{"id":8746,"date":"2025-03-26T16:52:43","date_gmt":"2025-03-26T21:52:43","guid":{"rendered":"https:\/\/scottaaronson.blog\/?p=8746"},"modified":"2025-03-26T16:52:43","modified_gmt":"2025-03-26T21:52:43","slug":"on-the-jpmc-quantinuum-certified-quantum-randomness-demo","status":"publish","type":"post","link":"https:\/\/scottaaronson.blog\/?p=8746","title":{"rendered":"On the JPMC\/Quantinuum certified quantum randomness demo"},"content":{"rendered":"\n<p>These days, any quantum computing post I write ought to begin with the disclaimer that the armies of Sauron are triumphing around the globe, this is the darkest time for humanity most of us have ever known, and nothing else matters by comparison. Certainly not quantum computing. Nevertheless stuff happens in quantum computing and it often brings me happiness to blog about it&#8212;certainly more happiness than doomscrolling or political arguments.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>So then: today JP Morgan Chase announced that, together with Quantinuum and DoE labs, they&#8217;ve experimentally demonstrated the protocol I proposed in 2018, and further developed in a <a href=\"https:\/\/arxiv.org\/abs\/2303.01625\">STOC&#8217;2023 paper with Shih-Han Hung<\/a>, for using current quantum supremacy experiments to generate certifiable random bits for use in cryptographic applications.  <a href=\"https:\/\/www.nature.com\/articles\/s41586-025-08737-1\">See here for our paper in <em>Nature<\/em><\/a>&#8212;the JPMC team was gracious enough to include me and Shih-Han as coauthors.<\/p>\n\n\n\n<p>Mirroring a conceptual split in the protocol itself, Quantinuum handled the quantum hardware part of my protocol, while JPMC handled the rest: modification of the protocol to make it suitable for trapped ions, as well as software to generate pseudorandom challenge circuits to send to the quantum computer over the Internet, then to verify the correctness of the quantum computer&#8217;s outputs (thereby ensuring, under reasonable complexity assumptions, that the outputs contained at least a certain amount of entropy), and finally to extract nearly uniform random bits from the outputs.  The experiment used Quantinuum&#8217;s 56-qubit trapped-ion quantum computer, which was given and took a couple seconds to respond to each challenge.  Verification of the outputs was done using the Frontier and Summit supercomputers.  The team estimates that about 70,000 certified random bits were generated over 18 hours, in such a way that, using the best currently-known attack, you&#8217;d need <em>at least<\/em> about four Frontier supercomputers working continuously to spoof the quantum computer&#8217;s outputs, and get the verifier to accept non-random bits.<\/p>\n\n\n\n<p>We should be clear that this gap, though impressive from the standpoint of demonstrating quantum supremacy with trapped ions, is not yet good enough for high-stakes cryptographic applications (more about that later).  Another important caveat is that the parameters of the experiment aren&#8217;t yet good enough for my and Shih-Han&#8217;s formal security reduction to give assurances: instead, for the moment one only has &#8220;practical security,&#8221; or security against a class of simplified yet realistic attackers.  I hope that future experiments will build on the JPMC\/Quantinuum achievement and remedy these issues.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>The story of this certified randomness protocol starts seven years ago, when I had lunch with <a href=\"https:\/\/orsattath.wordpress.com\/about\/\">Or Sattath<\/a> at a Japanese restaurant in Tel Aviv. Or told me that I needed to pay more attention to the then-recent <a href=\"https:\/\/arxiv.org\/abs\/1711.02276\">Quantum Lightning<\/a> paper by Mark Zhandry. I already know that paper is great, I said. You don&#8217;t know the half of it, Or replied. As one byproduct of what he&#8217;s doing, for example, Mark gives a way to measure quantum money states in order to get certified random bits&#8212;bits whose genuine randomness (<em>not<\/em> pseudorandomness) is certified by computational intractability, something that wouldn&#8217;t have been possible in a classical world.