Journal articles on the topic 'Quantum Cryptography (QC); Quantum Key Distribution (QKD); Hybrid Key'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 28 journal articles for your research on the topic 'Quantum Cryptography (QC); Quantum Key Distribution (QKD); Hybrid Key.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Elaheh, Golzardi. "Improving BB84 in Quantum Encryption." Journal of Information Sciences and Computing Technologies 4, no. 3 (2015): 343–46. https://doi.org/10.5281/zenodo.3968520.

Full text
Abstract:
Today, information security plays a key role in communications and exchanges.Until now Various approaches including: Quantum encryption and Quantum key Distribution (QKD), have been utilized for information security, that act based on Quantum Mechanic principles, so that if one tries to hear the information, it will be detected via increasing error rate in receiver part. BB84 is one of secure algorithms in quantum encryption area, bearing less error rate in comparison to other quantum algorithms. The goal of the paper is to improve the algorithms as much as possible in order to defend the atta
APA, Harvard, Vancouver, ISO, and other styles
2

Lopes, Minal, and Nisha Sarwade. "Optimized decoy state QKD for underwater free space communication." International Journal of Quantum Information 16, no. 02 (2018): 1850019. http://dx.doi.org/10.1142/s0219749918500193.

Full text
Abstract:
Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207[Formula: see text]kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with
APA, Harvard, Vancouver, ISO, and other styles
3

Shuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.

Full text
Abstract:
As quantum computing continues to evolve, traditional cryptographic systems face significant vulnerabilities,especially asymmetric algorithms based on factorization and discrete logarithms. In response, the integration of QuantumKey Distribution with post-quantum cryptography presents a promising hybrid approach to ensuring long-term data security.This new topic explores the design and development of cryptographic systems that combine the computational resilienceof post-quantum cryptography algorithms, such as lattice-based cryptography, with the physical security guaranteesprovided by Quantum
APA, Harvard, Vancouver, ISO, and other styles
4

Neethu V A. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 327–37. https://doi.org/10.52783/jisem.v10i16s.2599.

Full text
Abstract:
Cloud computing's rise has brought with it concerns about data privacy and integrity as a result of an increase in cyber threats as well as centralized security weaknesses. To resolve the problem, this project combines Blockchain and quantum cryptography as a single work. Blockchain is famous for its decentralization. It promises transparency and resistance to manipulation with its open, unchangeable ledger. Quantum cryptography with Quantium Key Distribution (QKD) defends against both present and future quantum computer invaders. Using this technology, the project aims to enhance cloud data p
APA, Harvard, Vancouver, ISO, and other styles
5

Neethu V A, Arun Vaishnav, Mohammad Akram Khan. "Enhancing Data Privacy and Integrity in Cloud Systems Through Blockchain and Quantum Cryptographic Integration." Journal of Information Systems Engineering and Management 10, no. 16s (2025): 52–62. https://doi.org/10.52783/jisem.v10i16s.2559.

Full text
Abstract:
Cloud computing's rise has brought with it concerns about data privacy and integrity as a result of an increase in cyber threats as well as centralized security weaknesses. To resolve the problem, this project combines Blockchain and quantum cryptography as a single work. Blockchain is famous for its decentralization. It promises transparency and resistance to manipulation with its open, unchangeable ledger. Quantum cryptography with Quantium Key Distribution (QKD) defends against both present and future quantum computer invaders. Using this technology, the project aims to enhance cloud data p
APA, Harvard, Vancouver, ISO, and other styles
6

Kamil, Bassma M. "Advanced 6G Network Protection Using Quantum Key Distribution: A Systematic Review." Babylonian Journal of Networking 2025 (July 14, 2025): 80–96. https://doi.org/10.58496/bjn/2025/007.

Full text
Abstract:
With the advent of 6G communication systems on the horizon, ensuring that they are secure from quantum computing threats, in a post-quantum era, is of paramount importance. Quantum attacks, computational hardness-based classical cryptographic algorithms are becoming more susceptible to quantum attacks. Quantum Key Distribution (QKD) has been proposed to address this challenge, which can provide unconditional security based on quantum mechanics for establishing security cryptographic keys. In this work, we review how QKD could fit into the 6G design as part of the general siytematic vision of s
APA, Harvard, Vancouver, ISO, and other styles
7

Minal, Lopes1 and Dr. Nisha Sarwade2. "Cryptography from Quantum Mechanical Viewpoint." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 13. https://doi.org/10.5281/zenodo.7379782.

