Cyber Protection Applications of Quantum Computing: A Review

被引:0
|
作者
Ahmed, Ummar [1 ]
Sipola, Tuomo [1 ]
Hautamaki, Jari [1 ]
机构
[1] Jamk Univ Appl Sci, Inst Informat Technol, Jyvaskyla, Finland
来源
PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024 | 2024年 / 23卷
关键词
Quantum Computing; Cyber Security; Quantum Computing Applications; Cyber Protection; Quantum Algorithms;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum computing is a cutting-edge field of information technology that harnesses the principles of quantum mechanics to perform computations. It has major implications for the cyber security industry. Existing cyber protection applications are working well, but there are still challenges and vulnerabilities in computer networks. Sometimes data and privacy are also compromised. These complications lead to research questions asking what kind of cyber protection applications of quantum computing are there and what potential methods or techniques can be used for cyber protection? These questions will reveal how much power quantum computing has and to what extent it can outperform the conventional computing systems. This scoping review was conducted by considering 815 papers. It showed the possibilities that can be achieved if quantum technologies are implemented in cyber environments. This scoping review discusses various domains such as algorithms and applications, bioinformatics, cloud and edge computing, the organization of complex systems, application areas focused on security and threats, and the broader quantum computing ecosystem. In each of these areas, there is significant scope for quantum computing to be implemented and to revolutionize the working environment. Numerous quantum computing applications for cyber protection and a number of techniques to protect our data and privacy were identified. The results are not limited to network security but also include data security. This paper also discusses societal aspects, e.g., the applications of quantum computing in the social sciences. This scoping review discusses how to enhance the efficiency and security of quantum computing in various cyber security domains. Additionally, it encourages the reader to think about what kind of techniques and methods can be deployed to secure the cyber world.
引用
收藏
页码:10 / 17
页数:8
相关论文
共 50 条
  • [21] Quantum Computing for Applications in Data Fusion
    Stoos, Veit
    Ulmke, Martin
    Govaers, Felix
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2023, 59 (02) : 2002 - 2012
  • [22] Quantum computing applications for Internet of Things
    Peelam, Mritunjay Shall
    Rout, Anjaney Asreet
    Chamola, Vinay
    IET QUANTUM COMMUNICATION, 2024, 5 (02): : 103 - 112
  • [23] Superconducting quantum computing: a review
    He-Liang Huang
    Dachao Wu
    Daojin Fan
    Xiaobo Zhu
    Science China Information Sciences, 2020, 63
  • [24] Quantum Computing: Fundamentals, Implementations and Applications
    Bhat, Hilal Ahmad
    Khanday, Farooq Ahmad
    Kaushik, Brajesh Kumar
    Bashir, Faisal
    Shah, Khurshed Ahmad
    IEEE OPEN JOURNAL OF NANOTECHNOLOGY, 2022, 3 : 61 - 77
  • [25] Quantum Computing Applications in Future Colliders
    Gray, Heather M.
    Terashi, Koji
    FRONTIERS IN PHYSICS, 2022, 10
  • [26] A Testing Pipeline for Quantum Computing Applications
    Becker, Colin Kai-Uwe
    Gheorghe-Pop, Ilie-Daniel
    Tcholtchev, Nikolay
    2023 IEEE INTERNATIONAL CONFERENCE ON QUANTUM SOFTWARE, QSW, 2023, : 54 - 59
  • [27] Quantum software engineering and potential of quantum computing in software engineering research: a review
    Mandal, Ashis Kumar
    Nadim, Md
    Roy, Chanchal K.
    Roy, Banani
    Schneider, Kevin A.
    AUTOMATED SOFTWARE ENGINEERING, 2025, 32 (01)
  • [28] Symbolic Quantum Programming for Supporting Applications of Quantum Computing Technologies
    Miszczak, Jaroslaw Adam
    COMPANION PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON THE ART, SCIENCE, AND ENGINEERING OF PROGRAMMING, PROGRAMMING 2023, 2023, : 101 - 108
  • [29] A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing
    Kakkad, Vishruti
    Shah, Hitarth
    Patel, Reema
    Doshi, Nishant
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 680 - 685