Skip to main content

ORIGINAL RESEARCH article

Front. Comput. Sci.

Sec. Theoretical Computer Science

Volume 7 - 2025 | doi: 10.3389/fcomp.2025.1521059

This article is part of the Research Topic Realizing Quantum Utility: Grand Challenges of Secure & Trustworthy Quantum Computing View all 3 articles

Trusted Execution Environments for Quantum Computers

Provisionally accepted
Theodoros Trochatos Theodoros Trochatos *Chuanqi Xu Chuanqi Xu Sanjay Deshpande Sanjay Deshpande Yao Lu Yao Lu Yongshan Ding Yongshan Ding Jakub Szefer Jakub Szefer
  • Yale University, New Haven, United States

The final, formatted version of the article will be published soon.

    The cloud-based environments in which today's and future quantum computers will operate, raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both. Without dedicated security protections, quantum circuits submitted to cloud-based quantum computer providers could be accessed by the cloud provider, or malicious insiders working in the cloud provider's data centers. Further, data embedded in these circuits can likewise be accessed as it is encoded using quantum gates inside the circuit. This work presents various hardware and architecture modifications that could be deployed in today's quantum computers, based on superconducting qubits, to protect both the code and data from potentially untrusted quantum computer providers or malicious insiders. Motivated by existing Trusted Execution Environments (TEEs) in classical computers, this work introduces the notion of Quantum Trusted Execution Environments (QTEEs) which leverage trusted hardware to hide or obfuscate quantum circuits executing on a remote, cloud-based quantum computer. This work presents multiple, different approaches to design of QTEEs and considers both hardware and architecture, as well as system software and operating system support necessary for realization of QTEEs. Overall, this work presents three hardware architectures, QC-TEE, SoteriaQ, and CASQUE, that have been designed to protect users' circuits and data from potential threats originating from both malicious quantum computer cloud providers or insider attackers. This work further outlines a roadmap for other possible QTEEs that can be developed in the future, to account for different threat models, or to support different types of quantum computer architectures.

    Keywords: Quantum computing, Trusted Execution Environments, Hardware security, Confidentiality, obfuscadtion

    Received: 01 Nov 2024; Accepted: 25 Mar 2025.

    Copyright: © 2025 Trochatos, Xu, Deshpande, Lu, Ding and Szefer. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Theodoros Trochatos, Yale University, New Haven, United States

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

    Research integrity at Frontiers

    Man ultramarathon runner in the mountains he trains at sunset

    95% of researchers rate our articles as excellent or good

    Learn more about the work of our research integrity team to safeguard the quality of each article we publish.


    Find out more