Quantum computers clear hurdle with program that identifies ‘leaking’ code
Quantum computers clear hurdle with program that identifies ‘leaking’ code

Quantum computing harnesses the unusual properties of quantum physics to process information in a different way from conventional computers.
Just like conventional computing, quantum computers use combinations of 0s and 1s to encode information, but they can also exploit quantum states that are both 0 and 1 at the same time.
However, the hardware that encodes that information may sometimes encode it incorrectly in another state, a problem known as ‘leakage’.
The researchers’ new quantum computer program is able to detect the presence of ‘leakage’, where information being processed by a quantum computer escapes from the states of 0 and 1.
Even a minuscule leakage accumulating over many millions of hardware components can cause miscalculations and potentially serious errors, nullifying any quantum advantage over conventional computers.
As a part of a much wider set of errors, leakage is playing its part in preventing quantum computers from being scaled up towards commercial and industrial application.
Armed with the knowledge of how much quantum leakage is occurring, computer engineers will be better able to build systems that mitigate against it and programmers can develop new error-correction techniques to take account of it.
Dr Animesh Datta, Associate Professor of Physics, said: “Commercial interest in quantum computing is growing, so we wanted to ask how we can say for certain that these machines are doing what they are supposed to do.
“Quantum computers are ideally made of qubits, but as it turns out in real devices some of the time they are not qubits at all – but in fact are qutrits (three-state) or ququarts (four-state systems). Such a problem can corrupt every subsequent step of your computing operation.
“Most quantum computing hardware platforms suffer from this issue – even conventional computer drives experience magnetic leakage, for example. We need quantum computer engineers to reduce leakage as much as possible through design, but we also need to allow quantum computer users to perform simple diagnostic tests for it.
“If quantum computers are to enter common usage, it’s important that a user with no idea of how a quantum computer works can check that it is functioning correctly without requiring technical knowledge, or if they are accessing that computer remotely.”
The researchers applied their method using the IBM Q Experience quantum devices, through IBM’s publicly accessible cloud service.
They used a technique called dimension witnessing: by repeatedly applying the same operation on the IBM Q platform, they obtained a dataset of results that could not be explained by a single quantum bit, and only by a more complicated, higher dimensional quantum system. They have calculated that the probability of this conclusion arising from mere chance is less than 0.05 per cent.
While conventional computers use binary digits to encode information in transistors, quantum computers use subatomic particles or superconducting circuits known as transmons to encode that information as a qubit.
The University of Warwick’s Dr George Knee said: “It is quite something to be able to make this conclusion at a distance of several thousand miles, with very limited access to the IBM chip itself. Although our program only made use of the permitted ‘single qubit’ instructions, the dimension witnessing approach was able to show that unwanted states were being accessed in the transmon circuit components.
“I see this as a win for any user who wants to investigate the advertised properties of a quantum machine without the need to refer to hardware-specific details.”
In December Italian researchers demonstrated how to beam quantum communications between a satellite and an Earth-based ground station.

Quantum computing harnesses the unusual properties of quantum physics to process information in a different way from conventional computers.
Just like conventional computing, quantum computers use combinations of 0s and 1s to encode information, but they can also exploit quantum states that are both 0 and 1 at the same time.
However, the hardware that encodes that information may sometimes encode it incorrectly in another state, a problem known as ‘leakage’.
The researchers’ new quantum computer program is able to detect the presence of ‘leakage’, where information being processed by a quantum computer escapes from the states of 0 and 1.
Even a minuscule leakage accumulating over many millions of hardware components can cause miscalculations and potentially serious errors, nullifying any quantum advantage over conventional computers.
As a part of a much wider set of errors, leakage is playing its part in preventing quantum computers from being scaled up towards commercial and industrial application.
Armed with the knowledge of how much quantum leakage is occurring, computer engineers will be better able to build systems that mitigate against it and programmers can develop new error-correction techniques to take account of it.
Dr Animesh Datta, Associate Professor of Physics, said: “Commercial interest in quantum computing is growing, so we wanted to ask how we can say for certain that these machines are doing what they are supposed to do.
“Quantum computers are ideally made of qubits, but as it turns out in real devices some of the time they are not qubits at all – but in fact are qutrits (three-state) or ququarts (four-state systems). Such a problem can corrupt every subsequent step of your computing operation.
“Most quantum computing hardware platforms suffer from this issue – even conventional computer drives experience magnetic leakage, for example. We need quantum computer engineers to reduce leakage as much as possible through design, but we also need to allow quantum computer users to perform simple diagnostic tests for it.
“If quantum computers are to enter common usage, it’s important that a user with no idea of how a quantum computer works can check that it is functioning correctly without requiring technical knowledge, or if they are accessing that computer remotely.”
The researchers applied their method using the IBM Q Experience quantum devices, through IBM’s publicly accessible cloud service.
They used a technique called dimension witnessing: by repeatedly applying the same operation on the IBM Q platform, they obtained a dataset of results that could not be explained by a single quantum bit, and only by a more complicated, higher dimensional quantum system. They have calculated that the probability of this conclusion arising from mere chance is less than 0.05 per cent.
While conventional computers use binary digits to encode information in transistors, quantum computers use subatomic particles or superconducting circuits known as transmons to encode that information as a qubit.
The University of Warwick’s Dr George Knee said: “It is quite something to be able to make this conclusion at a distance of several thousand miles, with very limited access to the IBM chip itself. Although our program only made use of the permitted ‘single qubit’ instructions, the dimension witnessing approach was able to show that unwanted states were being accessed in the transmon circuit components.
“I see this as a win for any user who wants to investigate the advertised properties of a quantum machine without the need to refer to hardware-specific details.”
In December Italian researchers demonstrated how to beam quantum communications between a satellite and an Earth-based ground station.
Jack Loughranhttps://eandt.theiet.org/rss
https://eandt.theiet.org/content/articles/2019/03/quantum-computers-clear-hurdle-with-program-that-identifies-leaking-code/
Powered by WPeMatico