Full text
Abstract:
Cryptography is an art and science of secure communication. Here the sender and receiver are guaranteed the security through encryption of their data, with the help of a common key. Both the parties should agree on this key prior to communication. The cryptographic systems which perform these tasks are designed to keep the key secret while assuming that the algorithm used for encryption and decryption is public. Thus key exchange is a very sensitive issue. In modern cryptographic algorithms this security is based on the mathematical complexity of the algorithm. But quantum computation is expec
APA, Harvard, Vancouver, ISO, and other styles
8

Lokesh BS. "Secure Quantum Machine Learning via Quantum Cryptography: Theoretical Framework and Implementation Insights." Journal of Information Systems Engineering and Management 10, no. 49s (2025): 1255–65. https://doi.org/10.52783/jisem.v10i49s.10122.

Full text
Abstract:
As quantum machine learning (QML) continues to evolve, it promises unparalleled computational advantages in processing complex data. However, the rise of QML also introduces critical concerns regarding data security and privacy, particularly in sensitive domains such as healthcare, finance, and defense. Classical cryptographic methods fall short in addressing threats that arise in quantum communication and computation environments. To bridge this gap, this paper presents a hybrid framework that integrates quantum cryptography—specifically Quantum Key Distribution (QKD)—with QML pipelines, ensu
APA, Harvard, Vancouver, ISO, and other styles
9

Shamshad, Shuhab, Farina Riaz, Rabia Riaz, Sanam Shahla Rizvi, and Shahab Abdulla. "An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy." Sensors 22, no. 21 (2022): 8151. http://dx.doi.org/10.3390/s22218151.

Full text
Abstract:
The Internet of Things (IoT) strongly influences the world economy; this emphasizes the importance of securing all four aspects of the IoT model: sensors, networks, cloud, and applications. Considering the significant value of public-key cryptography threats on IoT system confidentiality, it is vital to secure it. One of the potential candidates to assist in securing public key cryptography in IoT is quantum computing. Although the notion of IoT and quantum computing convergence is not new, it has been referenced in various works of literature and covered by many scholars. Quantum computing el
APA, Harvard, Vancouver, ISO, and other styles
10

Vishnuvardhana Reddy Veeraballi. "Quantum Computing Encryption: Emerging Trends in Cybersecurity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2678–86. https://doi.org/10.32628/cseit251112288.

Full text
Abstract:
This article explores the emerging trends in cybersecurity in response to the advent of quantum computing, focusing on the development of quantum-safe encryption methods. It begins by examining the vulnerabilities of traditional encryption algorithms like RSA and ECC to quantum attacks, particularly through Shor's algorithm. The article then delves into post-quantum cryptography (PQC), discussing key approaches such as lattice-based cryptography, hash-based signatures, and code-based cryptography, along with their advantages and challenges. Quantum Key Distribution (QKD) is explored as an alte
APA, Harvard, Vancouver, ISO, and other styles
11

J, Kamalakumari, Ajmeera Kiran, Gadige Radha, Yedla Chandini, Mohit Tiwari, and Hemamalini V. "Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum Computing." ITM Web of Conferences 76 (2025): 05009. https://doi.org/10.1051/itmconf/20257605009.

Full text
Abstract:
Quantum cryptography has emerged as a revolutionary technology for ensuring secure communication in the era of quantum computing. While existing research primarily focuses on theoretical frameworks and small-scale experimental setups, significant challenges remain in practical implementation, scalability, and security vulnerabilities. This study aims to bridge the gap between theory and real-world deployment by developing robust quantum cryptographic protocols that address key challenges such as noise management, side-channel attacks, and Trojan horse attacks. Additionally, we propose an optim
APA, Harvard, Vancouver, ISO, and other styles
12

M, Mohamed Musthafa, Thangavel P, and Anand Paul. "QUANTUM CRYPTOGRAPHY WITH ESPRESSO CIPHERS AND GRAIN FOR ENHANCED SECURITY IN OPTICAL COMMUNICATION NETWORKS." ICTACT Journal on Communication Technology 16, no. 1 (2025): 3432–36. https://doi.org/10.21917/ijct.2025.0509.

