Available via license: CC BY-NC-ND 4.0
Content may be subject to copyright.
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2023.DOI
Quantum Computing Integrated Patterns
for Real-Time Cryptography in Assorted
Domains
SHALLY NAGPAL1, SHIVANI GABA1, ISHAN BUDHIRAJA2, MEENAKSHI SHARMA3,
AKANSHA SINGH2, KRISHNA KANT SINGH4, S S AKSAR5, MOHAMED ABOUHAWWASH6,
AND CELESTINE IWENDI7
1Department of Computer Science and Engineering, Panipat Institute of Engineering and Technology,Samalkha, 132102, India.(e-mail: shally.ngpl@gmail.com,
sgsgknl@gmail.com)
2School of Computer Science Engineering and Technology, Bennett University, Greater Noida (U.P.), India.(e-mail: ishan.budhiraja@bennett.edu.in)
3Department of Electronics and Communication Engineering, Inderprastha Engineering College, Ghaziabad, Uttar Pradesh, India.(e-mail:
drmeenakshi220918@gmail.com)
4Delhi Technical Campus, Greater Noida (U.P.), India.(e-mail:krishnaiitr2011@gmail.com)
5Department of Statistics and Operations Research, College of Science, King Saud University, P.O. Box 2455, Riyadh 11451, Saudi
Arabia.(e-mail:saskar@ksu.edu.sa)
6Department of Mathematics, Faculty of Science, Mansoura University, Mansoura 35516, Egypt (e-mail:saleh1284@mans.edu.eg)
7School of Creative Technologies at the University of Bolton, United Kingdom (email: c.iwendi@bolton.ac.uk)
Corresponding author: Akansha Singh (e-mail: akansha1.singh@bennett.edu.in)
ABSTRACT Quantum computers use quantum-mechanical phenomena for knowledge manipulation and
depend on quantum bits or qubits. A qubit can be created in several different ways, and out of this, one
way of creating a quantum state is by using superconductivity. They must be held very cold to work on
these superconductive qubits for long periods. The key to information storage and manipulation is the skill
of all computer systems. Current traditional computers handle single bits stored in binary states of 0 and
1 form. Every temperature factor inside the device may be updated; thus, quantum computers are more
excellent than the vacuum of space at temperatures similar to absolute null. Consider how the dilution
refrigerator of a quantum computer consisting of over 2000 components provides a cold atmosphere for the
inside of the qubits. Researchers from all around the world today are using actual quantum processors for
validating algorithms for different fields of operation. Yet quantum computation was a strictly speculative
topic a couple of decades ago. Quantum cryptography, also known as quantum encoding, uses quantum
mechanics principles to encrypt messages in a way nobody else reads. It benefits quantum states, along
with its "theory of no transition," which means that it cannot be disrupted unknowingly. Quantum-improved
AI calculations are especially applicable to the area. This work focuses on the implementation patterns
of quantum computing in real-time cryptography so that the overall communication will be secured and
integrity aware.
INDEX TERMS Quantum cryptography; Real time cryptography; security; integrity in real world
environment
I. INTRODUCTION
In everyday use, quantum computers use ions or photons as
qubits, the critical segment of quantum physics. The crucial
part of creative problem solving is generating, controlling,
or manipulating qubits for high-performance and multi-
dimensional approaches. Superconductive circuits can be
operated at temperatures as low as those seen in outer space,
for example, at the low-temperature area for many companies
such as IBM, Google, and Rigetti. IonQ researchers use
ultra-high vacuum chambers to trap single atoms within
electromagnetic fields. However, in each situation, it is meant
to be isolated differently. According to current technology,
computers, current ones operate on ’pulses’ (an electrical or
optical stream of ones and zeros) [1]. [2] [3]
The fundamentals of Quantum Computing include a more
detailed overview of the fundamental principles of quantum
computing. This will encompass a discussion on quantum
bits (qubits), their unique properties, and the principles of
superposition and entanglement that distinguish quantum
computing from classical computing.
VOLUME 4, 2016 1
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
The introduction of quantum computing revolutionizes
our understanding of computation, delving into the realm
of quantum mechanics and offering unprecedented computa-
tional power and efficiency. Unlike classical computers that
operate based on bits in binary states of 0 and 1, quantum
computers leverage quantum bits or qubits, which can exist
in multiple states simultaneously due to principles like super-
position and entanglement. These unique properties enable
quantum computers to solve complex problems exponentially
faster than classical computers, making them particularly
promising for a wide range of applications.
Quantum computing architectures encompass various
models, from gate-model quantum computers utilizing quan-
tum circuits and logic gates to adiabatic quantum com-
puters and quantum annealers that tackle specific problem
classes. Recent advancements in quantum computing, such
as demonstrations of quantum supremacy, improvements in
quantum error correction techniques, and scalability of qubit
systems, highlight the rapid evolution of this field. Real-
world applications, including quantum-enhanced optimiza-
tion algorithms, simulations in material science, and break-
throughs in cryptography through algorithms like Shor’s for
integer factorization, underscore the practical relevance of
quantum computing across diverse domains.
However, alongside these advancements come significant
challenges. Qubit decoherence, arising from interactions with
the environment, remains a critical hurdle in maintaining
quantum coherence and executing error-free computations.
Addressing these challenges requires advancements in fault-
tolerant quantum computing and scalable quantum hardware,
paving the way for practical implementation in various sec-
tors.
The ongoing research endeavors aim to unlock the full po-
tential of quantum computing, realizing fault-tolerant quan-
tum computers, exploring new quantum algorithms for opti-
mization and machine learning, and revolutionizing indus-
tries ranging from finance to healthcare. The integration
of quantum computing with real-time cryptography opens
new horizons for secure communication and data processing,
with implications extending to smart cities, IoT, and beyond.
The Key Advancements in Quantum Computing on the
fundamental principles incorporate the key advancements in
quantum computing. This may include recent breakthroughs
in quantum hardware, novel algorithms, and notable achieve-
ments in the practical implementation of quantum processors.
Moreover, the practical implications of quantum computing
in real-world applications.
Quantum registering may bring supersonic medication
plan, in silico clinical preliminaries with virtual people re-
produced ’live,’ max control entire genetic sequencing and
examination, the development of emergency clinics to the
cloud, the accomplishment of prescient health, or the security
of clinical information using quantum vulnerability and high-
performance quantum computers are shown in Fig.1.
Qubits have specific strange quantum properties, meaning
that a set of them can deliver much greater computing capac-
FIGURE 1: High Performance Quantum Computers [26]
FIGURE 2: Bits and Qubits in Quantum Computing [6]
ity with the interlocking, and therein the critical dimensions
are required with high integrity [?], [?], [4], [5]. Qubits are
the main aspects of quantum computing, and it’s used in var-
ious implementations, including security, privacy, integrity,
optimization factors, and many others [?], as shown in Fig.2.
A. OVERLAY AND SUPERPOSITION
Numerous combinations of 1 and 0 can simultaneously serve
qubits. Superposition is called this potential to be concur-
rently in different states. To overlay qubits, researchers use
precise lasers or microwave beams to control them [?]. This
approach achieves a higher degree of accuracy with accuracy
in the implementation patterns. [7] [8]
The strength of quantum computers is critical, whereby
elevating the computing power with doubling in a traditional
device doubles the number of bits [?], [6], [9]–[14]. However,
the combination of additional qubits in a quantum computer
exponentially increases the numerical reduction capacity.
Superposition and Entanglement in Quantum Computing
are shown in Fig.3. Quantum computers use intertwined
qubits to work their magic through a quantum daisy chain
[15] [16]. This is the reason why there are so many excited
about their capacity for machines’ ability to speed up calcu-
lations by specific quantum algorithms. It is the critical base
of quantum systems with tremendous accuracy and minimum
errors [4] [17].
