EDITORIAL article
Front. Comput. Sci.
Sec. Theoretical Computer Science
Volume 7 - 2025 | doi: 10.3389/fcomp.2025.1693260
This article is part of the Research TopicRealizing Quantum Utility: Grand Challenges of Secure & Trustworthy Quantum ComputingView all 5 articles
Editorial: Grand Challenges of Secure & Trustworthy Quantum Computing
Provisionally accepted- 1SUNY Canton, Canton, United States
- 2University of Naples Federico II, Naples, Italy
- 3Case Western Reserve University Department of Electrical Engineering and Computer Science, Cleveland, United States
- 4Northwestern University, Evanston, IL, United States
- 5E O Lawrence Berkeley National Laboratory, Berkeley, United States
- 6University of Illinois Urbana-Champaign, Urbana, United States
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
INTRODUCTION In the unpredictable and inherently uncertain domain of quantum mechanics, the pursuit of pathways to comprehend this novel field is essential. Quantum computers present an innovative and accelerated methodology for computation; however, this advancement is not devoid of associated costs. Emerging challenges involving dependability, reproducibility, resilience, security, and privacy underscore the imperative to construct reliable systems that can deliver quantum advantages to researchers and the industrial sectors. From the investigation of quantum hardware, revealing untrustworthy and unreliable components, to Hamiltonian simulation within hybrid quantum and high-performance computing platforms, along with quantum cloud solutions and the engineering of dependable classical-quantum computing systems, the Research Topic Grand Challenges of Secure & Trustworthy Quantum Computing provides an exhaustive exploration of the reliability and trustworthiness of quantum computing technologies. The rest of this editorial is organized as follows. Sections 2 to 5 briefly summarize the articles in the Research Topic, while Section 6 gives an overview of the convergent themes arising from these studies. Eventually, Section 7 concludes the editorial. TRUST IN THE AGE OF UNTRUSTED QUANTUM HARDWARE The integration of quantum computing resources into cloud-based platforms introduces new risks attributable to potentially unreliable hardware vendors. Upadhyay and Ghosh (2024) propose a threat model where third-party providers could intentionally or inadvertently alter computation results. Such manipulations might change the probability distributions of observed states, leading to undetectable, suboptimal outputs, particularly hazardous for optimization in crucial infrastructure or sensitive security areas. The recommended mitigation approach is tailored to quantum limitations and involves distributing computation among multiple backends, mixing trusted and untrusted ones, to minimize the effect of compromised devices. Empirical results show improvements of up to 190× for quantum workloads, demonstrating that architectural redundancy, a cornerstone of classical fault tolerance, can be adapted to quantum clouds without excessive resource demands. 3 QUANTUM TRUSTED EXECUTION ENVIRONMENTS (QTEES) Although distribution strategies help detect and mitigate faulty output, they do not protect the confidentiality of quantum programs. Trochatos et al. (2025) tackle this complementary challenge by proposing Quantum Trusted Execution Environments (QTEEs) hardware software co-designs that obscure user circuits from untrusted cloud providers or insider threats. Three architectures are introduced, QC-TEE, SoteriaQ, and CASQUE, employing techniques such as decoy control pulses and channel switching to obfuscate gate-level instructions. QTEEs are proposed as a hardware-viable alternative on current superconducting platforms, unlike blind quantum computation or quantum homomorphic encryption, which encounter significant hurdles. Their adaptation points towards the potential for commercial quantum services that ensure both data privacy and protection of algorithmic IP. 4 DEFINING QUANTUM-READY PRIMITIVES FOR HYBRID HPC–QC If secure and reliable execution are prerequisites, efficient hybridization is the key to practical performance gains. Delgado and Date (2025) address this by deconstructing Hamiltonian simulation workflows, central to fields from quantum chemistry to lattice gauge theory, into computational primitives. Each primitive is evaluated for its suitability for quantum offloading using metrics such as computational complexity, scalability, modularity, and physical relevance. The study shows that although state preparation and unitary evolution typically enjoy quantum speedup, tasks such as initial computation and post-processing are still optimally performed classically. The research outlines a strategy for modular hybrid workflows by aligning computational tasks with hardware capabilities, thereby optimizing throughput and reducing synchronization constraints. 