{"id":"https://openalex.org/W7117146614","doi":"https://doi.org/10.1145/3733817.3762698","title":"Quantum Opacity, Classical Clarity: A Hybrid Approach to Quantum Circuit Obfuscation","display_name":"Quantum Opacity, Classical Clarity: A Hybrid Approach to Quantum Circuit Obfuscation","publication_year":2025,"publication_date":"2025-10-13","ids":{"openalex":"https://openalex.org/W7117146614","doi":"https://doi.org/10.1145/3733817.3762698"},"language":null,"primary_location":{"id":"doi:10.1145/3733817.3762698","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733817.3762698","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733817.3762698?download=true","source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3733817.3762698?download=true","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121182263","display_name":"Amal Raj","orcid":null},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]},{"id":"https://openalex.org/I4210091207","display_name":"Singapore Institute of Manufacturing Technology","ror":"https://ror.org/00f44np30","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I4210091207","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Amal Raj","raw_affiliation_strings":["Singapore Institute of Technology, Punggol, Singapore"],"raw_orcid":"https://orcid.org/0009-0001-4025-1045","affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology, Punggol, Singapore","institution_ids":["https://openalex.org/I168639165","https://openalex.org/I4210091207"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021323754","display_name":"Vivek Balachandran","orcid":"https://orcid.org/0000-0003-4847-7150"},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]},{"id":"https://openalex.org/I4210091207","display_name":"Singapore Institute of Manufacturing Technology","ror":"https://ror.org/00f44np30","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I4210091207","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vivek Balachandran","raw_affiliation_strings":["Singapore Institute of Technology, Punggol, Singapore"],"raw_orcid":"https://orcid.org/0000-0003-4847-7150","affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology, Punggol, Singapore","institution_ids":["https://openalex.org/I168639165","https://openalex.org/I4210091207"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5121182263"],"corresponding_institution_ids":["https://openalex.org/I168639165","https://openalex.org/I4210091207"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.79938966,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.8687000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.8687000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.05299999937415123,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.008700000122189522,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-circuit","display_name":"Quantum circuit","score":0.642300009727478},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.6176000237464905},{"id":"https://openalex.org/keywords/quantum-gate","display_name":"Quantum gate","score":0.5802000164985657},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.548799991607666},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.5392000079154968},{"id":"https://openalex.org/keywords/quantum-algorithm","display_name":"Quantum algorithm","score":0.515999972820282},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4020000100135803},{"id":"https://openalex.org/keywords/qubit","display_name":"Qubit","score":0.3970000147819519}],"concepts":[{"id":"https://openalex.org/C124148022","wikidata":"https://www.wikidata.org/wiki/Q2122210","display_name":"Quantum circuit","level":5,"score":0.642300009727478},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6291999816894531},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.6176000237464905},{"id":"https://openalex.org/C58849907","wikidata":"https://www.wikidata.org/wiki/Q2118982","display_name":"Quantum gate","level":4,"score":0.5802000164985657},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.548799991607666},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.5392000079154968},{"id":"https://openalex.org/C137019171","wikidata":"https://www.wikidata.org/wiki/Q2623817","display_name":"Quantum algorithm","level":3,"score":0.515999972820282},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41499999165534973},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4020000100135803},{"id":"https://openalex.org/C203087015","wikidata":"https://www.wikidata.org/wiki/Q378201","display_name":"Qubit","level":3,"score":0.3970000147819519},{"id":"https://openalex.org/C51003876","wikidata":"https://www.wikidata.org/wiki/Q1536431","display_name":"Quantum error correction","level":4,"score":0.37389999628067017},{"id":"https://openalex.org/C190463098","wikidata":"https://www.wikidata.org/wiki/Q2081419","display_name":"Quantum technology","level":4,"score":0.3375999927520752},{"id":"https://openalex.org/C186468114","wikidata":"https://www.wikidata.org/wiki/Q836478","display_name":"Quantum