B. DECOHERENCE AND DECOMPOSITION IN
QUANTUM
Quantum computing integrates coherence and decoherence
and is called the breakdown between qubits and their sur-
rounding context. When two or more quantum particles are
2VOLUME 4, 2016
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
FIGURE 3: Superposition and Entanglement in Quantum
Computing [13]
TABLE 1: Classical Vs Quantum Computing
Parameters of
comparison
Classical
Computing
Quantum
Computing
Information processing Using Logic gates
like AND, OR
Using quantum
logic
Error rates Classical computing
has a less error rate
Quantum computing
has a high error rate
States and Phases Discrete Continuous
Suitability
Classical computing
is best suitable for the
daily processing
Quantum computing
is best appropriate
for data analysis
Operations Linear algebra Boolean algebra
incredibly close, their properties may be uncertain or ran-
dom. The minor vibration or temperature changes – called
quantum-speak "noise" – may cause them to overlap until
their task is performed correctly [18] [19]. This is why re-
searchers are doing their best to shield qubits in supercooled
fridges and vacuum rooms from the outside world. This
cooling factor and the controlled temperature is integrated
for performance in the implementation scenarios of quantum
systems [20]. However, noise also leads several mistakes
to slipping into equations, despite their attempts. Any of
them can be compensated by intelligent quantum algorithms,
which can help incorporate more qubits. However, develop-
ing a single, extremely stable "logical" qubit will likely re-
quire thousands of stable qubits [21] [22] [23]. This envisages
a quantum computer’s computing ability for assorted phases
FIGURE 4: Research Analytics by Statista [14]
and layers of implementations [24].
The numbers of bits are required to be controlled with
tremendous accuracy and maximum throughput, and that is
where a mathematical equation can be carried out, which is
clearly beyond even the powerful supercomputer’s grasp [25]
[26]. The number of qubits to do this is still uncertain because
researchers continue to discover new algorithms to improve
the efficiency of conventional machines, and supercomputer
software is improving [27].
There is much discussion in the field of science about how
important this landmark is to be achieved. Companies are
now beginning to test quantum computers from companies
such as IBM, Rigetti, and D-Wave, a Canadian company,
instead of waiting before the dominance is announced and
is implemented by corporate giants to massive implementa-
tion levels for social and corporate segments and growth of
quantum Computing by Statista is shown in Fig.4.
C. QUANTUM ALGORITHMS VS. CLASSICAL
ALGORITHMS IN CRYPTOGRAPHY
In this section, we delve into the fundamental differences
between quantum algorithms and classical algorithms in the
realm of cryptography, elucidating how their distinct features
impact their working mechanisms.
1) Quantum Algorithm Basics
1) Quantum Bits (Qubits):One of the foundational dispar-
ities lies in the representation of information. While
classical algorithms operate with classical bits, which
can exist in a state of 0 or 1, quantum algorithms
leverage quantum bits or qubits. Qubits, due to the
principles of superposition and entanglement, can exist
in multiple states simultaneously, enabling quantum
algorithms to perform parallel computations in a way
classical algorithms cannot.
2) Quantum Parallelism: Quantum algorithms harness
quantum parallelism to process a multitude of possibil-
ities simultaneously. Classical algorithms, on the other
hand, process each possibility sequentially. This inher-
ent parallelism grants quantum algorithms a potential
advantage in certain computational tasks.
3) Quantum Cryptographic Algorithms:
•Shor’s Algorithm for Integer Factorization: A
prominent example of the quantum advantage in
cryptography is Shor’s algorithm. This quantum
algorithm efficiently factors large integers expo-
nentially faster than the best-known classical algo-
rithms. The security of widely-used cryptographic
schemes, such as RSA, relies on the difficulty of
factoring large numbers. Shor’s algorithm intro-
duces a quantum speedup that poses a threat to the
classical security assumptions underpinning such
schemes.
•Grover’s Algorithm for Search: Grover’s algo-
rithm showcases another facet of quantum superi-
ority by providing a quadratic speedup in unstruc-
VOLUME 4, 2016 3
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
tured search problems. In the context of cryptog-
raphy, this algorithm can be applied to search a
database or an unsorted list, reducing the search
time significantly compared to classical search
algorithms.
4) Quantum Key Distribution (QKD):
•Quantum Entanglement in QKD: Quantum Key
Distribution (QKD) is a cryptographic protocol
that utilizes the principles of quantum mechanics
to secure communication channels. Unlike clas-
sical key distribution methods, QKD leverages
quantum entanglement to establish a shared secret
key between two parties. The security of the key is
guaranteed by the principles of quantum mechan-
ics, making it resistant to eavesdropping attempts.
•No-Cloning Theorem: The No-Cloning Theorem,
a fundamental principle of quantum mechanics,
states that an arbitrary unknown quantum state
cannot be cloned perfectly. This theorem is ex-
ploited in quantum cryptography to detect any at-
tempt to intercept or clone quantum keys. Classical
key distribution systems do not benefit from this
inherent quantum protection.
5) Post-Quantum Cryptography:
•Quantum Threats to Classical Cryptography: The
advent of quantum computing introduces new
challenges to classical cryptographic systems. Al-
gorithms such as Shor’s can potentially break
widely-used public-key cryptosystems. As a re-
sponse, the field of post-quantum cryptography
is actively exploring cryptographic schemes that
resist quantum attacks, ensuring the continued se-
curity of communication in a post-quantum era.
6) Quantum Cryptographic Protocols:
•Quantum Coin Protocols: Quantum cryptographic
protocols, such as quantum coin disputes, illustrate
the unique challenges and advantages presented by
quantum communication. These protocols lever-
age the properties of quantum mechanics to es-
tablish secure and tamper-evident communication
channels between untrusted participants.
7) Challenges and Opportunities:
•Quantum Errors and Noise: Quantum algorithms
face challenges such as errors and noise due to
the delicate nature of quantum states. Implement-
ing error-correction techniques becomes crucial to
maintain the integrity of quantum cryptographic
systems. Classical algorithms, not subject to quan-
tum noise, do not face this particular challenge.
In conclusion, quantum algorithms in cryptography harness
the principles of quantum mechanics to perform computa-
tions and establish secure communication channels in ways
that classical algorithms cannot replicate. The parallelism
that qubits provide, the effectiveness with which they solve
FIGURE 5: IBM Quantum Computer [30]
particular issues, and the distinctive characteristics of quan-
tum cryptography highlight the transformative potential of
quantum technologies in the field of information security.
II. USE CASES OF QUANTUM COMPUTING
Quantum encryption is the knowledge of using quantum me-
chanical properties to carry out encryption activities. Quan-
tum encryption is the best-known example of a quantum key
distribution that provides an informatively safe approach to
the critical exchange problem [28]. The benefit of quantum
cryptography is that the completion using conventional (non-
quantum) communication only of different cryptographic
activities can be proved or supposedly unlikely. For instance,
data encoded in a quantum state cannot be copied. The quan-
tum condition is modified as you try to decipher the coded
data by collapsing the wave function (no-cloning theorem).
This can track the number of main deliveries eavesdropping
[29]. In the data-protection chain, cryptography is the most
potent component. However, stakeholders cannot believe that
encryption keys remain forever stable. The topic of quantum
cryptography encompasses various cryptographic practices
and protocols. The following discusses some of the more
significant applications and protocols [5] [31].
Quantum key distribution (QKD) is the most often used for
situations where a third party cannot uncover the key even
though Person-1 and Person-2 may exchange information.
If a third party wants to think about the key to be found,
there would be inconsistencies between Person-1 and Person-
2. Using traditional methods, the key is then usually used for
secure communications. For example, for symmetric cryp-
tography, the exchanged key may be used [32] [33].
It was shown mathematically that, unlike standard key
distribution, Quantum Key Distribution (QKD) would not
restrict the eavesdropping of an adversary. It is commonly
known as "unconditional security and protection aspects";
however, different laws of quantum mechanics are needed,
i.e., Person-1 should be able to authenticate him, and Person-
2 should be unable to impersonate him [34]–[36].
Although QKD does look good, the prospect of success-
4VOLUME 4, 2016
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
fully implementing it is challenging. This is attributable
to the inadequate distance between primary and secondary
power plants. The new and continuing investigation results
have just widened the boundaries. Two-field QKD (TF-QD)
approach could theoretically solve the scaling out of a failure
channel in the twinning flow method and demonstrate that its
covert function, known as the PLOB, was no longer present
at 340 km of optical fiber; in reality, it surpassed it at 200 km
before hitting the loss-scaling of its non-repeating primary
capability. They were unable to follow up. The analysis
indicates that "550-kilometer standard fiber," still the default
for modern communications, can get optimal performance.
Though TF-QD tends to increase local network bandwidth,
the Sending-Not-Sending (SNS) Version yields impressive
overall speed over long distances.
