Academic literature on the topic 'Quantum Cryptography (QC); Quantum Key Distribution (QKD); Hybrid Key'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Quantum Cryptography (QC); Quantum Key Distribution (QKD); Hybrid Key.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Quantum Cryptography (QC); Quantum Key Distribution (QKD); Hybrid Key"

1

Elaheh, Golzardi. "Improving BB84 in Quantum Encryption." Journal of Information Sciences and Computing Technologies 4, no. 3 (2015): 343–46. https://doi.org/10.5281/zenodo.3968520.

Full text
Abstract:
Today, information security plays a key role in communications and exchanges.Until now Various approaches including: Quantum encryption and Quantum key Distribution (QKD), have been utilized for information security, that act based on Quantum Mechanic principles, so that if one tries to hear the information, it will be detected via increasing error rate in receiver part. BB84 is one of secure algorithms in quantum encryption area, bearing less error rate in comparison to other quantum algorithms. The goal of the paper is to improve the algorithms as much as possible in order to defend the atta
APA, Harvard, Vancouver, ISO, and other styles
2

Lopes, Minal, and Nisha Sarwade. "Optimized decoy state QKD for underwater free space communication." International Journal of Quantum Information 16, no. 02 (2018): 1850019. http://dx.doi.org/10.1142/s0219749918500193.

Full text
Abstract:
Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207[Formula: see text]kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with
APA, Harvard, Vancouver, ISO, and other styles
3

Shuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.

Full text
Abstract:
As quantum computing continues to evolve, traditional cryptographic systems face significant vulnerabilities,especially asymmetric algorithms based on factorization and discrete logarithms. In response, the integration of QuantumKey Distribution with post-quantum cryptography presents a promising hybrid approach to ensuring long-term data security.This new topic explores the design and development of cryptographic systems that combine the computational resilienceof post-quantum cryptography algorithms, such as lattice-based cryptography, with the physical security guaranteesprovided by Quantum
APA, Harvard, Vancouver, ISO, and other styles
4

Neethu V A. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 327–37. https://doi.org/10.52783/jisem.v10i16s.2599.

Full text
Abstract:
Cloud computing's rise has brought with it concerns about data privacy and integrity as a result of an increase in cyber threats as well as centralized security weaknesses. To resolve the problem, this project combines Blockchain and quantum cryptography as a single work. Blockchain is famous for its decentralization. It promises transparency and resistance to manipulation with its open, unchangeable ledger. Quantum cryptography with Quantium Key Distribution (QKD) defends against both present and future quantum computer invaders. Using this technology, the project aims to enhance cloud data p
APA, Harvard, Vancouver, ISO, and other styles
5

Neethu V A, Arun Vaishnav, Mohammad Akram Khan. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 52–62. https://doi.org/10.52783/jisem.v10i16s.2559.

Full text
Abstract:
Cloud computing's rise has brought with it concerns about data privacy and integrity as a result of an increase in cyber threats as well as centralized security weaknesses. To resolve the problem, this project combines Blockchain and quantum cryptography as a single work. Blockchain is famous for its decentralization. It promises transparency and resistance to manipulation with its open, unchangeable ledger. Quantum cryptography with Quantium Key Distribution (QKD) defends against both present and future quantum computer invaders. Using this technology, the project aims to enhance cloud data p
APA, Harvard, Vancouver, ISO, and other styles
6

Kamil, Bassma M. "Advanced 6G Network Protection Using Quantum Key Distribution: A Systematic Review." Babylonian Journal of Networking 2025 (July 14, 2025): 80–96. https://doi.org/10.58496/bjn/2025/007.

Full text
Abstract:
With the advent of 6G communication systems on the horizon, ensuring that they are secure from quantum computing threats, in a post-quantum era, is of paramount importance. Quantum attacks, computational hardness-based classical cryptographic algorithms are becoming more susceptible to quantum attacks. Quantum Key Distribution (QKD) has been proposed to address this challenge, which can provide unconditional security based on quantum mechanics for establishing security cryptographic keys. In this work, we review how QKD could fit into the 6G design as part of the general siytematic vision of s
APA, Harvard, Vancouver, ISO, and other styles
7

Minal, Lopes1 and Dr. Nisha Sarwade2. "Cryptography from Quantum Mechanical Viewpoint." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 13. https://doi.org/10.5281/zenodo.7379782.

Full text
Abstract:
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed the security through encryption of their data, with the help of a common key. Both the parties should agree on this key prior to communication. The cryptographic systems which perform these tasks are designed to keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the mathematical complexity of the algorithm. But quantum computation is expec
APA, Harvard, Vancouver, ISO, and other styles
8

Lokesh BS. "Secure Quantum Machine Learning via Quantum Cryptography: Theoretical Framework and Implementation Insights." Journal of Information Systems Engineering and Management 10, no. 49s (2025): 1255–65. https://doi.org/10.52783/jisem.v10i49s.10122.

