Blind quantum computing. An interview with Harold Ollivier.

Dan: Hello and welcome
to the quantum divide.

This is the podcast that talks
about the literal divide between

classical IT and quantum technology,
and the fact that these two domains

need to become closer together.

Quantum networking actually is
more futuristic than perhaps

the computing element of it.

But we're going to try
and focus on that domain.

But we're bound to experience many
different tangents both in podcast

topics and conversation as we go on.

Enjoy.

All right.

Welcome back.

Another episode in short succession.

This time I'm joined by
Harold Olivier, right?

Bonjour Harold et bienvenue
sur le podcast Quantum de Vide.

Thanks for joining us.

Yeah, superb.

Yeah.

Yeah.

You're you're a first
attendee from France.

So it's great to, to have you on
board and we'll have a good discussion

about what you do and what's happening
in France, I think is superb.

So you work for Inria, right?

Um, Yeah.

Um, Let's start with a normal approach
that I take in these podcasts, give

us a bit of a view on your path
into quantum what it is you do and

what it is you're doing at Inria.

Harold: So what I'm doing is
mostly researching um, verification

of quantum computation.

That means when you are in a setting
where you don't have a quantum computer

in house and you want to delegate
the computation but you want to.

this computation to still be secure
in the sense that you want to

have privacy on the data and the
algorithm that you are running.

And you also want to have
a proof of integrity of the

computation being performed.

So that's most of my activity,
although I have other interests

um, mostly based on quantum error
correction, quantum error mitigation.

And the reason is that the team that
uh, I'm working in is uh, its focus is

really working and researching theoretical
problems fundamental problems, but guided

and inspired by practical problems,
experimental questions and trying

to make that real life applications.

So we go back and forth
between theory and experiments.

So of course, if you do this,
you are forced to look at error

correction and error mitigation.

So that's, yeah, that's the second

Dan: focus.

Great.

Is your background in mathematics or is
it physics, a blend of multiple topics?

Harold: Yeah, it's mostly a blend.

Yeah I had, a lot of math, but but
also I did, I started doing theoretical

physics and I entered into quantum.

Really through the theory of decoherence.

So really, like I was interested at
the time in studying the transition

between quantum world into the
classical world and what that means.

And in fact, I went to this topic or
I entered quantum information because

The work that I did was trying to
understand this transition mostly from

an information theoretical point of view.

So really trying to understand
how information leaking into the

environment leads to decoherence.

And more than this is like, how does
objective world emerge from the quantum

one and again, trying to characterize
this in terms of information.

And yeah, it's very natural to then
input a lot of quantum information,

theoretical quantities into that.

And then like that, yeah, you start
being interested in error correction

and then goes to more like applications.

Dan: Great.

I know we're going to deep dive
on some of that in a moment.

But first of all if I can just take you
back to Inria, so I understand you're a

leader lead for the quantum activities
within Inria research organization.

It seems that Inria focuses on
many different industry verticals.

Is there a relationship with
the French government now or the

French national quantum strategy?

Harold: Thank you.

Okay.

So Inria is one of the various
research institute, public

research institute in France.

The specificity of this institute
compared to what usually people

know more abroad is CNRS.

CNRS has a very wide and broad interest in
science they, they can go from archaeology

to to literature, to history, to also like
computer science, math and everything.

INRIA is focused only on computer
science so within this focus,

INRIA has nine different centers
in in France and many more centers.

That are in partnership with universities
and they're in these in these centers,

you have like smaller teams it's
usually between three and five, maybe

up to eight people that work on a
topic and it's it's yeah, each team

needs to have a rather clear topic,
clear focus for the next, Decade.

And yeah, we work then on
various topics within Inria.

So you have about 1500
researchers within Inria.

There are several teams doing
quantum information science.

Right now it's about 80 researchers
and on these topics we look

very much into, I would say the
core of the quantum ecosystem.

So we think about.

We have teams doing pure
quantum information science.

Some doing languages compilation.

We have error correction.

But we also have partnerships and
that's the strength of the model.

We have partnerships with
universities that created teams

that have both experimental
physicists and computer scientists.

So one of the team is at the origin
of the Cat Qubit model for quantum

computing, that has gained a lot
of interest in the recent years.

And so it's very interesting because
It's within a computer science

institute, but you still have
like dilution fridges in the lab.

So that's very interesting in there.

So that, yeah, our focus is a lot onto
what can we do with quantum computers?

How do we build these quantum computers?

How do we make them robust and trusted?

So that's, that, that's I would
say the main focus of INRI.

Dan: Very nice.

Thank you.

Yeah.

How does that link into the
French quantum strategy?

Is there a national strategy and
a good ecosystem of startups and

things that you collaborate with?

Or is it heavily public sector

Harold: driven?

Yeah, so I would say so the topic
the topic of quantum information

at Inria started in 2001.

Actually, I was I was the first one
doing quantum information there.

And it grew a little by little
and, yeah, as a tradition or uh,

yeah, recognize expertise in, in
having collaborative projects with

with startups and with companies.