III. QUANTUM ENCRYPTION AND SECURITY
PERSPECTIVES
The parties involved do not trust each other in mistrustful
cryptography. For example, Person-1 and Person-2 join pri-
vate entries to carry out the calculation. They work together
[37], [38]. But Person-1 has no faith in Person-2, and Person-
2 has no trust in Alice [39]. So, a stable cryptographic job
demands that Person-1 can promise that Person-2 has not
cheated after the calculation has been completed and that
Person-2 is therefore specific that Person-1 has not fooled.
E.g., commitments and stable calculations, including other
cases of coin flipping and forgetful transfer, work in mis-
trusted cryptography. The key distribution is not in the field of
mistrustful encryption [40]. The wary quantum cryptography
uses quantum systems to examine the area of manipulative
cryptography and can be integrated to track the communica-
tion and sniffing attempts [41].
Protocols not only use quantum mechanics but may pro-
vide total security if it also utilizes special relativity. To name
a few, Mayers each provided "confirmed proof" instances of
unconditionally secure quantum bit involvement. This is the
process: After lo and Chau reached the perfect quantum gold,
they had no chance of bringing more bricks to the mission. Lo
has proven that one out of two ignorant transfers and the other
two would still be unsafe. I’m working my way down the
list, writing the following are the following: However, Kent
has shown these "relativistic" and "primitive" protocols to be
somewhat conservative.
A. QUANTUM COMPUTING AND REAL TIME
CRYPTOGRAPHY
Contrary to the distribution of quantum keys, quantum coins
are a protocol between two participants that have no con-
fidence in each other. Participants can interact and share
information through qubits. Via a quantum channel, Person-
1 and Person-2 are not confident of each other, so everyone
wants the other to lie. More work, therefore, needs to be done
to ensure that neither Person-1 nor Person-2 will achieve a
significant advantage over the others to generate a desirable
result. The power to manipulate a particular outcome is called
FIGURE 6: Quantum based Secured Communication
FIGURE 7: Quantum based Channel
a bias, and protocols that reduce a deceptive player’s bias
are developed [42] [43]. Stealing is otherwise known, as
shown in Fig. 6. Regarding quantum communication proto-
cols, including the quantum coin reversion, significant safety
benefits have been demonstrated over traditional commu-
nication, but in practice, they are difficult to achieve [44].
Manipulation and tampering happen when a player tries to
manipulate a specific outcome or increases its likelihood
[31] [28]. For example, Person-1 could cheat by arguing
that Person-2 wrongly guessed her initial foundation when
he correctly thought, but Person-1 will have to create a
new string of qubits that exactly matches what Person-2
calculated on the other side of the table. Her probability of
producing a similar qubit will decline exponentially, and if
Person-2 notes a misunderstanding, he will know that she
lied. Person-1 can also create a chain of photons with a
combination of states, but Person-2 can see that her chain
partly (but not entirely) correlates with the two sides of the
table and knows that she is tricked in the process. An intrinsic
defect of existing quantum devices still exists. Errors and lost
qubits can impact the measures of Person-2 and lead to gaps
in the measuring table of Bob. Significant calculation losses
would impair the capacity of Person-2 in a step to validate
the qubit sequence of Person-1 [45]. It is possible to have the
Einstein-Podolsky-Rosen (EPR) paradox, that’s certain. Two
photons in anisotropic; two, polarized, for as long as they
are measured the same way, are in an EPR pair [40] [33]. A
Person could do this. Person-1 could transmit one photon to
Person-2 and save Person-2’s bits. Meanwhile, Person-2 will
be determining her EPR photon pairs on the other side of
the room and establishing an ideal relation to the other table.
She never knew that she was breaking the rules as long as
that did all well. It will take quantum-based technology that
does not currently exist, which, in reality, is impossible. To be
effective, Person-1 should be able to store and count nearly
all the photons effectively, as shown in Fig. 7. This may be
VOLUME 4, 2016 5
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
because all missing photons count as nulls in the series. The
overall communications using such an approach are highly
monitored and can be tracked.
Quantum coin disputes are typically seen in situations
where mistrust is involved. To build a reward program, you
have to measure a benefit that Person-1 can’t alter, and
recipients won’t know about it until Person-1 has the chance
to comment about it. It cannot be changed. Such strategies
are often used in cryptography.
It has been integrated that an absolute-safety protocol can
be constructed from a pledge and a quantum tube [39]. At the
same time, simultaneously, Kilian developed a slight touch,
on the other hand, had an obscure distribution method that
allowed almost any computing device to be transported safely
(so-called secure multiparty computation). Let’s clear it up
and say that we are unsure about the wording because we are
only aware of the gist of the definition of the concept) Let’s
clarify that we are aware only of the gist of the concept. One
can conduct multiparty computation given dedication and a
quantum channel (it does not necessarily have to be physi-
cal). Researchers cannot make any claims about ’possibility,’
which means you can lose defense of the study results [46]
[43].
Consequently, it has been shown that protocols for the
early stages of quantum engagement are invalid. Mayers
showed that no unconditionally stable quantum protocol is
possible: the only kind of attack that a computationally
limited attacker might launch is a running botnet. Even if
Mayers can be successfully applied under conditions that are
considerably weaker than sufficient for multi-card compu-
tation, there remains the probability of quantum protocols
(and, thus, multiparty protocols). Below is an example of how
quantum communication can be used to develop engagement
protocols. The movement in, November 2013 introduces
"conditional encryption," first seen internationally. The cur-
rent scenarios are learning a new approach called "perfectly
unconditional hiding," recently proposed by Wang et al.
constructions without the use of error-correcting subsystems
(CTE) (BQSM) [47]–[52]. This model postulates that the
quantity of data an adversary can store has a known upper
limit, the Q limit. However, constrained is not by the sum of
classical (i., non-quantum) data they can keep. As the actual
knowledge (as represented by a quantum memory of Qubit
opposition) is deceptive, the proof is often calculated, or
inconsistent competition between researchers allows a large
amount of evidence to be measured by dishonest individuals
[?].
Damä, Fehr, and Schaffner suggested that BQSM proce-
dures were never meant to help the would-be engineers to
save quantitative data for everybody. At least, it is possible
to perform these tasks using today’s state-of-the-the-the-art
technology protocol implementations minor. The correspon-
dence of creativity is only more significant than the constraint
set of the adversary only knows one thing: Everything that
has ever been written [?].
It provides an advantage to the BCNOS algorithm by
assuming that the quantum memory of the competition oppo-
nents is weak. In the current day and age, single-qubit storage
is challenging. This depends on the exact protocol.) By
delaying the protocol, more time is allowed to be spent in the
quantum storage cycle. According to the Wehner, Schaffner,
and Terhal containment noises, the BQSM is implicated [53]
[42]. Rather than limit the physical scale of his memory,
an adversary can make incomplete use of available quantum
devices of varying sizes. Sound canals are unavoidable due to
the constant uncertainty at the quantum level Primitives are
returned with sufficiently high noise levels as in the BQSM,
and it is a model about noisy storage models [9].
Similar findings can be obtained in the classic setting if
the opponent can record a bond to the quantity of definitive
(non-quantum) data. The report was released. However, it has
been shown that the honest parties still need to use a lot of
memorandum in this model (especially the square root of the
opponent’s memory).
B. QUANTUM ENCRYPTION DEPENDING ON POSITION
Quantifying quantitative positioning aims to use a player’s
geographical location as its (only) credential. You want, for
instance, to send a message to a player in a particular position
to ensure it can only be read if the recipient party is in that
same position [54] [55]. A player, Alice, needs to persuade
the (honest) verifiers in the simple task of verifying the
location that she’s in a given place. Checking positions us-
ing classical protocols against colluded opposing opponents
(those who govern all functions except the claimed location
of the prover) was shown by Chandran et al. Schemes are
possible under different conditions on the opponents [10].
In 2002, Kent researched his position-based quantum sys-
tems, referred to as "quantum tagging" today. At the end of
2006, a U.S. patent was granted. The verge of a scientific
breakthrough in using quantum effects for location checking
appeared in the literature in 2010. The research of the Council
of Europe (Council of Europe study) noted that the survey
shows black people don’t know how to give or receive
instructions for gifts the same way that white people do [56]
[57]. Thus other protocols to guarantee this are still refuted.
