NISQ devices, operate correctly. In the case of communication networks, this is all the more challenging, because we cannot even trust the experimental devices that we use to test the network: they could have been tampered by a spy! One would think impossible to verify that a system works without making assumptions on how we access the system. However, this is only true in classical physics: as it turns out, there exist quantum cryptographic schemes that do not rely on knowing how the experimental devices work. Such schemes are still very impractical, so we aim to improve them in project VERIqTAS. Verifying the correct functioning of NISQ devices is not much easier, because normal computers cannot simulate them. This means that whatever protocol we might think of cannot include a full model of the system that we wish to study. Project VERIqTAS will discern what features of complex quantum systems we can predict and use them to verify that the device is working.