Since the very beginning, there has always
been a lot of contact with industries

in quantum, of course, and others,
but not necessarily the quantum topic.

But yeah, there has always
been a lot of interaction.

Also, because these teams are often within
universities, there are natural links,

and I would say it's the it's a very
strong characteristics of the of the field

of quantum information science is that
theory people usually talk a lot more with

experimentalists than in other fields.

And so there has always been a lot of
interaction with with the other academics

team in the ecosystem, but definitely
with the launch of the national quantum

strategy, like there has been a lot more
of effort done in this in this respect.

Coming from the state and the government.

And INRIA is one of the three main
research organization in France.

Leading and orienting the national
strategy with CNRS and CER, and

yeah, we actually, before joining
the podcast, I was in a meeting with

them and we were discussing like.

How to put a lot of synergy within
the different projects that are

funded at INRIA, but within the
national strategy, but also beyond

we are we are all scientists working
in this way of orienting things

and We fully appreciate the effort
that has been and the trust that is

put on us by the government saying,
okay, develop something that works.

That's a big challenge.

But at the same time, we know that by
construction, these kinds of national

strategies have a very short horizon
even though for them, it's a huge

effort going to, looking at what's
going to happen in the next 10 years.

But in terms of research, it's still
like short, medium term, and we

need to plan what goes ahead of this
and what goes further than this.

And our discussion is okay.

We want to take care of this opportunity
to, yeah, go on and be on target with the

challenges that are assigned to us by the
by, by this strategy, but at the same time

construct something that goes beyond this.

And that's, yeah, a lot of our
discussions with our colleagues.

And of course.

There is.

How do we create something that's really
like very strong academic ecosystem.

But as well, like, how do we
partner with companies and startups?

There are several startups in France that
have been quite successful at raising

funds in building quantum computers.

We start having startups also
interested in building quantum memories.

And we go then more towards
networking questions.

There are people doing solutions
for for right now, like distributed

classical computing, but secured
with the with quantum links.

So yeah it's growing in several
directions and it's it's very

active, so yeah, very encouraging.

But we are always interested in also.

Opening this ecosystem to welcome
people also from abroad, because

we think that it's necessary France
is not big enough as a country to

produce everything that's needed.

So we need to be in contact with our
European partners, but also more wider

international partners on that topic.

Dan: Yeah, exactly.

It's definitely a global
global effort at the moment.

Although there's still the whole
local political things at play, but

I think the scientists try and do
their best to ignore that, right?

And focus on the science,
focus on the technology.

But I'm not familiar with some of
the startups and companies in France.

Do you want to list a couple?

Harold: Yeah, I hope
I don't forget anyone.

In quantum quantum computing, there
is one company, Pasqal, which has

been quite successful in developing
a platform for neutral atoms.

That's one.

There is one that's actually
very much linked to with Inria.

because of this team developing
CatQubits, which is called Alice and Bob.

So that's the superconducting
platform for computing, but

really based on these CatQubits.

And they aim directly at
going to fault tolerance.

So that's that's interesting because
it's a slightly different roadmap.

And the way they develop things is of
course different than the others because

they are not so much interested in NISQ.

We have Candela which is a very
interesting company working on

photonic quantum computing platforms.

There are younger ones C12, which is
working on carbon nanotubes for doing

the the shielding, I would say of
electron spins for quantum computing.

That, that's I think pretty
much what we have more, most

advanced in the computing space.

We have Willink, which is a startup
that has started the working on

quantum memories and VeriQloud,
which is this this company securing

classical computations with quantum
before being in a position to secure.

Quantum computations as well.

So I think that's the ones that I'm
thinking about in terms of really hardware

computing or networking hardware, but
we have other companies doing cryostat

and electronics but that's a little bit
too far from me to be really listing

them because because yeah, we are still
working at a quite theoretical level.

So okay.

Everything that goes around, which
is extremely important, is slightly

out of my scope, I would say.

And yeah.

Dan: Totally understand, yeah.

No, thanks.

That's interesting that even though
you mentioned most of those are

hardware orientated, I think there's
a software platform there's...

Obviously to create a fault
tolerant system a lot of that

is software orientated as well.

Harold: Yeah, that's true.

There are a few startups doing software.

And now I'm missing the names, of course.

But yeah it's also fairly active.

I would say by construction,
it's the these startups.

need less capital and it's easier
to develop this kind of of solution.

It's a little bit less in the focus maybe
of of the national strategy, although it's

very important in the long run, because
That's the way you actually reach the end

user and really know who is needing what
and what quantum computers are useful for.

So that's very important
and they are very necessary.

Also like for us as a
research institute because.

We are sometimes contacted by large
companies who want to have or understand

quantum, and it's hard for them to
find someone who is going to really

that progress in understanding what's
at stake for their organization.

And a lot, most of the time
they come to us and they ask

for help and we try our best.

But at the same time,
it's very hard because.

As a research organization,
we do research.

And so everything that we do So

you need to do science at the level
that's really like state of the art

and really pushing the boundaries.

And sometimes there is a misfit between
between what we should do and what the

companies can, swallow and understand.

