Cyber Protection Applications of Quantum Computing: A Review

被引:0
作者
Ahmed, Ummar [1 ]
Sipola, Tuomo [1 ]
Hautamaki, Jari [1 ]
机构
[1] Jamk Univ Appl Sci, Inst Informat Technol, Jyvaskyla, Finland
来源
PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024 | 2024年 / 23卷
关键词
Quantum Computing; Cyber Security; Quantum Computing Applications; Cyber Protection; Quantum Algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum computing is a cutting-edge field of information technology that harnesses the principles of quantum mechanics to perform computations. It has major implications for the cyber security industry. Existing cyber protection applications are working well, but there are still challenges and vulnerabilities in computer networks. Sometimes data and privacy are also compromised. These complications lead to research questions asking what kind of cyber protection applications of quantum computing are there and what potential methods or techniques can be used for cyber protection? These questions will reveal how much power quantum computing has and to what extent it can outperform the conventional computing systems. This scoping review was conducted by considering 815 papers. It showed the possibilities that can be achieved if quantum technologies are implemented in cyber environments. This scoping review discusses various domains such as algorithms and applications, bioinformatics, cloud and edge computing, the organization of complex systems, application areas focused on security and threats, and the broader quantum computing ecosystem. In each of these areas, there is significant scope for quantum computing to be implemented and to revolutionize the working environment. Numerous quantum computing applications for cyber protection and a number of techniques to protect our data and privacy were identified. The results are not limited to network security but also include data security. This paper also discusses societal aspects, e.g., the applications of quantum computing in the social sciences. This scoping review discusses how to enhance the efficiency and security of quantum computing in various cyber security domains. Additionally, it encourages the reader to think about what kind of techniques and methods can be deployed to secure the cyber world.
引用
收藏
页码:10 / 17
页数:8
相关论文
共 31 条
[11]   Software engineering for quantum programming: How far are we? [J].
De Stefano, Manuel ;
Pecorelli, Fabiano ;
Di Nucci, Dario ;
Palomba, Fabio ;
De Lucia, Andrea .
JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 190
[12]   Efficient realization of quantum balanced ternary reversible multiplier building blocks: A great step towards sustainable computing [J].
Faghih, Ehsan ;
Taheri, MohammadReza ;
Navi, Keivan ;
Bagherzadeh, Nader .
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2023, 40
[13]   Abstract interpretation, Hoare logic, and incorrectness logic for quantum programs [J].
Feng, Yuan ;
Li, Sanjiang .
INFORMATION AND COMPUTATION, 2023, 294
[14]   Forecasting Bike Sharing Demand Using Quantum Bayesian Network [J].
Harikrishnakumar, Ramkumar ;
Nannapaneni, Saideep .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 221
[15]   A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions [J].
Hildebrand, Brian ;
Baza, Mohamed ;
Salman, Tara ;
Tabassum, Simra ;
Konatham, Bharath ;
Amsaad, Fathi ;
Razaque, Abdul .
COMPUTER SCIENCE REVIEW, 2023, 48
[16]   PyQBench: A Python']Python library for benchmarking gate-based quantum computers [J].
Jalowiecki, Konrad ;
Lewandowska, Paulina ;
Pawela, Lukasz .
SOFTWAREX, 2023, 24
[17]   Software architecture for quantum computing systems - A systematic review [J].
Khan, Arif Ali ;
Ahmad, Aakash ;
Waseem, Muhammad ;
Liang, Peng ;
Fahmideh, Mahdi ;
Mikkonen, Tommi ;
Abrahamsson, Pekka .
JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 201
[18]   Scoping studies: advancing the methodology [J].
Levac, Danielle ;
Colquhoun, Heather ;
O'Brien, Kelly K. .
IMPLEMENTATION SCIENCE, 2010, 5
[19]   A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing [J].
Li, Kunchang ;
Shi, Runhua ;
Wu, Mingxia ;
Li, Yifei ;
Zhang, Xiaoxu .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
[20]   Quantum image scaling with applications to image steganography and fusion [J].
Li, Nianqiao ;
Yan, Fei ;
Venegas-Andraca, Salvador E. ;
Hirota, Kaoru .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2023, 117