{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:15:00Z","timestamp":1775880900940,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"5s","license":[{"start":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T00:00:00Z","timestamp":1570406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2019,10,31]]},"abstract":"<jats:p>The research community expects that quantum computers will give economical results for particular problems on which the classical computers break down. Examples include factoring of large numbers, searching in a big database, or simulating chemical reactions to design new drugs. Attempts are ongoing to build up a practical quantum computer. Users (clients) can implement quantum circuits to run on these quantum computers. However, before running the quantum circuit on the quantum computer, the users (clients) should compile, optimize, decompose, and technology map the quantum circuit. In the current embodiment, the resulting quantum circuit runs on a remote and untrusted quantum computer server -- introducing security risks. This study explores the risk of outsourcing the quantum circuit to the quantum computer by focusing on quantum oracles. Quantum oracles are pivotal building blocks and require specialized expertise and means to design. Hence, the designer may protect this proprietary quantum oracle intellectual property (IP) and hide his\/her private information. We investigate how to manage that on a quantum computer server using the IBM project QX quantum computer and Qiskit tools as an exemplar.<\/jats:p>","DOI":"10.1145\/3358184","type":"journal-article","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T13:13:05Z","timestamp":1570713185000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Locking the Design of Building Blocks for Quantum Circuits"],"prefix":"10.1145","volume":"18","author":[{"given":"Samah Mohamed","family":"Saeed","sequence":"first","affiliation":[{"name":"City College of New York, City University of New York, New York, USA"}]},{"given":"Robert","family":"Wille","sequence":"additional","affiliation":[{"name":"Johannes Kepler University, Linz, Austria"}]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[{"name":"New York University, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,10,7]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"J. A. Smolin A. W. Cross L. S. Bishop and J. M. Gambetta. 2017. Open quantum assembly language. CoRR arXiv:1707.03429v2 (2017).  J. A. Smolin A. W. Cross L. S. Bishop and J. M. Gambetta. 2017. Open quantum assembly language. CoRR arXiv:1707.03429v2 (2017)."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00084-3"},{"key":"e_1_2_1_3_1","volume-title":"Quantum computers ready to leap out of the lab","author":"Castelvecchi Davide","year":"2017","unstructured":"Davide Castelvecchi . 2017. Quantum computers ready to leap out of the lab in 2017 . Nature 541 (01 2017), 9--10. DOI:https:\/\/doi.org\/10.1038\/541009a Davide Castelvecchi. 2017. Quantum computers ready to leap out of the lab in 2017. Nature 541 (01 2017), 9--10. DOI:https:\/\/doi.org\/10.1038\/541009a"},{"key":"e_1_2_1_4_1","first-page":"6","article-title":"Secure assisted quantum computation. Quantum Info","volume":"5","author":"Childs Andrew M.","year":"2005","unstructured":"Andrew M. Childs . 2005 . Secure assisted quantum computation. Quantum Info . Comput. 5 , 6 (Sept. 2005), 456--466. Andrew M. Childs. 2005. Secure assisted quantum computation. Quantum Info. Comput. 5, 6 (Sept. 2005), 456--466.","journal-title":"Comput."},{"key":"e_1_2_1_5_1","first-page":"2823315","article-title":"On the difficulty of inserting trojans in reversible computing architectures","volume":"2018","author":"Cui X.","year":"2018","unstructured":"X. Cui , S. M. Saeed , A. Zulehner , R. Wille , K. Wu , R. Drechsler , and R. Karri . 2018 . On the difficulty of inserting trojans in reversible computing architectures . IEEE Transactions on Emerging Topics in Computing (2018), 1--1. DOI:https:\/\/doi.org\/10.1109\/TETC. 2018 . 2823315 X. Cui, S. M. Saeed, A. Zulehner, R. Wille, K. Wu, R. Drechsler, and R. Karri. 2018. On the difficulty of inserting trojans in reversible computing architectures. IEEE Transactions on Emerging Topics in Computing (2018), 1--1. DOI:https:\/\/doi.org\/10.1109\/TETC.2018.2823315","journal-title":"DOI:https:\/\/doi.org\/10.1109\/TETC."},{"key":"e_1_2_1_6_1","volume-title":"International Symposium on Multiple-Valued Logic. 14--19","author":"Deb A.","year":"2015","unstructured":"A. Deb , R. Wille , R. Drechsler , and D. K. Das . 