So their companies doing software
are very important because they are

good intermediate level, like to help
prototyping some stuff and help these

larger companies grow in expertise.

And then it's much easier to do like very
advanced projects with them because they

already know the basics and they know what
they want on or where they want to go.

And it's much, much easier
as far as to interact.

Although we try to do our best.

With addressing these issues
unfortunately, we have a

limited bandwidth in some sense.

We need to deliver the research that
we promised to the funding agencies

and the various contracts we are in.

So we do our best in the free time
or allowed allowed times there.

But but when we do it, it's very
interesting because it's It's really

opening different perspectives
and and making that more connected

to sometimes like real use cases.

Sometimes it's also achieving
very unexpected results, like

for instance, helping a company
improve its classical algorithmics.

Sometimes they come with a problem and you
find a solution that doesn't need quantum.

And that happened to me and I
think it's very interesting.

Because I think this is an
effort that everyone needs to be

starting performing right now.

Because of the end of the Moore's law,
we need to go back to algorithmics

and try to fine tune everything.

And that's, that's a very hard
challenge, but that goes way beyond

quantum, but if quantum can be one
of the reasons why you want to open

the box and look at the things like
reading in detail you should do it.

And if you find a good classical
solution, it's all the best.

Dan: Yeah.

I say that's a surprise, but a
nice surprise, I guess, um, it's,

I feel like we could talk about the
business and ecosystem for the whole.

call.

But I know we came to with
three main topics, right?

We wanted to talk about the trends
in quantum computing, HPC and data

centers and that kind of stuff.

We wanted to talk about privacy,
security, and trust in quantum

computing and where that was necessary.

And then of course, quantum networking,
our favorite topic at the end.

So let's dive into that, shall we?

Let's start with the first one.

We had a conversation about quantum
computing on premise consumption of cloud

deployments, some companies looking for in
house systems and then also the challenges

that brings for a data center company.

Yeah.

How would you like to start on that topic?

I know that's an interesting one for

Harold: you.

Yeah, for me, it's really understanding.

Okay, there are a lot of challenges
in developing quantum technologies.

There is of course the science of it but
it's not only this At one point we will

be developing this and people are going
to sell stuff to others to companies

and to sell stuff I Mean I have been
a venture capitalist in a past life.

So I know that if you have a very good
product that's fine but you need to

meet the market and you need to really
answer or, yeah, you need to answer a

need and of of a user and you need to
insert yourself in the way he processes

things and in the way he deals with,
you This service or this hardware

that you're providing, and that's,
that's, that's a more complex or it's

a wider concern that you need to have.

And what I would say is that
right now in quantum computing, we

have always been referring to the
early days of classical computing.

And that's partly true, but it's also.

Sometimes a little bit misleading.

Of course our machines are not efficient,
not very powerful and they are super

big and yes, there is a long way to go
and we still need to work and okay sure

but at the same time there is something
that has changed between the time of

ENIAC and now is that now it's just For
most companies, not an option to have

in house computing like super very heavy
computers and things in house because

we are now so much accustomed to sending
data around and moving it here and there

and then, okay let's hire computing
power for a peak demand at one point.

And then we release that.

This is common practice
in large organizations.

Okay.

And if we arrive with a very nice
and good computer, quantum computer

now will be a pain for these people
because they need to reverse what they

have been doing, which is like pushing
the hardware outside of the buildings

and into specialised data centres.

And we will, if we are selling
them a product that needs.

For them to reverse this trend,
it's just like almost impossible.

So I think we need to
take that into account.

And people providing services as data
centers need to take that into account

because they need to, at one point, be in
a position of hosting quantum computers.

And we see this in some of the projects

that we are that we are
developing and deploying in

France for the national strategy.

. Which is we are trying to host in one
of the public data centers some early

quantum machines, and it's complicated.

It's complicated because the
requirements of these machines are

very different from the classical ones.

Especially like the cooling system
with helium is a pain and data

centers, they don't want this.

So they, they actually need to rebuild
rooms for us to put the machine.

So it's like suddenly you are like very
much on to brick and mortar questions.

But you need to solve this.

So that's one, one problem.

The cooling, there is also the vibration.

In fact, data centers are vibrate a lot
and quantum computers don't like that.

So you need to take care of this.

And again it's a problem.

Hiring construction companies, redesigning
your building and things like this.

So it's a pain and it's very costly.

So I think it's good that.

We do it like with public money
to see exactly what it is, what it

takes, understand the problems and
then transfer that, to more like

to the private sector at one point
and say, Okay, here is what we did.

This works.

This doesn't work.

And we can try to help you
in addressing these issues.

Yeah.

So that's that's what they would
say regarding data centers.

I think it's, we need to take
into account the fact that people

don't want machines in premise.

We need to adapt data centers
to host quantum machines.

And then yeah, of course, then comes
the question of what security for this.

Dan: That's a different matter for sure.

Yeah.

So at the moment when a quantum computer
is installed somewhere, do these

types of physical aspects need to be
considered and implemented every time?

Maybe it depends on the modality, right?