<\/p>\n\n\n\n<p>Well, why do you even need quantum money states for that? I asked. Why not just use, say, a quantum supremacy experiment based on Random Circuit Sampling, like the one Google is now planning to do (i.e., the experiment Google <a href=\"https:\/\/www.nature.com\/articles\/s41586-019-1666-5\"><em>would<\/em> do<\/a>, a year later after this conversation)? Then, the more I thought about that question, the more I liked the idea that these &#8220;useless&#8221; Random Circuit Sampling experiments would do something potentially useful <em>despite themselves<\/em>, generating certified entropy as just an inevitable byproduct of passing our benchmarks for sampling from certain classically-hard probability distributions.  Over the next couple weeks, I worked out some of the technical details of the security analysis (though not all!  it was a big job, and one that only got finished years later, when I brought Shih-Han to UT Austin as a postdoc and worked with him on it for a year).<\/p>\n\n\n\n<p>I emailed the Google team about the idea; they responded enthusiastically. I also got in touch with UT Austin&#8217;s intellectual property office to file a provisional patent, the only time I&#8217;ve done that my career. UT and I successfully licensed the patent to Google, though the license lapsed when Google&#8217;s priorities changed.  Meantime, a couple years ago, when I visited Quantinuum&#8217;s lab in Broomfield, Colorado, I learned that a JPMC-led collaboration toward an experimental demonstration of the protocol was then underway.  The protocol was well-suited to Quantinuum&#8217;s devices, particularly given their ability to apply two-qubit gates with all-to-all connectivity and fidelity approaching 99.9%.<\/p>\n\n\n\n<p>I should mention that, in the intervening years, others had <em>also<\/em> studied the use of quantum computers to generate cryptographically certified randomness; indeed it became a whole subarea of quantum computing.  See especially the <a href=\"https:\/\/arxiv.org\/abs\/1804.00640\">seminal work<\/a> of Brakerski, Christiano, Mahadev, Vazirani, and Vidick, which gave a certified randomness protocol that (unlike mine) relies only on standard cryptographic assumptions and allows verification in classical polynomial time.  The &#8220;only&#8221; downside is that implementing their protocol securely seems to require a full fault-tolerant quantum computer (capable of things like Shor&#8217;s algorithm), rather than current noisy devices with 50-100 qubits.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>For the rest of this post, I&#8217;ll share a little FAQ, adapted from my answers to a journalist&#8217;s questions.  Happy to answer additional questions in the comments.  <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To what extent is this a world-first?<\/li>\n<\/ul>\n<\/blockquote>\n\n\n\n<p>Well, it\u2019s the first experimental demonstration of a protocol to generate cryptographically certified&nbsp;random&nbsp;bits with the use of a quantum computer.<\/p>\n\n\n\n<p>To remove any misunderstanding: if you\u2019re just talking about the use of quantum phenomena to generate\u00a0random\u00a0bits, without <em>certifying<\/em> the randomness of those bits to a faraway skeptic, then that\u2019s been easy to do for generations (just stick a Geiger counter next to some radioactive material!).  The new part, the part that requires a quantum computer, is all about the certification.<\/p>\n\n\n\n<p>Also: if you\u2019re talking about the use of separated, entangled parties to generate certified\u00a0random\u00a0bits by violating the Bell inequality (see eg <a href=\"https:\/\/arxiv.org\/abs\/1111.6054\">here<\/a>) \u2014 that approach does give certification, but the downside is that you need to believe that the two parties really are unable to communicate with each other, something that you couldn\u2019t certify in practice over the Internet.\u00a0 A quantum-computer-based protocol like mine, by contrast, requires just a single quantum device.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Why is the certification element important?<\/li>\n<\/ul>\n<\/blockquote>\n\n\n\n<p>In any cryptographic application where you need to distribute&nbsp;random&nbsp;bits over the Internet, the fundamental question is, why should everyone trust that these bits are truly&nbsp;random, rather than being backdoored by an adversary?<\/p>\n\n\n\n<p>This isn\u2019t so easy to solve.&nbsp; If you consider any classical method for generating&nbsp;random&nbsp;bits, an adversary could substitute a cryptographic pseudorandom generator without anyone being the wiser.<\/p>\n\n\n\n<p>The key insight behind the quantum protocol is that a quantum computer can solve certain problems efficiently, but <em>only<\/em> (it\u2019s conjectured, and proven under plausible assumptions) by sampling an answer randomly \u2014 thereby giving you certified\u00a0randomness, once you verify that the quantum computer really has solved the problem in question.