network","level":4,"score":0.33410000801086426},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33149999380111694},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.3276999890804291},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.304500013589859},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.30239999294281006},{"id":"https://openalex.org/C11255438","wikidata":"https://www.wikidata.org/wiki/Q7269085","display_name":"Quantum process","level":4,"score":0.2896000146865845},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C134146338","wikidata":"https://www.wikidata.org/wiki/Q1815901","display_name":"Electronic circuit","level":2,"score":0.2712000012397766},{"id":"https://openalex.org/C190474826","wikidata":"https://www.wikidata.org/wiki/Q2495111","display_name":"Open quantum system","level":3,"score":0.2687999904155731},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.2662000060081482},{"id":"https://openalex.org/C62641251","wikidata":"https://www.wikidata.org/wiki/Q7269097","display_name":"Quantum sort","level":5,"score":0.2660999894142151},{"id":"https://openalex.org/C59500034","wikidata":"https://www.wikidata.org/wiki/Q1464944","display_name":"Quantum Fourier transform","level":5,"score":0.259799987077713}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3733817.3762698","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733817.3762698","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733817.3762698?download=true","source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3733817.3762698","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733817.3762698","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733817.3762698?download=true","source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7984707951545715,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7117146614.pdf","grobid_xml":"https://content.openalex.org/works/W7117146614.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1483489440","https://openalex.org/W1986167225","https://openalex.org/W2084652510","https://openalex.org/W2112289862","https://openalex.org/W2781738013","https://openalex.org/W2942962312","https://openalex.org/W2998467804","https://openalex.org/W3013348036","https://openalex.org/W3023478445","https://openalex.org/W3111189158","https://openalex.org/W3140586337","https://openalex.org/W3154842929","https://openalex.org/W3163669402","https://openalex.org/W3177454279","https://openalex.org/W3194003300","https://openalex.org/W4285345508","https://openalex.org/W4313484002","https://openalex.org/W4384037001","https://openalex.org/W4405183524","https://openalex.org/W4407722127","https://openalex.org/W4410887375"],"related_works":[],"abstract_inverted_index":{"Quantum":[0,23],"computing":[1],"leverages":[2],"quantum":[3,17,45,50,84,106,154],"mechanics":[4],"to":[5,53],"achieve":[6],"computational":[7],"advantages":[8],"over":[9],"classical":[10,68,97],"hardware,":[11],"but":[12],"the":[13,20,58,73,101,151],"use":[14],"of":[15,28,129,153],"third-party":[16],"compilers":[18],"in":[19,157],"Noisy":[21],"Intermediate-Scale":[22],"(NISQ)":[24],"era":[25],"introduces":[26],"risks":[27],"intellectual":[29],"property":[30],"(IP)":[31],"exposure.":[32],"We":[33,99],"address":[34],"this":[35],"by":[36,47],"proposing":[37],"a":[38,66,145],"novel":[39],"obfuscation":[40,94],"technique":[41,102],"that":[42,80,141],"protects":[43],"proprietary":[44],"circuits":[46],"inserting":[48],"additional":[49],"gates":[51,56],"prior":[52,78],"compilation.":[54],"These":[55],"corrupt":[57],"measurement":[59],"outcomes,":[60],"which":[61],"are":[62],"later":[63],"corrected":[64],"through":[65],"lightweight":[67],"post-processing":[69],"step":[70],"based":[71],"on":[72,82],"inserted":[74],"gate":[75],"structure.":[76],"Unlike":[77],"methods":[79],"rely":[81],"complex":[83],"reversals,":[85],"barriers,":[86],"or":[87],"physical-to-virtual":[88],"qubit":[89],"mapping,":[90],"our":[91,142],"approach":[92],"achieves":[93],"using":[95],"compiler-agnostic":[96],"correction.":[98],"evaluate":[100],"across":[103],"five":[104],"benchmark":[105],"algorithms\u2014Shor\u2019s,":[107],"QAOA,":[108],"Bernstein-Vazirani,":[109],"Grover\u2019s,":[110],"and":[111,125,136,147],"HHL\u2014using":[112],"IBM\u2019s":[113],"Qiskit":[114],"framework.":[115],"The":[116],"results":[117],"demonstrate":[118],"high":[119],"Total":[120],"Variation":[121],"Distance":[122],"(above":[123],"0.5)":[124],"consistently":[126],"negative":[127],"Degree":[128],"Functional":[130],"Corruption":[131],"(DFC),":[132],"confirming":[133],"both":[134],"statistical":[135],"functional":[137],"obfuscation.":[138],"This":[139],"shows":[140],"method":[143],"is":[144],"practical":[146],"effective":[148],"solution":[149],"for":[150],"security":[152],"circuit":[155],"designs":[156],"untrusted":[158],"compilation":[159],"flows.":[160]},"counts_by_year":[],"updated_date":"2026-03-08T06:56:09.383167","created_date":"2025-12-24T00:00:00"}