2015. An efficient reduction of common control lines for reversible circuit optimization . In International Symposium on Multiple-Valued Logic. 14--19 . DOI:https:\/\/doi.org\/10.1109\/ISMVL. 2015 .26 A. Deb, R. Wille, R. Drechsler, and D. K. Das. 2015. An efficient reduction of common control lines for reversible circuit optimization. In International Symposium on Multiple-Valued Logic. 14--19. DOI:https:\/\/doi.org\/10.1109\/ISMVL.2015.26"},{"key":"e_1_2_1_7_1","volume-title":"2011 41st IEEE International Symposium on Multiple-Valued Logic. 78--85","author":"Drechsler R.","unstructured":"R. Drechsler and R. Wille . 2011. From truth tables to programming languages: Progress in the design of reversible circuits . In 2011 41st IEEE International Symposium on Multiple-Valued Logic. 78--85 . R. Drechsler and R. Wille. 2011. From truth tables to programming languages: Progress in the design of reversible circuits. In 2011 41st IEEE International Symposium on Multiple-Valued Logic. 78--85."},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"K. Fazel M. A. Thornton and J. E. Rice. 2007. ESOP-based toffoli gate cascade generation. In IEEE PacRim. 206 --209.  K. Fazel M. A. Thornton and J. E. Rice. 2007. ESOP-based toffoli gate cascade generation. In IEEE PacRim. 206 --209.","DOI":"10.1109\/PACRIM.2007.4313212"},{"key":"e_1_2_1_9_1","volume-title":"Private quantum computation: An introduction to blind quantum computing and related protocols. CoRR abs\/1611.10107","author":"Fitzsimons Joseph F.","year":"2016","unstructured":"Joseph F. Fitzsimons . 2016. Private quantum computation: An introduction to blind quantum computing and related protocols. CoRR abs\/1611.10107 ( 2016 ). arxiv:1611.10107 http:\/\/arxiv.org\/abs\/1611.10107. Joseph F. Fitzsimons. 2016. Private quantum computation: An introduction to blind quantum computing and related protocols. CoRR abs\/1611.10107 (2016). arxiv:1611.10107 http:\/\/arxiv.org\/abs\/1611.10107."},{"key":"e_1_2_1_10_1","volume-title":"International Conference on Computing Frontiers (CF\u201916)","author":"Fu X.","unstructured":"X. Fu , L. Riesebos , L. Lao , C. G. Almudever , F. Sebastiano , R. Versluis , E. Charbon , and K. Bertels . 2016. A heterogeneous quantum computer architecture . In International Conference on Computing Frontiers (CF\u201916) . ACM, New York, NY, USA, 323--330. DOI:https:\/\/doi.org\/10.1145\/2903150.2906827 X. Fu, L. Riesebos, L. Lao, C. G. Almudever, F. Sebastiano, R. Versluis, E. Charbon, and K. Bertels. 2016. A heterogeneous quantum computer architecture. In International Conference on Computing Frontiers (CF\u201916). ACM, New York, NY, USA, 323--330. DOI:https:\/\/doi.org\/10.1145\/2903150.2906827"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Lov K. Grover. 1996. A fast quantum mechanical algorithm for database search. In Theory of computing. 212--219.  Lov K. Grover. 1996. A fast quantum mechanical algorithm for database search. In Theory of computing. 212--219.","DOI":"10.1145\/237814.237866"},{"key":"e_1_2_1_12_1","volume-title":"Svore","author":"Haener Thomas","year":"2018","unstructured":"Thomas Haener , Mathias Soeken , Martin Roetteler , and Krysta M . Svore . 2018 . Quantum circuits for floating-point arithmetic. In Reversible Computation, Jarkko Kari and Irek Ulidowski (Eds.). Springer International Publishing , Cham, 162--174. Thomas Haener, Mathias Soeken, Martin Roetteler, and Krysta M. Svore. 2018. Quantum circuits for floating-point arithmetic. In Reversible Computation, Jarkko Kari and Irek Ulidowski (Eds.). Springer International Publishing, Cham, 162--174."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/3179553.3179560"},{"key":"e_1_2_1_14_1","volume-title":"Quantum chemistry calculations on a trapped-Ion quantum simulator. Physical Review X 8 (03","author":"Hempel Cornelius","year":"2018","unstructured":"Cornelius Hempel , Christine Maier , Jonathan Romero , Jarrod Mcclean , Thomas Monz , Heng Shen , Petar Jurcevic , Ben P. Lanyon , Peter Love , Ryan Babbush , Alan Aspuru-Guzik , R. Blatt , and Christian Roos . 2018. Quantum chemistry calculations on a trapped-Ion quantum simulator. Physical Review X 8 (03 2018 ). DOI:https:\/\/doi.org\/10.1103\/PhysRevX.8.031022 Cornelius Hempel, Christine Maier, Jonathan Romero, Jarrod Mcclean, Thomas Monz, Heng Shen, Petar Jurcevic, Ben P. Lanyon, Peter Love, Ryan Babbush, Alan Aspuru-Guzik, R. Blatt, and Christian Roos. 2018. Quantum chemistry calculations on a trapped-Ion quantum simulator. Physical Review X 8 (03 2018). DOI:https:\/\/doi.org\/10.1103\/PhysRevX.8.031022"},{"key":"e_1_2_1_15_1","unstructured":"IBM. 2017. IBM QX backend information. https:\/\/github.com\/Qiskit\/qiskit-backend-information.  