\u00a0 Unlike with a classical computer, there\u2019s no way to substitute a pseudorandom generator, since\u00a0randomness\u00a0is just an inherent part of a quantum computer\u2019s operation \u2014 specifically, when the entangled superposition state randomly collapses on measurement.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>What are the applications and possible uses?<\/li>\n<\/ul>\n<\/blockquote>\n\n\n\n<p>One potential application is to proof-of-stake cryptocurrencies, like Ethereum.&nbsp; These cryptocurrencies are vastly more energy-efficient than \u201cproof-of-work\u201d cryptocurrencies (like Bitcoin), but they require lotteries to be run constantly to decide which currency holder gets to add the next block to the blockchain (and get paid for it).&nbsp; Billions of dollars are riding on these lotteries being fair.<\/p>\n\n\n\n<p>Other potential applications are to zero-knowledge protocols, lotteries and online gambling, and deciding which precincts to audit in elections.  <a href=\"https:\/\/arxiv.org\/abs\/2503.19759\">See here<\/a> for a nice perspective article that JPMC put together discussing these and other potential applications.<\/p>\n\n\n\n<p>Having said all this, a <strong>major problem<\/strong> right now is that verifying the results using a classical computer is extremely expensive \u2014 indeed, basically as expensive as spoofing the results would be.\u00a0 This problem, and other problems related to verification (eg \u201cwhy should everyone else trust the verifier?\u201d), are the reasons why most people will probably pass on this solution in the near future, and generate\u00a0random\u00a0bits in simpler, non-quantum-computational ways.<\/p>\n\n\n\n<p>We do know, from e.g. Brakerski et al.&#8217;s work, that the problem of making the verification fast is solvable <em>with sufficient advancements in quantum computing hardware<\/em>.\u00a0 Even without hardware advancements, it might also be solvable with new theoretical ideas \u2014 one of my favorite research directions.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Is this is an early win for quantum computing?<\/li>\n<\/ul>\n<\/blockquote>\n\n\n\n<p>It\u2019s not directly an advancement in quantum computing hardware, but yes, it\u2019s a very nice <em>demonstration<\/em> of such advancements \u2014 of something that\u2019s possible today but wouldn\u2019t have been possible just a few short years ago.\u00a0 It\u2019s a step toward using current, non-error-corrected quantum computers for a practical application that\u2019s not itself about quantum mechanics but that really does inherently require quantum computers.<\/p>\n\n\n\n<p>Of course it\u2019s personally gratifying to see something I developed get experimentally realized after seven years.\u00a0 Huge congratulations to the teams at JP Morgan Chase and Quantinuum, and thanks to them for the hard work they put into this.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Unrelated Announcement:<\/mark><\/strong> <a href=\"https:\/\/www.youtube.com\/watch?v=WB9bvr_Nf4w\">See here<\/a> for a podcast about quantum computing that I recorded with, of all organizations, the FBI.  As I told the gentlemen who interviewed me, I&#8217;m glad the FBI still <em>exists<\/em>, let alone its podcast!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>These days, any quantum computing post I write ought to begin with the disclaimer that the armies of Sauron are triumphing around the globe, this is the darkest time for humanity most of us have ever known, and nothing else matters by comparison. Certainly not quantum computing. Nevertheless stuff happens in quantum computing and it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false},"categories":[31,5,4],"tags":[],"class_list":["post-8746","post","type-post","status-publish","format-standard","hentry","category-announcements","category-complexity","category-quantum"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=\/wp\/v2\/posts\/8746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8746"}],"version-history":[{"count":3,"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=\/wp\/v2\/posts\/8746\/revisions"}],"predecessor-version":[{"id":8753,"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=\/wp\/v2\/posts\/8746\/revisions\/8753"}],"wp:attachment":[{"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scottaaronson.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}