So if you need a dilution fridge,
then of course you have the

chemicals required with that.

But I do hear that these days
the dilution fridge technology

is pretty more off the shelf.

Type type products.

Is that true or

Harold: not?

Right now, what we what we see
is that, okay, I would say that.

We are conducting experiments.

So if we do something, we take the most
demanding platform and we do something

that fits this platform and then we'll
host in the same space the other machine.

Of course, there are technologies that
are less demanding than the than maybe the

ones you are requiring dilution fridges.

But still, it's something that needs to
be right now it's still, it's apparently

it's still needs to be built, pretty much
on purpose for this kind of environment.

But it's also, it's also a question,
like very practical question of these

machines are experimental machines still.

So we think we know that we will want
to open the box from times to times.

So we want to have
access to these machines.

We want to be able to
work around the machines.

We want to be able to have enough
space to in case we want to upgrade

some components and things like this.

So, so, Yeah, I'm not sure
we can really completely draw

conclusions from what we have.

We are seeing right now because
we are in an experimental phase.

And but in a few years from now, we'll
have the, the probably some much better

view or a clear view on what is needed,
what is not needed, but we did it

anyways by abundance of of precaution
but yeah, so I think it's still

there are still like open questions.

We just want to make sure.

That we can push these experiments
as far as we as we can.

We don't want to be blocked at one point
by something that we didn't think about.

So we are a bit too cautious probably but
yeah, I think it's fine in this stage.

Dan: And that leads me to think that
there's a link between this topic and the

second topic about privacy and security.

Because people that want to use
quantum computing resources.

And don't have the ability to either
build a new building, or take on some

new chemical processes, or hire some
physicists to look after the computer.

They're going to need to think about
some form of remote execution of

algorithms or functions inside their code.

We know there's already many ways to do
this through the private quantum computing

companies, through the public clouds.

Yeah.

This is a this kind of part of the
industry has grown a lot quicker than I

think the actual quantum technology itself
in the back end because of the fact that

the cloud networks are everywhere, that
the cloud data centers are everywhere.

It's a matter of, pushing out
new functions and they get

distributed around the globe.

That's great.

But then and we enter the topic of what?

What if you're executing something
that has some intellectual property?

What if you're testing something that
is you want to keep secret or you don't

want anybody to know the algorithms
you're running and testing to maybe

solve a particular new problem that
leads us on to the next topic, right?

Harold: Yeah, I think it's I think
it's a trend that is actually coming

from outside quantum computing really
with the privacy preserving laws,

especially in Europe with GDPR everybody
now knows that there is a risk in

mishandling confidential private data.

People are now also very much aware
of Intellectual property rights and

questions that you have when you
actually execute things remotely.

And right now, even in the classical
crypto field, there is a lot of evolution.

The mentalities are changing, and
people are now much more aware of the

issues and the potential solutions.

And in the classical space, there
are a lot of solutions but it's

still very early, I would say.

There are plenty of solutions,
and people are still exploring.

For instance, not so long
ago, we were discussing with

the French banking regulator.

And they were exploring.

Like very basic questions like, okay,
we want to conduct stress tests on the

banking system or maybe the insurance
insurance companies, the way they

conduct stress test is that they need
to have a very fine grained information

about all the contracts and all the the
commitments the banks or the insurance

companies have with respect to the various
parties they are doing business with.

The problem like if you take like
for instance an insurance company

the commitments that you have is
Towards actual physical people, okay?

And to understand how this contract
is going to behave, you'll have to

transfer a lot of private information
about the health of the person, about

whatever, the age and location, wealth.

So it's a nightmare, even for regulators.

That's really a, a, a, a
difficult topic for them.

And they are exploring
classical solutions for this.

The way they do is actually hire
various startups and make them

work on these kind of issues.

And so we contacted them and saying have
you considered quantum computations?

Oh, yeah that's another challenge.

We are interested in this
but it's not for now.

And we all agree that they are not going
to conduct this kind of test with quantum

uh, quantum computers anytime soon.

But then we, we asked them
like, but are you going to

have your own quantum computer?

Oh, no, of course not.

We are a regulator.

We will just, do that on the cloud and say
but then you just have the same problem

as you have in the classical space.

And then they just realized that.

If you think about a lot of quantum
applications you'll be faced with the

same questions that you have right
now in the classical computing space.

And so we need, as scientists,
we need to develop these kind of

solutions or protocols to make
sure that we can guarantee the same

kind of of promises to end users.

And I think for me, it's really
like Uh, very strong requirement for

developing a healthy quantum ecosystem.

If we don't have this Then, and I'm
coming back to what I was saying

before, if we don't have this, we'll
have superb machines, they are going

to be great, but nobody or a very
small fraction of what we have in mind

as a market will really be able to
do the efforts to be using it because

you need to have a new building and.

You are just renting your space or
maybe you cannot build something

inside to host a quantum computer.

You can have like plenty
of reasons like this.

So I think it's necessary if
we want to unlock the full

potential, we need to make this.

Remote quantum computation available
if we do remote quantum computation,

because quantum computation at least
for the first, first wave of things

that we will be doing, it's you
are going to compute with a quantum

computer, the most complicated or the
most sensitive data that you have on.

