Hello everyone,

We've just uploaded a new paper to arXiv that explores how to start thinking about reproducible builds in the context of quantum computing:

👉🏻 https://arxiv.org/abs/2510.02251

Below is the abstract:

Reproducible builds are a set of software development practices that establish 
an independently verifiable path from source code to binary artifacts, helping 
to detect and mitigate certain classes of supply chain attacks. Although 
quantum computing is a rapidly evolving field of research, it can already 
benefit from adopting reproducible builds. This paper aims to bridge the gap 
between the quantum computing and reproducible builds communities. We propose a 
generalization of the definition of reproducible builds in the quantum setting, 
motivated by two threat models: one targeting the confidentiality of end users' 
data during circuit preparation and submission to a quantum computer, and 
another compromising the integrity of quantum computation results. This work 
presents three examples that show how classical information can be hidden in 
transpiled quantum circuits, and two cases illustrating how even minimal 
modifications to these circuits can lead to incorrect quantum computation 
results. Our work provides initial steps towards a framework for 
reproducibility in quantum software toolchains.

The examples are available as Jupyter notebooks in this repo:

👉🏻 https://github.com/cryptohslu/reproducible-builds-quantum-computing

I'd love to hear your thoughts, especially on the parts most closely related to reproducible builds. Since this is still a preprint, there's room to incorporate your feedback and make improvements.

And for those of you in academia: if you know of any conferences or journals where this work might be a good fit, I'd really appreciate your suggestions.

Happy hacking :)

--
Iyán Méndez Veiga
GPG Key: 204C 461F BA8C 81D1 0327  E647 422E 3694 311E 5AC1

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to