Table 1 Summary of results on the privacy guarantees and complexity provided by the studied attack models on various VQC models
Privacy Breach | Description | Complexity | Requirements |
|---|---|---|---|
Weak | Snapshot recovery | Algorithm 2: \({\mathcal{O}}(\,\text{poly}(\text{dim}\,({\mathfrak{g}})))\) | \({\mathcal{O}}(\,\text{poly}\,(n))\) sized DLA + LASA condition (Def 5) + Slow Pauli Expansion (Def 9) |
Strong | Snapshot inversion for local Pauli encoding | Algorithm 4: \({\mathcal{O}}\left.\right(\,\text{poly}\,(n,1/\epsilon )\) | Snapshot recovery requirement + Separable state with ρJ(x) parameterized by subset \({{\mathsf{x}}}_{J}\subseteq {\bf{x}}\) • \(\,\text{dim}\,({{\bf{x}}}_{J})={\mathcal{O}}(1)\) • each xk is encoded at most \(R={\mathcal{O}}(\,\text{poly}\,(n))\) times • Snapshot components with non-zero overlap w.r.t. ρJ(xJ) has cardinality at least dim(xJ). |
Strong | Snapshot inversion for generic encoding | Grid Search : \({\mathcal{O}}\left({\left(\frac{L}{\epsilon }\right)}^{d}\right)\) | The recovery cost function is L-Lipschitz, leading to efficient privacy breach not being possible |