5 ENGINEERING DEPENDABLE CLASSICAL–QUANTUM SYSTEMS Incorporating QPUs into HPC frameworks extends beyond enhancing performance and necessitates system-wide reliability. Giusto et al. (2025) discuss this through three interrelated pillars: reproducibility, resiliency, and security & privacy. They assert that QPUs, as unstable devices with error rates significantly higher than classical CPUs, generate shifting noise patterns that threaten reproducibility without intervention. A significant advancement is the use of the Hellinger distance as a statistical tool to assess reproducibility in probabilistic quantum outputs, establishing quantitative limits for variance in repeated runs to guide scheduling and device calibration. The study advocates for a cross-layer approach, from quantum hardware to middleware, emphasizing that dependable QHPC demands integrated physical robustness, workflow management, and cybersecurity solutions. A CONVERGING RESEARCH AGENDA Across these studies, several convergent themes are identified: • Hybrid Architectures Predominate Studies from Hamiltonian simulation to quantum optimization acknowledge that NISQ-era devices must involve classical-quantum coprocessing, establishing it as a long-term structural necessity. • Security and Assurance Trust in quantum computation must surpass algorithmic accuracy to cover the whole execution lifecycle, including protection against output tampering and securing proprietary methods. • Performance-Based Modularization Dividing processes into primitives facilitates selective quantum acceleration and mitigates the synchronization issues of complete quantum conversion. • Dependability as a Core Metric Incorporating reproducibility and resilience measures into early system design ensures that hybrid platforms reliably deliver consistent outcomes on a large scale. • Practicality over Perfection Acknowledging current quantum technology limits, approaches prioritize incremental, viable solutions like shot distribution, hardware obfuscation, and modular hybrid frameworks, instead of waiting for fully fault-tolerant systems. 6.1 From Patchwork Solutions to Integrated Frameworks Although each contribution addresses a different layer of the hybrid quantum–classical stack, the ultimate goal is integration. A future QHPC environment might: • Decompose workloads into quantum-ready primitives using frameworks like Delgado and Date. • Schedule and allocate primitives between classical and quantum resources with dependability metrics guiding the distribution. • Execute sensitive quantum modules within QTEEs to ensure confidentiality against untrusted providers. • Validate output integrity through adaptive multi-device shot distribution and statistical reproducibility analysis. • Feed back performance and trustworthiness metrics into system orchestration to continuously refine workload placement. Such an environment would be secure by design, performance aware, and resilient to both noise and adversarial interference. Achieving this vision will require collaboration across traditionally isolated communities: quantum algorithm developers, HPC systems engineers, hardware security architects, and statistical reliability researchers. 7 CONCLUSION The progression from experimental quantum systems to operational-grade hybrid high-performance computing systems is both a sociocultural and scientific challenge. The articles in this Research Topic collectively indicate a paradigm shift from proving quantum advantage in discrete tasks to establishing dependable, safe, and efficient frameworks for incorporating quantum processors into the global computing landscape. Key aspects such as hardware-based execution redundancy, cryptographic confidentiality, and cross-layer reliability are anticipated to substantially affect this transformative phase. The primary challenge is intricately fusing these diverse components to create a cohesive, scalable, and robust quantum-classical framework essential for converting theoretical insights into a practical computational model with revolutionary impacts on society.
Keywords: dependability, Trust, security, HPC (high performance computing), Quantum computing (QC)
Received: 26 Aug 2025; Accepted: 02 Sep 2025.
Copyright: © 2025 Baheri, Giusto, Xu, Smith, Younis and Cao. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Betis Baheri, SUNY Canton, Canton, United States
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.