IBM. 2017. IBM QX backend information. https:\/\/github.com\/Qiskit\/qiskit-backend-information."},{"key":"e_1_2_1_16_1","volume-title":"Classical homomorphic encryption for quantum circuits. CoRR abs\/1708.02130","author":"Mahadev Urmila","year":"2017","unstructured":"Urmila Mahadev . 2017. Classical homomorphic encryption for quantum circuits. CoRR abs\/1708.02130 ( 2017 ). https:\/\/arxiv.org\/abs\/1708.02130v4 Urmila Mahadev. 2017. Classical homomorphic encryption for quantum circuits. CoRR abs\/1708.02130 (2017). https:\/\/arxiv.org\/abs\/1708.02130v4"},{"key":"e_1_2_1_17_1","volume-title":"Fitzsimons","author":"Mantri Atul","year":"2017","unstructured":"Atul Mantri , Tommaso F. Demarie , and Joseph F . Fitzsimons . 2017 . Universality of quantum computation with cluster states and (X, Y)-plane measurements. Scientific Reports 7 (February 2017), 42861. DOI:https:\/\/doi.org\/10.1038\/srep42861 Atul Mantri, Tommaso F. Demarie, and Joseph F. Fitzsimons. 2017. Universality of quantum computation with cluster states and (X, Y)-plane measurements. Scientific Reports 7 (February 2017), 42861. DOI:https:\/\/doi.org\/10.1038\/srep42861"},{"key":"e_1_2_1_18_1","volume-title":"Design Automation Conference. 318--323","author":"Miller D. M.","unstructured":"D. M. Miller , D. Maslov , and G. W. Dueck . 2003. A transformation based algorithm for reversible logic synthesis . In Design Automation Conference. 318--323 . D. M. Miller, D. Maslov, and G. W. Dueck. 2003. A transformation based algorithm for reversible logic synthesis. In Design Automation Conference. 318--323."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.050301"},{"key":"e_1_2_1_20_1","volume-title":"An introduction to quantum computing, without the physics. CoRR abs\/1708.03684","author":"Nannicini Giacomo","year":"2017","unstructured":"Giacomo Nannicini . 2017. An introduction to quantum computing, without the physics. CoRR abs\/1708.03684 ( 2017 ). http:\/\/arxiv.org\/abs\/1708.03684. Giacomo Nannicini. 2017. An introduction to quantum computing, without the physics. CoRR abs\/1708.03684 (2017). http:\/\/arxiv.org\/abs\/1708.03684."},{"key":"e_1_2_1_21_1","unstructured":"M. Nielsen and I. Chuang. 2000. Quantum Computation and Quantum Information. Cambridge Univ. Press.  M. Nielsen and I. Chuang. 2000. Quantum Computation and Quantum Information. Cambridge Univ. Press."},{"key":"e_1_2_1_22_1","volume-title":"Chuang","author":"Nielsen Michael A.","year":"2010","unstructured":"Michael A. Nielsen and Isaac L . Chuang . 2010 . Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press . DOI:https:\/\/doi.org\/10.1017\/CBO9780511976667 Michael A. Nielsen and Isaac L. Chuang. 2010. Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press. DOI:https:\/\/doi.org\/10.1017\/CBO9780511976667"},{"key":"e_1_2_1_23_1","volume-title":"Innovations in Theoretical Computer Science (ITCS\u201913)","author":"Reichardt Ben W.","unstructured":"Ben W. Reichardt , Falk Unger , and Umesh Vazirani . 2013. A classical leash for a quantum system: Command of quantum systems via rigidity of chsh games . In Innovations in Theoretical Computer Science (ITCS\u201913) . ACM , New York, NY, USA , 321--322. DOI:https:\/\/doi.org\/10.1145\/2422436.2422473 Ben W. Reichardt, Falk Unger, and Umesh Vazirani. 2013. A classical leash for a quantum system: Command of quantum systems via rigidity of chsh games. In Innovations in Theoretical Computer Science (ITCS\u201913). ACM, New York, NY, USA, 321--322. DOI:https:\/\/doi.org\/10.1145\/2422436.2422473"},{"key":"e_1_2_1_24_1","volume-title":"Towards reverse engineering reversible logic. CoRR abs\/1704.08397","author":"Saeed Samah Mohamed","year":"2017","unstructured":"Samah Mohamed Saeed , Xiaotong Cui , Robert Wille , Alwin Zulehner , Kaijie Wu , Rolf Drechsler , and Ramesh Karri . 2017. Towards reverse engineering reversible logic. CoRR abs\/1704.08397 ( 2017 ). Samah Mohamed Saeed, Xiaotong Cui, Robert Wille, Alwin Zulehner, Kaijie Wu, Rolf Drechsler, and Ramesh Karri. 2017. Towards reverse engineering reversible logic. CoRR abs\/1704.08397 (2017)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240765.3240817"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.93"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289392"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2431211.2431220"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"e_1_2_1_30_1","volume-title":"International Conference on Reversible Computation. 