Paper 2025/101
Unveiling Privacy Risks in Quantum Optimization Services
Abstract
As cloud-based quantum computing services, such as those offered by D-Wave, become more popular for practical applications, privacy-preserving methods (such as obfuscation) are essential to address data security, privacy, and legal compliance concerns.
Several efficient obfuscation methods have been proposed, which do not increase the time complexity of solving the obfuscated problem, for quantum optimization problems. These include {\em sign reversing}, {\em variable permutation}, and the combination of both methods assumed to provide greater protection. Unfortunately, sign reversing has already been shown to be insecure.
We present two attacks on variable permutation and the combined method, where it is possible to efficiently recover the deobfuscated problem, particularly when given access to the obfuscated problem and its obfuscated solution, as a cloud-based quantum provider would have.
Our attacks are in the context of an optimization problem of cryptanalysis of the Trivium cipher family, but our approach generalizes to other similarly structured problems.
Our attacks are efficient and practical.
Deobfuscating an optimization problem with
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Privacy preserving techniquesattacksobfuscationquantum computing and annealingquantum optimization
- Contact author(s)
-
mateusz lesniak @ nask pl
michal wronski @ nask pl
ewa syta @ trincoll edu
miroslaw kutylowski @ nask pl - History
- 2025-01-23: approved
- 2025-01-22: received
- See all versions
- Short URL
- https://ia.cr/2025/101
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/101, author = {Mateusz Leśniak and Michał Wroński and Ewa Syta and Mirosław Kutyłowski}, title = {Unveiling Privacy Risks in Quantum Optimization Services}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/101}, year = {2025}, url = {https://eprint.iacr.org/2025/101} }