So by construction, those will be
Requiring a lot more protection

than a regular computation.

So we need to address that question.

Yeah, that's

Dan: for me.

Yeah.

Yeah.

I need some help.

I think so.

My just in understanding part of that.

I understand the privacy and the
need to execute in a secure way.

But my understanding of quantum
algorithms mostly comes from Grover's

search and Shor's algorithm, so on,
which are executing a particular.

set of mathematical tasks to
find an answer to something.

None of that really takes, of course,
if you're factoring a number and it's

a key, which is to something important,
then that's those numbers that you end up

with are quite important and may be seen
as something you need to keep secure.

But what about, you mentioned
the insurance company, you

mentioned personal information.

Even more so if it's
company private information.

Can you give me an example of how
that type of information is used in

quantum algorithms or programs which
are executed on quantum systems?

Maybe we're not there
yet, but I haven't seen...

Harold: All the people that are
doing quantum machine learning,

they are learning on something.

And so this something might
be, whatever you want.

But you cannot rule out the fact
that these data are sensitive.

That's one possibility.

The second thing is maybe it's the
algorithm that is sensitive itself.

Okay, so you have found a nice way
to do something and you don't want

your competitor to be using it.

And my most beloved
example is Always the same.

And I'm sorry for naming companies, but
maybe it's just making things clear for

people listening to the to the audio.

But if I am Criteo, which is
like an ad placement company.

And that I have found a quantum algorithm
to optimize this ad placement, and

I'm running this against Google, okay,
because Google is my competitor, or maybe

Google is running the platform where I'm
trying to find the best way to place ad.

So I have a competing interest
in this ad market with Google.

But will I really delegate my
quantum computation to Google

cloud quantum cloud services?

I don't know.

But Definitely, even though the
data is not sensitive, I don't

want to give them my algorithm.

Okay.

And the way it could be reversed,
if Criteo had developed quantum

computers, and maybe Google
doesn't want to use that for him.

Okay.

So So I think that's that's the issue.

The algorithm itself
can be very sensitive.

And right now, when you access
when you access a quantum computer,

you just send your instructions
in plain to the quantum computer.

So if you are sitting on the other side
of the quantum computer and just looking

at what instructions are executed, you
can just Find out the whole computation

that is being executed and we know this we
experience this Because we use of course

it's in an agreed way with the various
Computing Providers so as academics we

often have access to their machines, but
we agree this to be open And we know that

they look at it because from time to time
we get a call or an email saying, Oh, you

are running something and we quite don't
understand what you are trying to do.

So it looks interesting or something.

So it's a fact.

You can really look at what people
are executing on quantum machines.

And I think it's good.

I like it the way they do it.

I'm not complaining about this.

I need to be clear on this.

I think it's good because we need
and we want interactions with the,

the hardware vendors and to, to.

Help us achieve what we want to
do on their platform, but at the

same time trying to help them
develop better and better tools.

But so that's a well agreed situation.

But at the same time, if you are in a
different situation where you want to

have your confidentiality well, You
need to rely on the fact that the people

on the other side are are uh, okay and
uh, are following their obligations.

And that's, most of the time, that's what
you don't want to do when you think about

Dan: cryptography.

Yeah, of course.

So there are pros and cons of
the, of the, basically, feature.

I mean, In order to execute something
on a remote quantum computer, you need

to either describe the entire processing
gate form, or you need to Describe all

of the mathematical operations that
you need to make on the qubits, right?

Yeah.

Yeah.

Okay.

What options are there to
obfuscate, those instructions?

Is there such

Harold: a thing?

Yeah.

That's, now we are getting really
like onto what what interests me as

a researcher is really like this is.

This ability that we have to
hide the computation and the data

from from the computer or from
the server that is executing it.

And if I want to put it very simply
in simple terms basically the way it

works, there are several ways to do
it, but one way of doing it, which is

easy to understand is to say that if
we want to conduct a quantum operation,

or if I want to instruct a server
to do a quantum operation on a qubit

that I send to the quantum computer,

I need in this case to agree with the
server on a common reference frame.

Okay, so it's basically an
orientation of the axis.

Okay, so if I want to even think
about quantum cryptography,

which is even maybe simpler.

If you execute the BB84 protocol,
you need to send qubits polarised

vertically, horizontally, or
on a diagonal basis, okay?

So if I do this, and I send, as one
of the parties, I send my qubit, and

I claim that this qubit is polarised
vertically I need to agree that

my vertical is the same vertical
as the one on the receiving party.

And everybody knows that it's a highly
non trivial fact, because if you put,

especially if you put your qubit in
a fiber, it's going to rotate, okay?

So you need first to actually um,
uh, calibrate your orientation of

axis between one party and the other.

If we have some quantum data and we send
it to a server to process it, We will

need to share a common reference frame.

Now, one way of hiding the
computation, one way of hiding

the data is quite simple.

What I'm going to do is that I'm
going to choose one reference frame

for myself, which will be secret.

Okay.