Full text
Abstract:
As quantum machine learning (QML) continues to evolve, it promises unparalleled computational advantages in processing complex data. However, the rise of QML also introduces critical concerns regarding data security and privacy, particularly in sensitive domains such as healthcare, finance, and defense. Classical cryptographic methods fall short in addressing threats that arise in quantum communication and computation environments. To bridge this gap, this paper presents a hybrid framework that integrates quantum cryptography—specifically Quantum Key Distribution (QKD)—with QML pipelines, ensu
APA, Harvard, Vancouver, ISO, and other styles
9

Shamshad, Shuhab, Farina Riaz, Rabia Riaz, Sanam Shahla Rizvi, and Shahab Abdulla. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors 22, no. 21 (2022): 8151. http://dx.doi.org/10.3390/s22218151.

Full text
Abstract:
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing el
APA, Harvard, Vancouver, ISO, and other styles
10

Vishnuvardhana Reddy Veeraballi. "Quantum Computing Encryption: Emerging Trends in Cybersecurity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2678–86. https://doi.org/10.32628/cseit251112288.

Full text
Abstract:
This article explores the emerging trends in cybersecurity in response to the advent of quantum computing, focusing on the development of quantum-safe encryption methods. It begins by examining the vulnerabilities of traditional encryption algorithms like RSA and ECC to quantum attacks, particularly through Shor's algorithm. The article then delves into post-quantum cryptography (PQC), discussing key approaches such as lattice-based cryptography, hash-based signatures, and code-based cryptography, along with their advantages and challenges. Quantum Key Distribution (QKD) is explored as an alte
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Quantum Cryptography (QC); Quantum Key Distribution (QKD); Hybrid Key"

1

Pandikumar, S., Pallavi M O, Dhanush C, and m. Arun. "Quantum Safe cryptography – An Overview." In Innovations and Trends in Modern Computer Science Technology – Overview, Challenges and Applications. QTanalytics India, 2024. https://doi.org/10.48001/978-81-980647-5-2-4.

Full text
Abstract:
Quantum-safe cryptography is the term that specifies cryptographic methods secured against the threats of quantum computing. Among them are Quantum Key Distribution, which provides information-theoretic security, and Post-Quantum Cryptography, which provides scalable authentication in high-density networks but lacks the same level of theoretical security as the former. In this context, a hybrid cryptosystem that integrally combines QKD and PQC should be created to build a robust quantum-safe system. Moreover, in blockchain technology and machine learning models, quantum algorithms play an impo
APA, Harvard, Vancouver, ISO, and other styles
2

Anagani, Navya Sree, Rajesh Doriya, and Chandrasekhar Jatoth. "Exploring the Frontier." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-9220-1.ch001.

Full text
Abstract:
In the rapidly evolving realm of digital technology, quantum computing (QC) represents a groundbreaking advancement, fundamentally transforming the approach to computation and communication. By leveraging quantum mechanics principles—specifically superposition and entanglement—QC achieves computational power that surpasses classical computers. This chapter explores the core concepts of QC, including quantum circuits, gates, and algorithms, and demonstrates how these principles enable unprecedented problem-solving efficiency. This chapter also discusses quantum cryptography, a key application o
APA, Harvard, Vancouver, ISO, and other styles
3

Meenendranath Reddy, K., and R. Murugesan. "Quantum Key Distribution (QKD) for Ultra-Secure Power Electronics Communication in IoT-Based Smart Grid Systems." In Power Electronics for IoT-Enabled Smart Grids and Industrial Automation. RADemics Research Institute, 2025. https://doi.org/10.71443/9789349552111-14.

Full text
Abstract:
The integration of blockchain with hybrid cryptographic models was redefining the security paradigm for decentralized energy transactions. As energy infrastructures increasingly adopt digital and distributed ledger technologies, ensuring data integrity, confidentiality, and resilience against emerging cyber threats was paramount. Conventional cryptographic mechanisms employed in blockchain networks face significant vulnerabilities, particularly with the advent of quantum computing. Hybrid cryptographic models, which combine classical cryptographic techniques with post-quantum security framewor
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Quantum Cryptography (QC); Quantum Key Distribution (QKD); Hybrid Key"

1

Pasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.

Full text
Abstract:
Abstract: Scalable quantum networks, powered by entanglement-driven secure communication, are poised to revolutionize global information exchange, cybersecurity, and quantum computing infrastructures. Unlike classical communication systems, quantum networks leverage quantum entanglement and superposition to enable ultra-secure data transmission, quantum key distribution (QKD), and instantaneous information sharing across large-scale networks. This research explores the fundamental principles of entanglement-based communication, the role of quantum repeaters, quantum memory, and multi-nodal ent
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!