In 2011, Buhrman et al. reported that using a large quantity
of quantum entanglement had been unable to consistently
provide the result (they use a double exponential number
of EPRs, the number of qubits in which the honest player
works). This result proves that the theory is wrong, but it
does not invalidate the hypothesis of highly efficient quantum
storage [11]. This pushed Beigi and König to develop new
position authentication protocols. Lastly, they proved that an
opponent is still robust under a certain amount of control
by showing that their vulnerabilities remain linear, assum-
ing their protocols still have a linear number of connected
edges. Systematic checks are possible because time and
energy by quantum effects are not addressed. Notice that
the position study in quantum cryptography also discusses
a more complex version of port-based teleportation called
qubit teleportation [58].
6VOLUME 4, 2016
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
C. QUANTUM COMPUTING AND REAL-TIME
CRYPTOGRAPHY: A UNIFIED MODEL
In this section, we aim to elucidate the synergy between
quantum computing and real-time cryptography, providing a
comprehensive understanding of their collective functional-
ity.
1) Quantum Coin Protocols for Untrusted Participants
The introduction of quantum coins as a protocol between
untrusted participants necessitates an exploration of the dy-
namics between Person-1 and Person-2. Through the use
of qubits and a quantum channel, both individuals navi-
gate a scenario where mutual distrust prevails. Protocols
are introduced to mitigate biases, preventing any participant
from gaining a significant advantage. Quantum coin disputes,
often arising in mistrustful situations, involve strategies that
measure benefits resistant to alteration by Person-1, aligning
with principles employed in cryptography.
2) Challenges in Quantum Communication Protocols
While quantum communication protocols, including quan-
tum coin protocols, demonstrate significant safety benefits
over traditional communication, practical challenges exist.
Manipulation and tampering, where a player attempts to
influence outcomes or increase their likelihood, pose threats.
We delve into scenarios where Person-1 may attempt de-
ception but faces challenges due to exponential declines
in probability, photon chain correlations, and the intrinsic
defects in existing quantum devices.
3) Quantum Coin Disputes and Cryptographic Strategies
Quantum coin disputes are particularly relevant in situations
involving mistrust [59]. The section highlights the use of
cryptographic strategies to establish a reward program where
the benefits are resistant to manipulation. The integration of
absolute-safety protocols using pledges and quantum chan-
nels is explored, emphasizing the potential for secure multi-
party computation.
4) Challenges and Opportunities in Quantum Protocols
Mayers’ work on unconditionally stable quantum protocols is
discussed, emphasizing the limitations of such protocols un-
der computationally limited attacks. The introduction of con-
ditional encryption and the exploration of "perfectly uncon-
ditional hiding" present current scenarios and advancements,
including considerations of quantum memory constraints and
potential dishonest practices.
5) Quantum Memory Considerations and Noise Levels
We delve into the challenges posed by quantum memory
considerations and the implications of noise levels in pro-
tocols [60]. The BCNOS algorithm and its advantage over
adversaries with weak quantum memory are discussed. Con-
siderations of noise levels in storage models, such as the
BQSM, highlight the unavoidable nature of sound canals and
their impact on quantum storage.
6) Implications for Real-Time Models
The collective insights from quantum computing and real-
time cryptography are then synthesized to discuss their impli-
cations for real-time models. We elaborate on how quantum
protocols and cryptographic strategies collectively contribute
to enhancing the security and efficiency of real-time commu-
nication.
IV. INNOVATIONS FOR REAL-WORLD APPLICABILITY
This section aims to augment our model study by incorpo-
rating innovations adapted for real-world applications. While
our exploration of quantum computing and cryptography
applications across diverse sectors is comprehensive, we rec-
ognize the importance of aligning our research with current
developments and practical considerations.
A. PRACTICAL IMPLEMENTATION STRATEGIES
- This aspect focuses on bridging the gap between theoretical
concepts and practical deployment of quantum computing
and cryptography. It involves addressing challenges related
to hardware limitations, scalability issues, and ensuring com-
patibility and interoperability with existing systems. Practical
implementation strategies delve into the technical aspects of
integrating quantum technologies into real-world scenarios,
considering factors such as resource constraints, performance
optimization, and system stability.
B. ADVANCES IN QUANTUM KEY DISTRIBUTION (QKD)
- Quantum Key Distribution (QKD) is a critical component
of quantum-safe cryptography, and recent advancements in
this field have significantly enhanced the security of cryp-
tographic communication. This innovation emphasizes the
exploration of cutting-edge QKD techniques that improve
the generation and distribution of cryptographic keys in real-
time scenarios. By incorporating these advances, our study
remains at the forefront of ensuring secure communication
channels in quantum computing environments.
C. QUANTUM-SAFE CRYPTOGRAPHY STANDARDS
- As quantum computing poses a potential threat to traditional
cryptographic systems, there is a pressing need for develop-
ing quantum-safe cryptography standards and protocols. This
innovation involves investigating the latest developments in
cryptographic techniques that are resilient against quantum
attacks. By staying updated on evolving standards, our re-
search provides insights into implementing robust crypto-
graphic systems capable of withstanding quantum threats in
practical applications.
D. QUANTUM CLOUD COMPUTING INTEGRATION
- Cloud computing has become integral to modern IT in-
frastructures, and the integration of quantum computing with
cloud platforms presents both opportunities and challenges.
This innovation explores how quantum algorithms can be de-
ployed and managed within cloud environments to leverage
VOLUME 4, 2016 7
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
scalable resources and distributed computing capabilities.
Understanding the benefits and challenges of quantum cloud
computing is crucial for deploying quantum applications in
real-world scenarios effectively.
E. CROSS-DISCIPLINARY APPLICATIONS
- Quantum computing and cryptography have transformative
potential across various domains beyond traditional IT and
cybersecurity [61]. This innovation highlights the diverse ap-
plications of quantum technologies in sectors such as health-
care, finance, logistics, and more. By showcasing cross-
disciplinary applications, our study demonstrates the broad
spectrum of real-world scenarios where quantum solutions
can offer significant advancements and improvements.
F. QUANTUM ERROR CORRECTION CONSIDERATIONS
- Quantum systems are inherently susceptible to errors due to
environmental factors and quantum decoherence. Quantum
error correction techniques play a vital role in mitigating
these errors and improving the reliability of quantum compu-
tations. This innovation focuses on discussing current state-
of-the-art error correction methods and their applicability in
real-world quantum computing scenarios. Addressing error
correction challenges is essential for ensuring the practical
viability of quantum computing technologies.
G. CONSIDERATIONS FOR QUANTUM CRYPTOGRAPHY
ADOPTION
- Adopting quantum-safe cryptographic methods involves
more than just technical aspects. This innovation explores
practical considerations such as integration with existing
communication infrastructure, user acceptance, regulatory
compliance, and overall feasibility. Understanding the chal-
lenges and opportunities associated with quantum cryptog-
raphy adoption is crucial for successful implementation and
deployment in real-world communication systems.
These refined innovations collectively contribute to mak-
ing our study more relevant, practical, and aligned with the
current landscape of quantum computing and cryptography
in real-world applications. By addressing these key areas,
we aim to provide valuable insights and guidance for re-
searchers, practitioners, and decision-makers navigating the
complexities of quantum technologies.
V. PRACTICAL SIGNIFICANCE AND REAL-WORLD
IMPLICATIONS
The practical significance of our research is further under-
scored by incorporating case studies and examples from var-
ious domains. These real-world illustrations not only validate
the relevance of our research but also highlight its potential
impact in diverse contexts.
For instance, consider the application of quantum com-
puting in optimizing supply chain logistics. By leveraging
quantum algorithms for route optimization and inventory
management, companies can significantly reduce costs and
improve efficiency. Case studies showcasing such implemen-
tations provide tangible evidence of how quantum computing
can revolutionize traditional processes.
In the healthcare sector, quantum computing holds promise
for accelerating drug discovery and personalized medicine.
Quantum simulations can model complex molecular interac-
tions, leading to the development of novel pharmaceuticals
and treatment strategies. Real-life examples of successful
drug discovery initiatives powered by quantum computing
emphasize its transformative potential in advancing health-
care outcomes.
Furthermore, in the finance industry, quantum computing
can revolutionize risk analysis, portfolio optimization, and
fraud detection. By analyzing vast datasets and perform-
ing complex calculations at unprecedented speeds, quan-
tum computers can provide valuable insights for mak-
ing informed financial decisions. Case studies highlighting
quantum-enhanced financial analytics demonstrate the prac-
tical benefits of integrating quantum technologies in the
finance sector.