Full text
Abstract:
Securing optical communication networks against evolving cyber threats necessitates advanced cryptographic techniques. Quantum cryptography offers an unbreakable security framework, leveraging the principles of quantum mechanics. However, integrating quantum cryptography with lightweight and efficient stream ciphers remains a challenge in high-speed optical networks. Traditional encryption methods, such as AES and RSA, struggle to meet the real-time demands of optical communication due to computational overhead and vulnerability to quantum attacks. This study introduces a hybrid security frame
APA, Harvard, Vancouver, ISO, and other styles
13

Gitonga, Charles Kinyua. "The Impact of Quantum Computing on Cryptographic Systems: Urgency of Quantum-Resistant Algorithms and Practical Applications in Cryptography." European Journal of Information Technologies and Computer Science 5, no. 1 (2025): 1–10. https://doi.org/10.24018/compute.2025.5.1.146.

Full text
Abstract:
Quantum computing presents computational powers previously thought unattainable. This brings severe threats to classical cryptographic methods, especially RSA and ECC. This paper addresses these risks through a detailed investigation of quantum-resistant algorithms, focusing on lattice- based (CRYSTALS-Kyber), hash-based (SPHINCS+), and code-based (McEliece) systems. Research questions guiding this study include: How vulnerable are traditional algorithms under quantum attack, and which quantum-resistant alternatives offer viable performance and security trade-offs? Through simulations, we anal
APA, Harvard, Vancouver, ISO, and other styles
14

Chandre, Pankaj R., Bhagyashree D. Shendkar, Sayalee Deshmukh, Sameer Kakade, and Suvarna Potdukhe. "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (2023): 642–55. http://dx.doi.org/10.17762/ijritcc.v11i11s.8300.

Full text
Abstract:
Quantum cryptography has emerged as a promising paradigm for secure communication, leveraging the fundamental principles of quantum mechanics to guarantee information confidentiality and integrity. In recent years, the field of quantum cryptography has witnessed remarkable advancements, and the integration of machine learning techniques has further accelerated its progress. This research paper presents a comprehensive review of the latest developments in quantum cryptography, with a specific focus on the utilization of machine learning algorithms to enhance its capabilities. The paper begins b
APA, Harvard, Vancouver, ISO, and other styles
15

Neethu V A and Mohammad Akram Khan. "Securing Data Privacy and Integrity in Cloud Computing Using Blockchain and Quantum Cryptography." Metallurgical and Materials Engineering 31, no. 4 (2025): 137–45. https://doi.org/10.63278/1415.

Full text
Abstract:
Data privacy and integrity maintenance becomes more difficult as cloud computing expands. Such complex and advanced cyberattacks need for stronger and better defenses than traditional security measures can offer. A research paper that combines blockchain technology with quantum cryptography to improve data security in the cloud paradigm. In addition, aspects of blockchain itself – its distributed and cryptographically verified ledger – offer the possibility of transparency and immutability of the life of the data. Excited by that? Unlike this, Quantum Cryptography applies the concepts of quant
APA, Harvard, Vancouver, ISO, and other styles
16

Sheetal Singh. "Adaptive Resource Management Framework for Secure and Resilient IoT Communication Using Federated Learning and Quantum Encryption." Journal of Information Systems Engineering and Management 10, no. 21s (2025): 693–702. https://doi.org/10.52783/jisem.v10i21s.3405.

Full text
Abstract:
With the growing Internet of Things (IoT) environment, it is a major challenge to provide security and efficient resource allocation, especially as more sensitive information and devices are connected. In this research, we present a new Dynamic Resource Allocation Framework, by merging Federated Learning (FL) and Quantum Cryptography (QC) to optimize the allocation of resources while improving security on the IOT devices. The framework utilizes Federated Learning (FL) for training models at the edge and avoids the transfer of data from edge devices to central servers, thereby ensuring data pri
APA, Harvard, Vancouver, ISO, and other styles
17

Szymanski, Ted H. "A Quantum-Safe Software-Defined Deterministic Internet of Things (IoT) with Hardware-Enforced Cyber-Security for Critical Infrastructures." Information 15, no. 4 (2024): 173. http://dx.doi.org/10.3390/info15040173.

Full text
Abstract:
The next-generation “Industrial Internet of Things” (IIoT) will support “Machine-to-Machine” (M2M) communications for smart Cyber-Physical-Systems and Industry 4.0, and require guaranteed cyber-security. This paper explores hardware-enforced cyber-security for critical infrastructures. It examines a quantum-safe “Software-Defined-Deterministic IIoT” (SDD-IIoT), with a new forwarding-plane (sub-layer-3a) for deterministic M2M traffic flows. A “Software-Defined Networking” (SDN) control plane controls many “Software-Defined-Deterministic Wide-Area Networks” (SDD-WANs), realized with FPGAs. The S
APA, Harvard, Vancouver, ISO, and other styles
18

"Implementation of Authenticated Hybrid QKD Protocols for 802.11 LANs." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (2020): 2663–69. http://dx.doi.org/10.35940/ijitee.d1762.029420.

