# CLOAQ: Ensuring the Cloud Quantum Computer Runs Your Program… But Learns Nothing

By: Vivek Balachandran, Amal Raj

Conference: Blackhat
Year: 2026
Date: 2026-04-24

Tags: quantum-computing, secure-coding, software-security, cloud-pentesting


## Resources
- Conference Link: https://blackhat.com/asia-26/briefings/schedule/index.html#cloaq-ensuring-the-cloud-quantum-computer-runs-your-program-but-learns-nothing-50774



Quantum programs executed on cloud quantum computers expose three critical assets:

1) the input states, which may encode sensitive parameters or proprietary data;

2) the quantum circuit structure, which represents the designer's intellectual property; and

3) the quantum output, the high-value "gold nugget" produced by the computation — such as an RSA private key recovered by Shor's algorithm or the molecular structure of a breakthrough anti-aging drug.

Our prior work, ObfusQate, protected quantum circuits by obfuscating their structure so that untrusted compilers cannot infer the algorithmic logic. In this work, we address the third and most valuable threat vector: quantum output theft. We will present a hybrid quantum-classical output-encryption mechanism in which carefully selected quantum gates are inserted before compilation to deliberately corrupt the measurement results that we call quantum encryption. Only the legitimate user — who holds a classical decryption key describing the inserted gates — can reconstruct the true output, classically without the need of a quantum computer.

Evaluated across five benchmark algorithms, our approach yields high statistical divergence (TVD > 0.5) and strong functional corruption, ensuring that cloud providers cannot learn the output even after running the circuit. The technique is practical, compiler-agnostic, and imposes minimal overhead, making it suitable for protecting quantum IP in untrusted cloud environments.

