Paper 2025/101

Unveiling Privacy Risks in Quantum Optimization Services

Mateusz Leśniak, NASK National Research Institute
Michał Wroński, NASK National Research Institute
Ewa Syta, Trinity College
Mirosław Kutyłowski, NASK National Research Institute
Abstract

As cloud-based quantum computing services, such as those offered by D-Wave, become more popular for practical applications, privacy-preserving methods (such as obfuscation) are essential to address data security, privacy, and legal compliance concerns. Several efficient obfuscation methods have been proposed, which do not increase the time complexity of solving the obfuscated problem, for quantum optimization problems. These include {\em sign reversing}, {\em variable permutation}, and the combination of both methods assumed to provide greater protection. Unfortunately, sign reversing has already been shown to be insecure. We present two attacks on variable permutation and the combined method, where it is possible to efficiently recover the deobfuscated problem, particularly when given access to the obfuscated problem and its obfuscated solution, as a cloud-based quantum provider would have. Our attacks are in the context of an optimization problem of cryptanalysis of the Trivium cipher family, but our approach generalizes to other similarly structured problems. Our attacks are efficient and practical. Deobfuscating an optimization problem with variables obfuscated with the combined method has a complexity of compared to the complexity of of the brute force attack. We provide an implementation of our attack; using a commodity laptop, our attack using the full Trivium cipher takes less than two minutes if optimized. We also present possible countermeasures to mitigate our attacks and bring attention to the need for further development in this area.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Privacy preserving techniquesattacksobfuscationquantum computing and annealingquantum optimization
Contact author(s)
mateusz lesniak @ nask pl
michal wronski @ nask pl
ewa syta @ trincoll edu
miroslaw kutylowski @ nask pl
History
2025-01-23: approved
2025-01-22: received
See all versions
Short URL
https://ia.cr/2025/101
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/101,
      author = {Mateusz Leśniak and Michał Wroński and Ewa Syta and Mirosław Kutyłowski},
      title = {Unveiling Privacy Risks in Quantum Optimization Services},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/101},
      year = {2025},
      url = {https://eprint.iacr.org/2025/101}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.