Full text
Abstract:
Quantum cryptography (QC) is used to give approved secure correspondence between the sender and beneficiary. In QC, Authentication Hybrid Quantum Key Distribution Protocols (AHQKDPs) use quantum segments to isolate session keys and open talks to check for covert operatives and affirm the rightness of a session key. In any case, open talks require additional correspondence adjusts between sender beneficiaries. The benefit of QC adequately is against replay and inert assaults. An AQKDP with certain customer approval, which ensures that protection, is achievable for valid down customers and the m
APA, Harvard, Vancouver, ISO, and other styles
19

Huang, Jose Luis Lo, and Vincent C. Emeakaroha. "Performing Distributed Quantum Calculations in a Multi-cloud Architecture Secured by the Quantum Key Distribution Protocol." SN Computer Science 5, no. 4 (2024). http://dx.doi.org/10.1007/s42979-024-02761-0.

Full text
Abstract:
AbstractQuantum computing (QC) is an emerging area that yearly improves and develops more advances in the number of qubits and the available infrastructure for public users. Nowadays, the main cloud service providers (CSP) are implementing different mechanisms to support access to their quantum computers, which can be used to perform small experiments, test hybrid algorithms and prove quantum theories. Recent research work have discussed the low capacity of using quantum computers in a single CSP to perform quantum computation that are needed to solve different experiments for real world probl
APA, Harvard, Vancouver, ISO, and other styles
20

"Hybrid Quantum-Classical Key Distribution." International Journal of Innovative Technology and Exploring Engineering 8, no. 12 (2019): 4786–91. http://dx.doi.org/10.35940/ijitee.l3682.1081219.

Full text
Abstract:
Quantum Key Distribution (QKD) has been developed over the last decade; QKD addresses the challenge of a securely exchanging cryptographic key between two parties over an insecure channel where there are two parties that simultaneously generate and share a secret key using the polarization of quantum states of light by applying the phenomena of quantum physics. The integration of QKD protocol with public key cryptography for securely exchanging the encryption/decryption keys is proposed and simulated, the simulation results evaluate the work of the existing and proposed protocol taking into ac
APA, Harvard, Vancouver, ISO, and other styles
21

Garms, Lydia, Taofiq K. Paraïso, Neil Hanley, et al. "Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem." Advanced Quantum Technologies, February 18, 2024. http://dx.doi.org/10.1002/qute.202300304.

Full text
Abstract:
AbstractQuantum key distribution (QKD) and post‐quantum cryptography (PQC) are the two counter measures against cryptographic attacks via quantum computing. While QKD offers information theoretic security but limited authentication scalability, PQC facilitates scalable authentication in high density networks but is not information theoretic secure. Therefore, an ideal quantum‐safe framework should efficiently leverage the complementarity of both techniques. However, despite growing efforts in integrating both, current realizations have focused on channel authentication, and a complete cryptosy
APA, Harvard, Vancouver, ISO, and other styles
22

Chen, Shiang-Jiun, and Yi-Hsueh Tsai. "Quantum-Safe Networks for 6G an Integrated Survey on PQC, QKD, and Satellite QKD with Future Perspectives." Computing&AI Connect, June 17, 2025. https://doi.org/10.69709/caic.2024.102135.

Full text
Abstract:
Quantum computing presents significant issues to the current cryptographic landscape, especially with the upcoming deployment of 6G networks. Traditional cryptographic algorithms, such as Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC), are vulnerable to quantum-based attacks, leading to the need for Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and Satellite-based QKD solutions. This paper offers a comprehensive review of these quantum-safe technologies, discussing their integration within the context of 6G networks. Key performance indicators (KPIs), scal
APA, Harvard, Vancouver, ISO, and other styles
23

Chen, Shiang-Jiun, and Yi-Hsueh Tsai. "Quantum-Safe Networks for 6G an Integrated Survey on PQC, QKD, and Satellite QKD with Future Perspectives." Computing&AI Connect, June 17, 2025. https://doi.org/10.69709/caic.2025.102135.