And then I'm going to actually
synchronize a relative reference frame.

With the server relative to
my own secret reference frame.

Okay, so what's going to happen is
that I'm going to send instruction to

the server in the relative reference
frame, it's going to correspond to

the operation that I want to perform
on my side on my secret reference

frame, but the server is just going
to see very random instructions,

because actually what I'm going to
do is that I'm going to change this

relative reference frame qubit by qubit.

Okay, so I'm sending, I'm agreeing with
the server for a reference frame, but

I'm keeping constantly changing it and
he doesn't know how I'm changing it.

Okay, and that's the way I'm hiding
everything, all the computation, all

the instructions and also the data.

So it's very simple.

In terms of physics it's much,
much more demanding if you really

want to build it as a hardware.

But the principle is simple.

And then from there, you can
actually do a lot of proofs and very

interesting proof because it will
give you security in an information

theoretical sense, which means like
really The best that you can hope for.

So that's one way of doing it.

There are other ways of doing it.

People are thinking about trying to
build things that would be similar

to enclaves in classical processes.

They would call it quantum enclaves.

Okay.

So to try to avoid sending qubits from
the client to the server, there are

people that say, okay, let's rely on
post quantum security uh, cryptography,

sorry and uh, build this concept
of enclave but on chip uh, through

the help of classical cryptography.

So that's basically like the three
main approaches, and each comes

with advantages and disadvantages.

Of course, there is no
silver bullet, unfortunately,

Dan: as is always the case yeah I
love the fact that you're describing.

I assume it's like changing the basis
state pretty much or the basis management

measurement for every single qubit,
which is sent across the network.

Now, can that also be done with sending?

Yeah.

Is there any way to obfuscate in
that way when you're sending the

instructions in classical information?

I guess there probably isn't, right?

No, because you...

Harold: I understand,

Dan: I think the way I understood it
was you were describing sending the

qubits across the network to then be.

To be received and then put onto the
computing processor and then perform the

processing and then return the results and
then you de encode based on your basis

state measurements on a per qubit basis.

Yeah.

But when it comes to executing quantum,
I mean, there's no way of doing that

currently with current quantum computers,
remote quantum computing because we're

just not there with with networking yet.

So.

Uh, Currently, anything that you execute
remotely has to be sent classically.

Is there a similar approach to
obfuscating what you want to execute

if you're sending it classically?

I would assume not, because
you have to send the...

Yeah.

Sorry.

Go ahead,

Harold: yeah.

Okay.

So let's go back to your first
assumption that says, okay.

Yeah.

In, in, in quantum networking,
we are not there yet.

Yes, that's true.

But at the same time we
are, we're working on it.

And um, so there, there is a, a very
large uh, European funded project

that is really tacking this question.

The idea is, is constructing like a
long range backbone across Europe.

And metro metropolitan networks connected
through a hub and within this this smaller

networks we are, I mean, very intensely
discussing with experimentalists to

try to co design a protocol that would
be suitable for very early networks.

Okay, so like it's more
like proof of concept.

But the idea is to have all the
ingredients of a full fledged protocol

working and scalable protocol to
be working on experimental nodes.

Okay so it's in the works.

Okay, it's not going to be like millions
of qubits sent around, but uh, but

it's really like putting everything in
place within the protocol so that if

you give me just more qubit and longer
coherence time, then I can perform just

the same protocol for a longer time,
which means like a bigger computation.

That's that's where we are right
now in building the networks.

Now coming back to really like,
can you do something classically?

Uh, well, Yes and no.

The very good advantage
in terms of overhead.

Of the first solution, which is like
sending qubits back and forth is

like, yeah, of course you need this
ability to send qubit back and forth.

But at the same time on the server
there is basically no space overhead.

Okay, maybe you are going to repeat
your computation a few times or

a few times or several times.

To get the result that you could
view it as a sort of, necessary

error mitigation in this.

Okay.

You can do this.

But security will not require you
more qubits on the server side.

That's one good point.

Because if you have like limited
machines, you don't want to actually

dedicate most of your computing
power to take care of security.

Because if you do this most of the
time, then what's, what you are

left with is a computation that...

You can do on a piece of
paper just by yourself.

Okay.

So if you have three qubits, they
are very well protected, but you

can't do anything with three qubits.

So that's one good advantage for the
solution of sending qubits back and forth.

If you have more powerful machines,
then what you can do is actually

have classical crypto come into help.

And basically what you are going
to do is having an encryption

of your preparation of states.

Being sent classically to the quantum
computer and because the quantum computer

cannot break these things encryption,
what you are really performing in

terms of actually quantum operations
will still remain understandable

from the point of view of the server.

Okay.

But of course, when I'm saying
this, it's like you still see

what the server is doing, right?

I mean, You can check and track back
all the instructions that you sent.

They are encrypted.

You don't know what it is for.

But you can still track them, which
means that if this qubit is going to

be secure, okay, if the aim of that
thought is to produce the same qubit

that you were sending across the network
it needs to be operation enough and

complex enough uh, quantum operation so
that you cannot simulate it classically.

