Security in Quantum Computing

  • Ana Lavinia Petrache BEIA Consult International
  • George Suciu BEIA Consult International
Keywords: qubit, encryption, superposition, entanglement, photon polarization


Quantum key distribution will bring more confidentiality and privacy of communication in the future ICT world and will solve the eavesdropping issue. Domains regarded are e-government, e-commerce, e-health, transmission of biometric data, intelligent transport systems and more. So far, quantum researches focus on using properties of the qubit to bring improvements in technologies from our days.  The purpose of this paper is to describe the quantum encryption methods. These methods can bring more efficiency of security in existing communications. In this matter, many encryption architectures have been proposed. As an example, the QKD architecture is presented in this paper.


Bloch, Felix. (1946). Nuclear Induction. Physical Review, 70(7–8), 460–474.,

Bruss, D., Erdélyi, G., Meyer, T., Riege, T., & Rothe, J. (2007). Quantum cryptography. ACM Computing Surveys, 39(2), 6.

Takahashi, Dean. (2020). Intel and QuTech unveil Horse Ridge cryogenic control chip for quantum computing. Retrieved on 18.02.2020 from

ETSI GS QKD 002. (2010). Quantum Key Distribution Use Cases. Retrieved on June 2010 from

ETSI World Class Standards.2008.Quantum Key Distribution Architecture.Retrieved on 2008 from

ETSI Quantum Key Distribution. Retrieved from

Information Technology and Information Foundation. (2019). TIF Technology Explainer: What Is Quantum Computing?. Retrieved on January 29, 2019 from

Giles, M. (2019). Explainer: What is a quantum computer? Retrieved December 22, 2020, from

Haitjema, Mart. (2007). A Survey of the Prominent Quantum Key Distribution Protocols. Retrieved on 2007 from https:/

Lu, Y., Bengtsson, A., Burnett, J. J., Wiegand, E., Suri, B., Krantz, P., … Delsing, P. (2019). Characterizing decoherence rates of a superconducting qubit by direct microwave scattering. Retrieved from

Logan O. Mailloux, Dr. Michael R. Grimaila, Douglas D. Hodson, Colin V. McLaughlin and G.B. Baumgartner. 2016. Quantum Key Distribution: Boon or Bust? Published in Journal of Cyber Security and Information Systems, Volume: 4 Number: 2 - Basic Complexity

Shukla, M., & Patel, S. (2018). Prominent Security of the Quantum Key Distribution Protocol. International Journal of Science and Research, 8.

Quantum-Safe Security Working Group.(2018). What is Quantum Key Distribution?. Retrieved on 2018 from

Shor, P. W., & Preskill, J. (2000). Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters, 85(2), 441–444.

Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., … Wallden, P. (2019). Advances in Quantum Cryptography.

RIKEN Center for Emergent Matter Science. (2020). Scientists measure electron spin qubit without demolishing it. Retrieved on 2.03.2020 from

Dai, H., and Xu, H. (2010). Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix. IEEE SENSORS JOURNAL, 10(8), 1399.

How to Cite
Petrache, A. L., & Suciu, G. (2020). Security in Quantum Computing. Annals of Disaster Risk Sciences, 3(1).