Additionally, the integration of quantum computing with
cryptography opens new frontiers in cybersecurity. Quantum-
safe encryption algorithms protect sensitive data from quan-
tum threats, ensuring secure communication channels in
an era of advancing technologies. Examples of quantum-
resistant cryptographic protocols in action showcase the
critical role of quantum computing in safeguarding digital
information.
These case studies and examples collectively emphasize
the potential consequences and real-world applications of our
research. They provide concrete evidence of how quantum
computing can drive innovation, improve efficiency, enhance
security, and ultimately impact various sectors in meaning-
ful ways. By showcasing these practical implications, our
research contributes to bridging the gap between theoretical
concepts and practical implementations, paving the way for
a quantum-powered future across diverse domains.
The case studies can be elaborated in different subsections
which are discussed below:
A. IN-DEPTH CASE STUDIES
The case studies serve as tangible examples, showcasing
how quantum computing integrated patterns can be applied
to address specific challenges in real-world scenarios. By
delving deeper into these examples, we aim to highlight the
versatility and adaptability of our proposed patterns.
B. QUANTIFIABLE IMPACT
By discussing measurable outcomes, efficiency improve-
ments, and advancements in security achieved through the in-
tegration of quantum computing into real-time cryptography,
we aim to provide a clearer picture of the tangible benefits of
our work.
8VOLUME 4, 2016
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
FIGURE 8: Quantum Programming and Circuit Formation
C. INDUSTRY-SPECIFIC CONSEQUENCES
Recognizing the diverse nature of our case studies, we ex-
plicitly highlight the consequences and implications of our
research within different industries. Tailoring our discussions
to industry-specific contexts underscores the versatility of
Quantum Computing Integrated Patterns, emphasizing how
they can be adapted to address unique challenges within
various sectors.
D. FUTURE SCENARIOS AND TRENDS
Anticipating the evolving technological landscape, we incor-
porate discussions on future scenarios and emerging trends.
By exploring how our research might shape or respond to
changing dynamics, we position our work as not only rele-
vant in the present but also forward-thinking and adaptable
to future challenges.
E. USER PERSPECTIVES
Including perspectives from potential end-users or stakehold-
ers enriches our discussion on the practical significance and
consequences of implementing Quantum Computing Inte-
grated Patterns. By incorporating user viewpoints, we pro-
vide a more holistic understanding of how our research can
be perceived, adopted, and adapted in real-world contexts.
VI. IMPLEMENTATION PATTERNS
The implementation frameworks for quantum computing are
in development; still, Python is one of the high-performance
programming platforms that can be used for quantum-based
real-time cryptography. Any fiber-optic cable may be an ex-
ample of a quantum communication medium through which
we can transmit individual photons (particles of light). Pho-
tons are called polarization and may be one of two states.
Photons are called polarization. We can use this qubit, as
shown in Fig. 8, Fig.9, and Fig 10.
The accompanying Tab. 1 portrays the security boundary
dissected on simulation with grouped methodologies, includ-
ing old-style crypto-sign and quantum-based unique security
with successful security [62] [63]. The conventional method
of crypto-signals incorporates the vital trade with old-style
hash generation; however, it is powerless and ineffective for
real-time situations. The execution examples of quantum-
based security are utilizing ongoing key generation and
having its record in the unique history that depends on the
FIGURE 9: Log Generation in Quantum Cryptography
FIGURE 10
center advancements of quantum. Quantum Cryptography
Performance Analytics is shown in Fig. 11.
A. INTEGRATION OF BASE ADAPTIVE
COMMUNICATION
The present chapter describes the performance comparison
between existing and proposed techniques and is divided
into three sections. The first describes the working of the
current base adaptive communication technique, followed
by another area that deals with the working of proposed
genetic and quantum improved communication [64] [65].
The section focuses on the performance comparison between
FIGURE 11: Algorithm and Implementation Patterns Quan-
tum Cryptography
VOLUME 4, 2016 9
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
TABLE 2: Evaluation Patterns Quantum Analytics
Crypto-Signal Based
Approach
Quantum Based
Security Integration
78 96
82 96
73 94
83 92
86 96
89 96
70 96
72 89
83 92
83 89
84 93
81 97
83 96
70 92
78 96
FIGURE 12: Quantum Cryptography Performance Analytics
the existing base adaptive transmission and proposed genetic
and quantum improved encoding.
The plot shows the communication analysis in the existing
approach, as shown in Fig. 12. The base adaptive commu-
nication method represents the packet transmission versus
packet loss.
B. INTEGRATION OF QUANTUM ENCODING FOR
ELEVATION OF OUTCOMES AND PERFORMANCE
The outcomes and plot represent the communication analysis
of the proposed genetic and quantum encoding communica-
tion. It shows the packet lost versus packet transmitted in the
proposed approach.
C. INTEGRATION OF BASE ADAPTIVE
COMMUNICATION
The present chapter describes the performance comparison
between existing and proposed techniques and is divided
into three sections. The first describes the working of the
current base adaptive communication technique, followed
by another area that deals with the working of proposed
genetic and quantum improved communication [66] [67].
The section focuses on the performance comparison between
the existing base adaptive transmission and proposed genetic
and quantum improved encoding.
The plot shows the communication analysis in the existing
approach, as shown in Fig. 12. The base adaptive commu-
FIGURE 13: Packet Communication Analysis (Classical Ap-
proach)
FIGURE 14: Integration of Quantum Algorithm
FIGURE 15: Integration of Quantum Algorithm
10 VOLUME 4, 2016
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
FIGURE 16: Quantum Cryptography Performance Analytics
FIGURE 17: Packet Communication Analysis (Classical Ap-
proach)
nication method represents the packet transmission versus
packet loss.
D. INTEGRATION OF QUANTUM ENCODING FOR
ELEVATION OF OUTCOMES AND PERFORMANCE
The outcomes and plot represent the communication analysis
of the proposed genetic and quantum encoding communica-
tion. It shows the packet lost versus packet transmitted in
the proposed approach. Here the results show the relative
examination in ways of packet communication. The x-axis
FIGURE 18: Integration of Quantum Algorithm
FIGURE 19: Packet Loss Analysis (Comparative)
TABLE 3: Packet Loss Analysis
No. of packets
transmit
Packet Transmit/Packet Lost
(In Existing)
Packet transmit/packet lost
(Proposed)
34 28/6 30/4
46 35/11 40/6
60 47/13 50/10
indicates the number of rounds, and the y-axis shows the bun-
dle correspondence. The green line addresses the amount of
packet communication in the event of the proposed approach.
The outcomes show that the technique has further developed
packet communication over the network. The observations
taken for the packet loss in case of existing and proposed
work are shown here in the tabular outcomes [68]. The
results represent the communication analysis between the
current and proposed approaches. It shows that the overall
packet transferred in the proposed is better than the existing
approach, as shown in Fig. 13.
Here the figure shows the comparative investigation as far
as packet loss. Here x-axis indicates the number of rounds,
and the y pivot offers the packet communication. The green
line here addresses the amount of packet loss if the proposed
approach should occur. The outcomes show that the strategy
has diminished the packet loss over the organization. The per-
ceptions assumed for the packet loss in the event of existing
and proposed work are displayed in the accompanying table.
Here Tab. 2 shows the packet loss that occurs in existing
and proposed approaches. The mobility in the network is here
defined at the node level, and the nodes perform the switching
between the regional coverage. The figure shows that the
communication loss is continuously high in the case of the
existing approach.
With the implementation of the quantum computing-based
toolkits in Python, the overall security and integrity in the
communication are elevated, and secured communication
takes place. In constructing quantum key distribution proto-
cols, quantum cryptography has been primarily established
so far. Sadly, for many users (large networks), the need for
setup and the manipulation of many pair-secret keys makes
VOLUME 4, 2016 11
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
symmetrical cryptosystems with keys distributed through the
quantum key distribution unaffordable ("key-management
problem"). It does not solely deal with cryptographic op-
erations and is much more important in everyday use. The
secured protocols use the quantum-like approach to key dis-
tribution, which employs three stages of classical algorithms
to perform its three communication phases.