So now comes into play the okay.

Where is the quantum
advantage in the story?

Uh, In the sense, like, when
do you estimate that you have?

A quantum operation that is complex
enough so that the classical computer

cannot break it or cannot simulate it.

And usually what you end up with
is an overhead in terms of space

in this time that say at the very
minimum will be like 100 times.

Okay, so for having one, one
protected qubit, you need to

have like 100 physical qubits or.

Yeah, 100 cubits unprotected.

But yeah, these needs to be qubits
that are very good quality, okay,

because if you can, if you start
adding noise to this well, then

it's going to be a bit complicated.

So it's actually 100 fault
tolerantly protected cubits.

give you one fault
tolerant and secure qubit.

Okay.

So it's quite an overhead.

And so right now, I think we need to
push in both directions and try to

simplify the protocols as much as we can.

Maybe instead of having 100 qubits uh,
overhead, we can have like, yeah, sure.

100 qubits.

Per qubit produced, but if you
produce them serially, maybe you

can recycle this overhead and, yeah.

So these are the kind of questions
that are very important to address

to try to simplify these protocols
and bring them to a regime where

they can actually be implemented.

Right now, these classical crypto
protocols are, most of them are.

Completely out of of reach
but yeah, doesn't mean that we

shouldn't do some effort to try to
simplify that as much as we can.

Dan: It's fascinating talking about
the need for additional qubits in

that scenario to secure the qubit.

But then you also need additional qubits
to create a fault tolerant physical qubit.

So a logical qubit, sorry.

Yeah, I mean, it just grows, doesn't it?

It grows and grows, and it's going to make
it uh, you know, as long as we're in the

NISQ era, it's going to be very difficult
to perform this type of operation.

Unless you're doing it on the fly, sending
the state of the Qubit across the network.

So, Yeah, that leads us on to networks.

What um, we could go in lots
of different areas here.

What research are you doing when
it comes to networks, or which

organizations are you working with?

What's your main focus when it comes to...

To networking.

You mentioned the European I don't
know if that was the Euro QCI that

you mentioned or something different.

Harold: Actually, I mentioned most, I
mean, the European project that we are

part of is the Quantum Internet Alliance.

And it's...

It's, yeah I think most of the
people doing uh, quantum networks

are part of this of this project.

It's really huge.

I think there are more than 40
partners companies and and academics.

And the idea there, I mean, what
we try to do is is represent,

let's say, the end user.

Okay, so we are the computer
scientists the theorists and we

try to say okay Here is a protocol.

What can you implement from this?

What kind of physical parameters can
you give us then we'll try to go back

and simulate that understand what will
be the performance of the protocol?

Basically, it's these kind of protocols
are I mean, it's it's very interesting

because when you are looking at
verification of quantum computation, the

model is the following you have a client.

You have a server.

The client is honest.

So he's doing everything like
honestly, perfectly following the

protocol and things like this.

And then you have the server and the
server can be arbitrarily malicious.

Okay.

And basically the server starts
or the malicious party starts.

Okay.

Really at the door of
the lab of the client.

Okay.

So as soon as something
leaves The lab of the client.

We are thinking that it's maliciously
controlled Okay, so even if you have

some noise the genuine noise that
happens we think okay, that might be

malicious Okay so it what happens is
that if you manage to certify in this

condition that the Computation has been
performed correctly In fact, you have

been also saying the noise, imagine
now that, that, okay, the malicious

party decided not to be malicious.

Okay.

But it's still noisy.

Okay.

But from my verification
perspective, I don't know this.

Okay.

I don't know that he's being
honest, but so I'm not changing

anything in my protocol.

But if I still verify that, that means
that the noise that has been happening

outside of the lab of the client, okay.

was not very strong because I was still
able to guarantee that the computation

was performed correctly, okay?

In spite of the noise,
I still have my result.

So in fact, these protocols
are surprisingly interesting

for, as a benchmark, okay?

Because in the end, if there is
no malicious party, what we do is

that we are benchmarking the noise.

So people doing experiments are very
happy with this kind of protocols

because it's like the ultimate benchmark.

Okay, because if I pass the
test, I can guarantee that their

experiment is running well.

And it's very rare that you have this.

Okay, because when you do an
experiment in the lab, you always

have assumptions and things like this.

Okay, and we are just providing a
methodology saying okay, I don't

want to know about your assumptions.

I don't care.

If you pass this test, Then I can
give you a cryptographic guarantee

that you've done the job properly.

So that's very nice.

And basically, we are working
with them to make sure that they

don't break the protocol as well.

Okay, because still the protocol
needs to be done in a certain way.

Okay, most of the time when you are doing
or running an experiment in the lab.

The client is here, maybe two meters away,
there is the server and maybe there is

like 50 kilometers of fiber in between
them, but they are still in the same lab.

So you don't want to make, you want to
make sure that there is no communication

that that happens between the client
and the server there in this situation.

So they need to close this,
this kind of loopholes.

And we need to make sure that by
processing the data and things like

this, they don't introduce problems
in the, in the protocol but, but,

but if you do things properly,
then it's a super nice benchmark.

