并非四月愚人节的量子计算重磅消息
Quantum computing bombshells that are not April Fools

原始链接: https://scottaaronson.blog/?p=9665

量子计算(QC)的最新突破正在加速潜在密码漏洞的时间表。加州理工学院的研究人员展示了更高效的量子纠错技术,可能降低了复杂计算所需的量子比特数量——估计仅需25,000个量子比特就能破解当前系统,低于之前的数百万。与此同时,谷歌实现了Shor算法的低开销实现,能够破解256位椭圆曲线密码学。 值得注意的是,谷歌以密码学零知识证明的形式发布了他们的研究结果,避免直接泄露电路细节以防止立即被利用。专家认为这推动了采用抗量子密码学的紧迫性。虽然这些进展并未改变QC的基本原理,但它们显著影响了时间表,可能使比特币签名等系统比预期更早受到威胁。作者将其比作早期的核研究,但网络安全专业人士提倡公开出版,以促进对安全系统进行必要的升级。

## 量子计算发展与行业现状 (Hacker News 讨论总结) 一篇博文引发的 Hacker News 讨论强调了量子计算的近期进展和当前局限性。虽然正在取得突破——特别是针对错误纠正的新方法,可能减少执行诸如因式分解等任务所需的量子比特数量——但该行业仍然处于早期研究阶段。 多位具有直接行业经验的评论员强调,尽管存在炒作,但实际应用仍然遥远。一位工程师分享了 PyCon 演讲和电子书等资源,详细介绍了量子软件开发的现状。虽然一些公司正在寻求 IPO(通常通过 SPAC),但盈利能力尚未出现,这类似于太空任务等大型科学项目。 目前的量子计算机主要由研究机构和 HPC 中心购买用于实验。通过 IBM Quantum 等平台租用访问权限是可行的,但受到量子比特质量和相干时间限制。该讨论还涉及比特币对未来量子攻击的脆弱性以及过渡到后量子密码学的挑战,以及对一些拟议解决方案的可行性的怀疑。 最终,共识倾向于持续的渐进式进展,突破可能来自量子比特纠缠和网络技术的改进,而不是简单地增加量子比特数量。
相关文章

原文

For those of you who haven’t seen, there were actually two “bombshell” QC announcements this week. One, from Caltech, including friend-of-the-blog John Preskill, showed how to do quantum fault-tolerance with lower overhead than was previously known, by using high-rate codes, which could work for example in neutral-atom architectures (or possibly other architectures that allow nonlocal operations, like trapped ions). The second bombshell, from Google, gave a lower-overhead implementation of Shor’s algorithm to break 256-bit elliptic curve cryptography.

Notably, out of an abudance of caution, the Google team chose to “publish” its result via a cryptographic zero-knowledge proof that their circuit exists (so, without revealing the details to attackers). This is the first time I’ve ever seen a new mathematical result actually announced that way, although I understand that there’s precedent in the 1500’s, when mathematicians would (for example) prove their ability to solve quartic equations by challenging their rivals to duels. I’m not sure how much it will actually help, as once other groups know that a smaller circuit exists, it might be only a short time until they’re able to find it as well.

Neither of these results change the basic principles of QC that we’ve known for decades, but they do change the numbers.

When you put both of them together, Bitcoin signatures for example certainly look vulnerable to quantum attack earlier than was previously known!  In particular, the Caltech group estimates that a mere 25,000 physical qubits might suffice for this, where a year ago the best estimates were in the millions. How much time will this save — maybe a year?  Subtracting, of course, off a number of years that no one knows.

In any case, these results provide an even stronger impetus for people to upgrade now to quantum-resistant cryptography.  They—meaning you, if relevant—should really get on that!

When I got an early heads-up about these results—especially the Google team’s choice to “publish” via a zero-knowledge proof—I thought of Frisch and Peierls, calculating how much U-235 was needed for a chain reaction in 1940, but not publishing it, even though the latest results on nuclear fission had been openly published just the year prior. Will we, in quantum computing, also soon cross that threshold? But I got strong pushback on that analogy from the cryptography and cybersecurity people who I most respect. They said: we have decades of experience with this, and the answer is that you publish. And, they said, if publishing causes people still using quantum-vulnerable systems to crap their pants … well, maybe that’s what needs to happen right now.

Naturally, journalists have been hounding me for comments, though it was the worst possible week, when I needed to host like four separate visitors in Austin. I hope this post helps! Please feel free to ask questions or post further details in the comments.

And now, with no time for this blog post to leaven and rise, I need to go home for my family’s Seder. Happy Passover!

联系我们 contact @ memedata.com