307--321","author":"Soeken Mathias","unstructured":"Mathias Soeken , Gerhard W. Dueck , and D. Michael Miller . 2016. A fast symbolic transformation based algorithm for reversible logic synthesis . In International Conference on Reversible Computation. 307--321 . Mathias Soeken, Gerhard W. Dueck, and D. Michael Miller. 2016. A fast symbolic transformation based algorithm for reversible logic synthesis. In International Conference on Reversible Computation. 307--321."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786982"},{"key":"e_1_2_1_32_1","volume-title":"Rogers","author":"Tham Weng Kit","year":"2018","unstructured":"Weng Kit Tham , Hugo Ferretti , Kent Bonsma-Fisher , Aharon Brodutch , Barry C. Sanders , Aephraim M. Steinberg , Stacey Jeffery , and Edward S . Rogers . 2018 . Experimental demonstration of quantum fully homomorphic encryption with application in a two-party secure protocol. In arXiv preprint arXiv:1811.02149. Weng Kit Tham, Hugo Ferretti, Kent Bonsma-Fisher, Aharon Brodutch, Barry C. Sanders, Aephraim M. Steinberg, Stacey Jeffery, and Edward S. Rogers. 2018. Experimental demonstration of quantum fully homomorphic encryption with application in a two-party secure protocol. In arXiv preprint arXiv:1811.02149."},{"key":"e_1_2_1_33_1","first-page":"209","article-title":"Supervised learning with quantum enhanced feature spaces","volume":"567","author":"Harrow Kristan Temme","year":"2018","unstructured":"Kristan Temme Aram W. Harrow Jerry M. Chow Vojtech Havlicek , Antonio D. C\u00f3rcoles and Jay M. Gambetta . 2018 . Supervised learning with quantum enhanced feature spaces . Nature 567 (2018), 209 -- 212 . Kristan Temme Aram W. Harrow Jerry M. Chow Vojtech Havlicek, Antonio D. C\u00f3rcoles and Jay M. Gambetta. 2018. Supervised learning with quantum enhanced feature spaces. Nature 567 (2018), 209--212.","journal-title":"Nature"},{"key":"e_1_2_1_34_1","volume-title":"Design Automation Conference. 270--275","author":"Wille R.","unstructured":"R. Wille and R. Drechsler . 2009. BDD-based synthesis of reversible logic for large functions . In Design Automation Conference. 270--275 . DOI:https:\/\/doi.org\/10.1145\/1629911.1629984 R. Wille and R. Drechsler. 2009. BDD-based synthesis of reversible logic for large functions. In Design Automation Conference. 270--275. DOI:https:\/\/doi.org\/10.1145\/1629911.1629984"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of Design, Automation Test in Europe Conference Exhibition. 458--463","author":"Zulehner A.","unstructured":"A. Zulehner and R. Wille . 2017. Make it reversible: Efficient embedding of non-reversible functions . In Proceedings of Design, Automation Test in Europe Conference Exhibition. 458--463 . A. Zulehner and R. Wille. 2017. Make it reversible: Efficient embedding of non-reversible functions. In Proceedings of Design, Automation Test in Europe Conference Exhibition. 458--463."},{"key":"e_1_2_1_36_1","first-page":"996","article-title":"One-pass design of reversible circuits: Combining embedding and synthesis for reversible logic","volume":"37","author":"Zulehner Alwin","year":"2018","unstructured":"Alwin Zulehner and Robert Wille . 2018 . One-pass design of reversible circuits: Combining embedding and synthesis for reversible logic . IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37 , 5 (2018), 996 -- 1008 . Alwin Zulehner and Robert Wille. 2018. One-pass design of reversible circuits: Combining embedding and synthesis for reversible logic. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, 5 (2018), 996--1008.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287624.3287704"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358184","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3358184","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:58Z","timestamp":1750199578000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358184"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,7]]},"references-count":37,"journal-issue":{"issue":"5s","published-print":{"date-parts":[[2019,10,31]]}},"alternative-id":["10.1145\/3358184"],"URL":"https:\/\/doi.org\/10.1145\/3358184","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"value":"1539-9087","type":"print"},{"value":"1558-3465","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,7]]},"assertion":[{"value":"2019-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}