And then from there, what we do in
fact is try to help the people from

the network assess the performance
with respect to this benchmark.

And we try to work.

In tandem with the various
hardware labs involved.

Okay, what can you do?

What can you improve?

Maybe they have devices that we didn't
think about that can be incorporated

in the protocol and just improve the
robustness of the protocol by itself.

Okay.

But then we need to change the proof uh,
to make sure that everything works again.

But we like to do this.

So it's okay.

Dan: Sounds fascinating.

What could you explain the
verification methodology?

For me, in terms of which level
it operates, is it a series of

steps which need to be followed?

Is it a series of very specific
tests and variables that need

to be captured and measured?

Harold: Yeah, it's very simple.

It's very simple.

Just before in the discussion, I convinced
you that it was not very complicated to

hide the computation and the data, right?

So by just changing, having this,
this relative reference frame that

that I'm using to communicate with
the server, but keeping my own private

reference frame secret and varying
this reference frame qubit by qubit.

Okay.

So let's build on top of this.

Okay.

So now I'm starting in a situation
where I'm able to delegate

my computation to the server.

And he doesn't know what I'm doing.

And now I want to verify
that he's not doing something

malicious to my computation.

Which means I want to have a
guarantee that he's following the

instructions that I'm sending to him.

The problem is that let's say I'm doing
machine learning I'm sending these

instructions to the server, and maybe
he's doing something else, and still,

the data are going to look okay to me.

Or they are maybe going to
solve most of my problem.

But the but the server has nonetheless
tampered with the actual real solution.

And what I'm ending up with is maybe
something that's not bad, but it's

not the optimal that I paid for.

Okay?

And I don't want to be in this situation.

The problem is like, if I'm actually
doing this computation on a quantum

computer, that's precisely because I
cannot do this computation on my own.

So I cannot check.

Okay.

But then if you are able to perform
computation in a blind way so that

the server doesn't know what you are
doing, maybe from times to times,

just ask him to do a computation
for which you know the result.

See because you delegate something
that is blind, it doesn't know.

Okay.

But it's a test.

And if he fails the test, you know
that he's doing something nasty with

your computation, and that's the idea.

It's very simple.

You just and then you just need to work
out the math and it's working nicely.

So basically, you do that several times.

And you do this.

And so what in the end, what we
do, we want to be a little bit more

technical is basically in these
blind computations, you can delegate

blindly full classes of computation.

So there you have a class of computation
that can be delegated blindly.

So every computation within this class
will look the same to the server.

And within this class, we know that there
is always a large portion of this of

these computations or big enough portion
of these computations that are Clifford

computations and Clifford computations
have the nice property of being

Super easily classically simulatable.

Okay, so you can simulate
that on a classical computer.

It takes like milliseconds.

Okay Even though you are using like very
large computations Okay, so you can do

this classical computation on your side
as a client you blind it You send it to

the server and you ask for the result
and then you compare what you got and

yeah, so So that's the way it works.

What really is important is...

is to actually prove that this
class of Clifford computation is

large enough to catch every possible
deviant behavior from the server.

Okay, but if you prove this, then
basically other and then you can

devise, like Which kind of pre for
the operation you want to take?

What is the best one?

What are the ones that you can
actually easily implement because

you have restrictions on the
devices and things like this.

And then you have like plenty of
questions that come after this.

But the principle is very simple.

Dan: I tell you, it's a fascinating
field that you're working in, right?

Because the networking at the moment
is still at the experimental stage, of

course, and we're already thinking about
ways to make these executions of quantum

instructions over the network private,
which I think is, it's a fascinating

field, and I'm sure what you're doing
will become very central to the way

quantum computers are used in the future.

I think I'm going to, I'm going to
wrap it there because it's been such

an amazing talk and I think we should
probably reconnect in a year or so

to get an update for how, how some of
these projects have been going and maybe

how you're thinking is is evolving,
but that was absolutely fantastic.

Thank you very much for
the discussion, Harold.

It was

Harold: a pleasure on my side.

Dan: Good.

Yes.

Same for me.

Okay.

Bye for now.

I'd like to take this moment to thank
you for listening to the podcast.

Quantum networking is such a broad domain
especially considering the breadth of

quantum physics and quantum computing all
as an undercurrent easily to get sucked

into So much is still in the research
realm which can make it really tough for

a curious IT guy to know where to start.

So hit subscribe or follow me on your
podcast platform and I'll do my best

to bring you more prevalent topics
in the world of quantum networking.

Spread the word.

It would really help us out.

Creators and Guests

Dan Holme
Host
Dan Holme
Quantum curious technologist and student. Industry and Consulting Partnerships at Cisco.
Harold Ollivier
Guest
Harold Ollivier
Quantum information theory is the most general framework to understand man made processes, such as quantum algorithms and cryptographic protocols, but also natural ones such as noise and emergence an objective classical world out of the quantum realm. That's why it's so appealing to me: a tunable mix of foundations and applications with beautiful mathematics.
Blind quantum computing. An interview with Harold Ollivier.
Broadcast by