Full text
Abstract:
Quantum computing presents significant issues to the current cryptographic landscape, especially with the upcoming deployment of 6G networks. Traditional cryptographic algorithms, such as Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC), are vulnerable to quantum-based attacks, leading to the need for Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and Satellite-based QKD solutions. This paper offers a comprehensive review of these quantum-safe technologies, discussing their integration within the context of 6G networks. Key performance indicators (KPIs), scal
APA, Harvard, Vancouver, ISO, and other styles
24

Biswas, Sujit, Rajat S. Goswami, K. Hemant Kumar Reddy, Sachi Nandan Mohanty, and Mohammed Altaf Ahmed. "Exploring the fusion of lattice‐based quantum key distribution for secure Internet of Things communications." IET Quantum Communication, July 23, 2024. http://dx.doi.org/10.1049/qtc2.12105.

Full text
Abstract:
AbstractThe integration of lattice‐based cryptography principles with Quantum Key Distribution (QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) ecosystems. With the advent of quantum computing, traditional cryptographic methods are increasingly susceptible to attacks, necessitating the development of quantum‐resistant approaches. By leveraging the inherent resilience of lattice‐based cryptography, a synergistic fusion with QKD is proposed to establish secure and robust communication channels among IoT devices. Through comprehensive Qiskit simulations a
APA, Harvard, Vancouver, ISO, and other styles
25

Gupta, Shashank, Iteash Agarwal, Vijayalaxmi Mogiligidda, et al. "ChaQra: a cellular unit of the Indian quantum network." Scientific Reports 14, no. 1 (2024). http://dx.doi.org/10.1038/s41598-024-67495-8.

Full text
Abstract:
AbstractMajor research interests on quantum key distribution (QKD) are primarily focused on increasing 1. Point-to-point transmission distance (1000 km). 2. Secure key rate (Mbps). 3. Security of quantum layer (device-independence). It is great to push the boundaries in these fronts but these isolated approaches are neither scalable nor cost-effective due to requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different set of challenges apart from distance, key rate and quantum security. In this regard, we present ChaQra—a sub q
APA, Harvard, Vancouver, ISO, and other styles
26

-, Ajinkya Goyal. "Enhancing IoT Security with Quantum Cryptography Opportunities Challenges and Future Prospects"." International Journal For Multidisciplinary Research 7, no. 3 (2025). https://doi.org/10.36948/ijfmr.2025.v07i03.38564.

Full text
Abstract:
This research examines quantum cryptography techniques paired with IoT security approaches to explain how quantum technology optimizes device protection within interconnected networks. Existing encryption methods struggle to protect the ever-growing IoT networks against their extensive security weaknesses. Quantum Key Distribution (QKD) stands as an innovative solution in quantum cryptography because it provides secure key transfer on untrustworthy channels. Technical constraints and legal framework standards along with scalability issues continue to pose obstacles to the advancement of quantu
APA, Harvard, Vancouver, ISO, and other styles
27

Cyriac, Robin, Sivaraman Eswaran, and Shitharth Selvarajan. "Quantum Computing in Cryptographic Systems." International Journal of Advanced IT Research and Development 01, no. 01 (2024). http://dx.doi.org/10.69942/1920184/20240101/03.

Full text
Abstract:
Quantum computing represents a transformative advancement in computational power, with profound implications for cryptographic systems. This paper explores the intersection of quantum computing and cryptography, examining the potential for quantum computers to both break traditional cryptographic algorithms and enable new forms of secure communication. Classical cryptographic systems, such as RSA and ECC, rely on the computational difficulty of problems like integer factorization and discrete logarithms. However, quantum algorithms, notably Shor's algorithm, can solve these problems exponentia
APA, Harvard, Vancouver, ISO, and other styles
28

Shafique, Arslan, Syed Ali Atif Naqvi, Ali Raza, et al. "A hybrid encryption framework leveraging quantum and classical cryptography for secure transmission of medical images in IoT-based telemedicine networks." Scientific Reports 14, no. 1 (2024). https://doi.org/10.1038/s41598-024-82256-3.

Full text
Abstract:
AbstractIn the era of the Internet of Things (IoT), the transmission of medical reports in the form of scan images for collaborative diagnosis is vital for any telemedicine network. In this context, ensuring secure transmission and communication is necessary to protect medical data to maintain privacy. To address such privacy concerns and secure medical images against cyberattacks, this research presents a robust hybrid encryption framework that integrates quantum, and classical cryptographic methods. The proposed framework not only secure medical data against cyber threats but also protects t
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!