VII. CONCLUSION
Quantum computing is a kind of implementation that needs
much verisimilitude soon for various applications of social
and corporate domains. The single most exciting applications
of quantum computers are the ability to model molecules
for real-world applications. Many corporate segments, in-
cluding Daimler and Volkswagen, use quantum computers
to find innovative and improved ways of increasing the
energy efficiency of electric vehicle (battery) models. They
are also tested to be used for their potential in novel pharma-
ceuticals. The machines can quickly crunch through many
possibilities because they’re made to crunch rapidly to solve
optimization problems. In other words, for example, Airbus
uses these as measurements of the most fuel-efficient route
and altitude. Volkswagen has developed a route planning
service that calculates the perfect ways for buses and taxis to
minimize congestion. Many of the researchers in the field so
far still expect that computers can assist in the development
of artificial intelligence. Quantum computers will not likely
realize their full potential for a long time. On the other hand,
though, new computing networks are expected to meet their
pledge, whole industries can be changed, and the entire world
economy can be benefited. Quantum computing is not limited
to cryptography but can be integrated for cloud applications,
wireless implementations, smart cities, the Internet of Things
(IoT), grid systems, and many others where a higher degree
of performance and accuracy is required. [1]
VIII. ACKNOWLEDGMENT
Researchers Supporting Project number (RSP2024R167),
King Saud University, Riyadh, Saudi Arabia
IX. FUNDING
This project is funded by King Saud University, Riyadh,
Saudi Arabia. Researchers Supporting Project number
(RSP2024R167), King Saud University, Riyadh, Saudi Ara-
bia
REFERENCES
[1] J. Domingo-Ferrer, S. Ricci, and J. Soria-Comas, “A methodology to
compare anonymization methods regarding their risk-utility trade-off,”
Lecture Notes in Computer Science, p. 132–143, 2017.
[2] A. Aggarwal, S. Gaba, J. Kumar, and S. Nagpal, “Blockchain and au-
tonomous vehicles: Architecture, security and challenges,” in 2022 Fifth
International Conference on Computational Intelligence and Communica-
tion Technologies (CCICT). IEEE, 2022, pp. 332–338.
[3] S. Gaba, S. Nagpal, and A. Aggarwal, “A comparative study of convo-
lutional neural networks for plant phenology recognition,” in Advanced
Sensing in Image Processing and IoT. CRC Press, 2022, pp. 109–136.
[4] T. Fuhr and P. Paillier, “Decryptable searchable encryption,” Lecture Notes
in Computer Science, p. 228–236, 2007.
[5] K.-A. Shim, “A survey of public-key cryptographic primitives in wire-
less sensor networks,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, p.
577–601, 1st Quart. 2016.
[6] Quantum computing developments chart. [Online]. Available:
https://www.statista.com/chart/17896/quantum-computing-developments/
[7] S. Gaba, S. Nagpal, A. Aggarwal, R. Kumar, and S. Kumar, “An analysis
of internet of things (iot) malwares and detection based on static and dy-
namic techniques,” in 2022 Seventh International Conference on Parallel,
Distributed and Grid Computing (PDGC). IEEE, 2022, pp. 24–29.
[8] P. Singh, G. Bathla, D. Panwar, A. Aggarwal, and S. Gaba, “Perfor-
mance evaluation of genetic algorithm and flower pollination algorithm
for scheduling tasks in cloud computing,” in International Conference on
Signal Processing and Integrated Networks. Springer, 2022, pp. 139–154.
[9] J. S. V. Srinivasan and K. Whitehouse, “Protecting your daily in-home
activity information from a wireless snooping attack,” p. 202–211, 2008.
[10] S. S. V. K.-P. Y. Y. X. Gao, B. Firner and J. Lindqvist, “Elastic pathing:
Your speed is enough to track you,” Sep. 2014.
[11] Quantum computing developments. [Online]. Available:
https://www2.itif.org/2018-tech-explainer-quantum-computing.pdf
[12] Future with quantum computers. [Online]. Available: https://www.c-
sharpcorner.com/article/future-with-quantum-computers/
[13] Ibm promises 100x faster quantum computing in 2021.
[Online]. Available: https://www.extremetech.com/computing/319759-
ibm-promises-100x-faster-quantum-computing-in-2021
[14] Creating the heart of a quantum computer: Developing qubits.
[Online]. Available: https://www.energy.gov/science/articles/creating-
heart-quantum-computer-developing-qubits
[15] S. Gaba, S. Nagpal, A. Aggarwal, S. Kumar, and P. Singh, “A modified
approach for accuracy enhancement in intruder detection with optimally
certain features,” in Mobile Radio Communications and 5G Networks:
Proceedings of Third MRCN 2022. Springer, 2023, pp. 149–157.
[16] S. Gaba, I. Budhiraja, V. Kumar, and A. Makkar, “Federated learning
based secured computational offloading in cyber-physical iost systems,”
in International Conference on Recent Trends in Image Processing and
Pattern Recognition. Springer, 2022, pp. 344–355.
[17] S. Gaba, D. Kumar, S. Nagpal, and A. Aggarwal, “A quick analysis on
cyber physical systems for sustainable development,” Grenze International
Journal of Engineering Technology (GIJET), vol. 8(1), 2022.
[18] P. Consul, I. Budhiraja, D. Garg, and A. Bindle, “Power allocation scheme
based on drl for cf massive mimo network with uav,” in Innovations in
Information and Communication Technologies: Proceedings of ICIICT
2022. Springer, 2022, pp. 33–43.
[19] A. Aggarwal, S. Gaba, S. Chawla, and A. Arya, “Recognition of alphanu-
meric patterns using backpropagation algorithm for design and implemen-
tation with ann,” International Journal of Security and Privacy in Pervasive
Computing (IJSPPC), vol. 14(1), pp. 1–11, 2022.
[20] H. Sharma, I. Budhiraja, P. Consul, N. Kumar, D. Garg, L. Zhao, and
L. Liu, “Federated learning based energy efficient scheme for mec with
noma underlaying uav,” in Proceedings of the 5th international ACM
mobicom workshop on drone assisted wireless communications for 5G
and beyond, 2022, pp. 73–78.
[21] S. Gaba, A. Aggarwal, and S. Nagpal, “Role of machine learning for ad hoc
networks,” in Cloud and IoT-Based Vehicular Ad Hoc Networks. Wiley
Online Library, 2021, pp. 269–291.
[22] A. Aggarwal, S. Gaba, S. Nagpal, and B. Vig, “Bio-inspired routing in
vanet,” in Cloud and IoT-Based Vehicular Ad Hoc Networks. Wiley
Online Library, 2021, pp. 199–220.
[23] A. Aggarwal, S. Gaba, S. Nagpal, and A. Arya, “A comparative analysis
among task scheduling for grouped and ungrouped grid application,” 2021.
[24] I. Budhiraja, D. Garg, N. Kumar, and R. Sharma, “A comprehensive
review on variants of sars-covs-2: Challenges, solutions and open issues,”
Computer Communications, 2022.
[25] N. Joshi, I. Budhiraja, D. Garg, S. Garg, B. J. Choi, and M. Alrashoud,
“Deep reinforcement learning based rate enhancement scheme for ris
assisted mobile users underlaying uav,” Alexandria Engineering Journal,
vol. 91, pp. 1–11, 2024.
[26] I. Budhiraja, D. Garg, R. Singh, S. Garg, B. J. Choi, and M. Alrashoud,
“Swipt and uplink noma approach for self energy recycling in full-duplex
enabled d2d network,” Alexandria Engineering Journal, vol. 90, pp. 208–
215, 2024.
[27] L. Malina, G. Srivastava, P. Dzurenda, J. Hajny, and S. Ricci, “A privacy-
enhancing framework for internet of things services,” p. 77–97, 2019.
[28] A. Verma, P. Bhattacharya, I. Budhiraja, A. K. Gupta, and S. Tanwar,
“Fusion of federated learning and 6g in internet-of-medical-things: Ar-
12 VOLUME 4, 2016
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
chitecture, case study and emerging directions,” in Futuristic Trends in
Networks and Computing Technologies: Select Proceedings of Fourth
International Conference on FTNCT 2021. Springer, 2022, pp. 229–242.
[29] M. A. Mustafa, S. Cleemput, A. Aly, and A. Abidin, “A secure and privacy-
preserving protocol for smart metering operational data collection,” IEEE
Trans. Smart Grid, vol. 10, no. 6, p. 6481–6490, 2019.
[30] S. S. S. K. A. Sharma, S. Gaba and C. Saxena, “A genetic improved
quantum cryptography model to optimize network communication,” pp.
47–54, 2019.
[31] P. Consul, I. Budhiraja, R. Chaudhary, and N. Kumar, “Security reassess-
ing in uav-assisted cyber-physical systems based on federated learning,” in
MILCOM 2022-2022 IEEE Military Communications Conference (MIL-
COM). IEEE, 2022, pp. 61–65.
[32] K. S. Roy and H. K. Kalita, “A survey on post-quantum cryptography for
constrained devices,” Int. J. Appl. Eng. Res., vol. 14, no. 11, p. 2608–2615,
2019.
[33] A. Barnawi, I. Budhiraja, K. Kumar, N. Kumar, A. Almansour, and
A. Noor, “A comprehensive review on landmine detection using deep
learning techniques in 5g environment: open issues and challenges,”
Neural Computing and Applications, vol. 34(24), pp. 21 657–21 676, 2022.
[34] S. C. A. A. A. Aggarwal, S. Gaba, “Recognition of alphanumeric patterns
using backpropagation algorithm for design and implementation with
ann.”
[35] M. M. S. Gaba, A. Aggarwal, “Role of machine learning for ad hoc
networks.”
[36] S. N. B. V. A. Aggarwal, S. Gaba, “Bio-inspired routing in vanet.”
[37] S. G. S. Nagpal, A. Aggarwal, “Privacy and security issues in vehicular ad
hoc networks with preventive mechanisms.”
[38] S. N. D. K.-P. S. S. Gaba, A. Aggarwal, “A forecast of coronary heart
disease using proficient machine learning algorithms.”
[39] P. Consul, I. Budhiraja, R. Chaudhary, and D. Garg, “Flbcps: Federated
learning based secured computation offloading in blockchain-assisted
cyber-physical systems,” in 2022 IEEE/ACM 15th International Confer-
ence on Utility and Cloud Computing (UCC). IEEE, 2022, pp. 412–417.
[40] R. Nijhawan, M. Juneja, N. Kaur, A. Yadav, and I. Budhiraja, “Automated
deep learning based approach for albinism detection,” in International
Conference on Recent Trends in Image Processing and Pattern Recogni-
tion. Springer, 2022, pp. 272–281.
[41] P. D. J. Hajny and L. Malina, “Attribute-based credentials with crypto-
graphic collusion prevention,” Secur. Commun. Netw., vol. 8, no. 18, p.
3836–3846, Dec. 2015.
[42] H. Khan, I. Budhiraja, S. A. Wahaj, M. Z. Alam, S. T. Siddiqui, and
M. I. Alam, “Iot and blockchain integration challenges,” in 2022 IEEE
International Conference on Current Development in Engineering and
Technology (CCET). IEEE, 2022, pp. 1–5.
[43] P. Rani, V. Kumar, I. Budhiraja, A. Rathi, and S. Kukreja, “Deploying
electronic voting system use-case on ethereum public blockchain,” in 2022
IEEE International Conference on Advanced Networks and Telecommuni-
cations Systems (ANTS), 2022, pp. 1–6.
[44] N. N. A. Ben-David and B. Pinkas, “Fairplaymp: A system for secure
multi-party computation,” p. 257–266, 2008.
[45] G. B. A. P.-J. S. D. P. Kumar, Y. Lin and A. M. et al., “Smart grid metering
networks: A survey on security, privacy and open research issues,” IEEE
Commun. Surveys Tuts., vol. 21, no. 3, p. 2886–2927, 2019.
[46] K. Yang and X. Jia, “Expressive, efficient, and revocable data access
control for multi-authority cloud storage,” IEEE Trans. Parallel Distrib.
Syst., vol. 25, no. 7, p. 1735–1744, 2014.
[47] H. K. I. B.-A. S. A. Yadav, S. Gaba and K. K. Singh, “Etma: Efficient
transformer-based multilevel attention framework for multimodal fake
news detection.”
[48] V. K. A. M. S. Gaba, I. Buddhiraja, “Federated learning based secured
computational offloading in cyber-physical iost systems.”
[49] J. K. S. N. A. Aggarwal, S. Gaba, “Blockchain and autonomous vehicles:
Architecture, security and challenges.”
[50] V. K. G. S. K. M. M. H. S. Gaba, I. Budhiraja, “A federated calibration
scheme for convolutional neural networks: Models, applications and chal-
lenges.”
[51] A. M. D. G. S. Gaba, I. Budhiraja, “Machine learning for detecting security
attacks on blockchain using software defined networking.”
[52] S. N. A. Aggarwal, S. Gaba, “Role of machine learning for ad hoc
networks.”
[53] Deepanshi, I. Budhiraja, D. Garg, N. Kumar, and R. Sharma, “A compre-
hensive review on variants of sars-covs-2: Challenges, solutions and open
issues,” 2023.
[54] A. Bhardwaj, I. Budhiraja, and U. Gupta, “Cloud-based architecture for
effective surveillance and diagnosis of covid-19,” 2023.
[55] A. Bhardwaj, I. Budhiraja, and R. Chaudhary, “Container-based migration
technique for fog computing architecture,” in 2023 International Confer-
ence for Advancement in Technology (ICONAT). IEEE, 2023, pp. 1–6.
[56] M. Singh, G. S. Aujla, A. Singh, N. Kumar, and S. Garg, “Deep-learning-
based blockchain framework for secure software-defined industrial net-
works,” IEEE Transactions on Industrial Informatics, vol. 17, no. 1, pp.
606–616, 2020.
[57] U. Demirbaga and G. S. Aujla, “Rootpath: Root cause and critical path
analysis to ensure sustainable and resilient consumer-centric big data
processing under fault scenarios,” IEEE Transactions on Consumer Elec-
tronics, 2023.
[58] S. G. A. Aggarwal and M. Mittal, “A comparative investigation of consen-
sus algorithms in collaboration with iot and blockchain.”
[59] B. A. Taha, A. J. Addie, A. J. Haider, V. Chaudhary, R. Apsari, A. Kaushik,
and N. Arsad, “Exploring trends and opportunities in quantum-enhanced
advanced photonic illumination technologies,” Advanced Quantum Tech-
nologies, p. 2300414, 2024.
[60] D. Shin, “Modern quantum information and the impact of quantum com-
puting on cryptography,” Bulletin of the American Physical Society, 2024.
[61] S. Cherbal, A. Zier, S. Hebal, L. Louail, and B. Annane, “Security in
internet of things: a review on approaches based on blockchain, machine
learning, cryptography, and quantum computing,” The Journal of Super-
computing, vol. 80, no. 3, pp. 3738–3816, 2024.
[62] S. Singh, A. Bhardwaj, I. Budhiraja, U. Gupta, and I. Gupta, “Cloud-
based architecture for effective surveillance and diagnosis of covid-19,”
in Convergence of Cloud with AI for Big Data Analytics: Foundations and
Innovation. Wiley Online Library, 2023, pp. 69–88.
[63] A. Bhardwaj, A. M. Aslam, R. Chaudhary, and I. Budhiraja, “Metaverse
for 6g and beyond: the next revolution and deployment challenges,” 2023.
[64] V. Vishnoi, P. Consul, I. Budhiraja, S. Gupta, and N. Kumar, “Deep
reinforcement learning based energy consumption minimization for intel-
ligent reflecting surfaces assisted d2d users underlaying uav network,” in
IEEE INFOCOM 2023 - IEEE Conference on Computer Communications
Workshops, 2023, pp. 1–6.
[65] V. Vishnoi, I. Budhiraja, S. Gupta, and N. Kumar, “A deep reinforcement
learning scheme for sum rate and fairness maximization among d2d pairs
underlaying cellular network with noma,” IEEE Transactions on Vehicular
Technology, 2023.
[66] A. Barnawi, S. Gaba, A. Alphy, A. Jabbari, I. Budhiraja, V. Kumar,
and N. Kumar, “A systematic analysis of deep learning methods and
potential attacks in internet-of-things surfaces,” Neural Computing and
Applications, pp. 1–16, 2023.
[67] H. Sharma, N. Kumar, I. Budhiraja, and A. Barnawi, “Secrecy rate
maximization in thz-aided heterogeneous networks: A deep reinforcement
learning approach,” IEEE Transactions on Vehicular Technology, 2023.
[68] S. Gaba, H. Khan, K. J. Almalki, A. Jabbari, I. Budhiraja, V. Kumar,
A. Singh, K. K. Singh, S. S. Askar, and M. Abouhawwash, “Holochain:
An agent-centric distributed hash table security in smart iot applications,”
IEEE Access, vol. 11, pp. 81 205–81 223, 2023.
DR. SHALLY NAGPAL earned her Ph.D. in
Computer Science Engineering from Maharishi
Markandeshwar Engineering college. She is work-
ing as Assistant professor in emerging department
of Panipat Institute of Engineering and Technol-
ogy, Panipat, Haryana, India. She has organized
and attended numerous of Workshops, FDPs and
Conferences on National/International Platforms.
She has presented and published abundant papers
and chapters in National/International conferences
and journals.. She teaches in the Department of Computer Science and
Engineering primarily having interest areas of Big Data, Cloud Computing,
Machine Learning, AI, and Cyber Attacks.
VOLUME 4, 2016 13
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
SHIVANI GABA is an Educator, Researcher
and Philanthropist. She has presented and pub-
lished abundant papers and chapters in Na-
tional/International conferences and journals. She
is Microsoft Technology Associate (MTA) and
Microsoft Office Specialist (MOS) Certified. She
has done B.Tech from Kurukshetra university in
the year of 2015 and M.Tech from Kurukshetra
University in the year of 2017. She is Research
Scholar in school of computer science and engi-
neering in Bennett university, Greater Noida and also working as Assistant
Professor in Panipat Institute of Engineering and Technology, Panipat,
Haryana and She has primarily having interest areas of AI, blockchain, Deep
Learning, Cyber Attacks.
DR. ISHAN BUDHIRAJA earned his Ph.D. in
Computer Science Engineering from the Thapar
Institute of Engineering and Technology, Patiala,
India in 2021. He received M.Tech. and B. Tech
degree in Electronics and Communication Engi-
neering from Maharishi Dayanand University, Ro-
htak, Haryana, in 2012 and Uttar Pradesh Tech-
nical University, Lucknow, India, in 2008, respec-
tively. He worked as a Research Associate on the
project Energy Management of Smart Home using
cloud Infrastructure-A Utility Perspective, funded by CSIR, New Delhi,
India. Some of his research findings are published in top-cited journals,
such as IEEE Transactions on Industrial Informatics, IEEE Transactions
on Vehicular Technology, IEEE Transactions on Mobile Computing, IEEE
Internet of Things, IEEE Wireless Communication Magazine, IEEE Systems
Journal, and various international top-tiered conferences, such as IEEE
GLOBECOM, IEEE ICC, IEEE WCMC, ACM, and IEEE Infocom. His
research interests include device-to-device communications, the Internet of
Things, Non-orthogonal multiple access, femtocells, deep reinforcement
learning, and microstrip patch antenna.
MEENAKSHI SHARMA Sharma is currently
working as Professor and Head in the Department
of Electronics and Communication Engineering,
Indraprastha Engineering College, Ghaziabad. Be-
sides this, she is Dean Student and welfare and
coordinator of Internal Quality Assurance Cell of
IPEC. She received her B.E. from Dr. Bhim Rao
Ambedkar Marathwada University, Aurangabad,
Maharashtra in 1996 followed by M. Tech Com-
munication Systems) and Ph.D. in Microwave En-
gineering. She has more than twenty-six years of teaching and one year
of industrial experience to her credit. She is the founder faculty of IPEC
and has been working with IPEC since past 23 years in various capacities.
Her research interests are in the areas of Microwave Filter, antenna Design,
IoT as well as Digital Circuit Design. She has published a good number of
research papers with journals of repute including SCI publications. She has
one granted patent and 6 published patents to her credit. She has been a
resource person for various workshops and faculty development programs.
She has also convened numerous National level conferences and seminars.
Moreover, she has chaired many International and National Conferences.
Besides this, she has authored a book titled “Electronics Engineering made
easy” with Cengage learning (formerly Thomson press) under technological
university series. She is a life member of IETE, New Delhi.
AKANSHA SINGH is B.Tech, M.Tech and PhD
in Computer Science. She received her PhD from
IIT Roorkee in image processing and machine
learning. Currently, she is working as Professor
in School of Computer Science and Engineering,
Bennett University, Greater Noida, India. She has
served as Associate Editor and guest editor of
several journals. Dr. Singh has also undertaken
government funded project as Principal Investiga-
tor. Her research areas include image processing,
remote sensing, IoT and machine learning.
KRISHNA KANT SINGH is working as Direc-
tor, Delhi Technical Campus,Greater Noida, India.
He has wide teaching and research experience.
Dr. Singh has acquired B.Tech, M.Tech, MS, and
Ph.D. (IIT Roorkee) in the area of image pro-
cessing and Machine Learning. He has authored
more than 140 research papers in Scopus and SCIE
indexed journals of repute. He has also authored
25 technical books. He is an associate editor of
Journal of Intelligent and Fuzzy Systems (SCIE
Indexed), IEEE ACCESS (SCIE Indexed) and Guest Editor of Open Com-
puter Science, Wireless Personal Communications. He is serving as the
member of Editorial board of Applied Computing and Geoscience (Else-
vier).
S.S. ASKAR received his BSc. Degree in math-
ematics and the MSc. degree in applied mathe-
matics from Mansoura University, Egypt, in 1998
and 2004, respectively. He got his PhD in Op-
eration research from Cranfield University from
UK in 2011. He works as an associate Professor
at Mansoura University Egypt since 2016. He
has joined King Saud University in 2012 and till
present he works at the Department of Statistics
and Operation Research at King Saud University
as a professor. His main interests lie in game theory and its applications that
include mathematical economy, dynamical systems and Network analysis.
MOHAMED ABOUHAWWASH received the
B.Sc. and M.Sc. degrees in statistics and com-
puter science from Mansoura University, Man-
soura, Egypt, in 2005 and 2011, respectively, and
the joint Ph.D. degree in statistics and computer
science with the Channel Program between Michi-
gan State University, East Lansing, MI, USA,
and Mansoura University, in 2015. In 2018, he
was a Visiting Scholar with the Department of
Mathematics and Statistics, Faculty of Science,
Thompson Rivers University, Kamloops, BC, Canada. He is currently with
Michigan State University. He is also an Associate Professor with the
Department of Mathematics, Faculty of Science, Mansoura University. His
current research interests include evolutionary algorithms, machine learning,
image reconstruction, and mathematical optimization. He was a recipient of
the Best Master’s and Ph.D. Thesis Awards from Mansoura University in
2012 and 2018, respectively.
14 VOLUME 4, 2016
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
Shally Nagpal et al.: Quantum Computing Integrated Patterns for Real Time Cryptography in Assorted Domains
CELESTINE IWENDI is an IEEE Brand Am-
bassador. He has a PhD in Electronics Engineer-
ing, Past ACM Distinguished Speaker, a Senior
Member of IEEE, a Seasoned Lecturer and a Char-
tered Engineer. A highly motivated researcher and
teacher with emphasis on communication, hands-
on experience, willing-to-learn and a 23 years
technical expertise. He has developed operational,
maintenance, and testing procedures for electronic
products, components, equipment, and systems;
provided technical support and instruction to staff and customers regarding
equipment standards, assisting with specific, difficult in-service engineering;
Inspected electronic and communication equipment, instruments, products,
and systems to ensure conformance to specifications, safety standards, and
regulations. He is a wireless sensor network Chief Evangelist, AI, ML
and IoT expert and designer. He is a Reader (Professor) at the University
of Bolton, United Kingdom. He is also the IEEE University of Bolton,
Student Branch Counselor and former Board Member of IEEE Sweden
Section, a Fellow of The Higher Education Academy, United Kingdom and
a fellow of Institute of Management Consultants to add to his teaching,
managerial and professional experiences. Celestine is an Ambassador in
the prestigious Manchester Conference Ambassador Programme, Visiting
Professor to five Universities and an IEEE Humanitarian Philanthropist.
Celestine has received the prestigious recognition of the Royal Academy
of Engineering through the Exceptional Talent Scheme, acknowledging his
substantial contributions to Artificial Intelligence and its medical applica-
tions. Additionally, he takes pride in his three-year inclusion in Elsevier’s
publication, featuring the World’s Top 2% Influential Scientists.
VOLUME 4, 2016 15
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2024.3401162
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/