Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (58)

Search Parameters:
Keywords = quantum error correction codes

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 479 KB  
Article
Security of Quantum Key Distribution with One-Time-Pad-Protected Error Correction and Its Performance Benefits
by Roman Novak
Entropy 2025, 27(10), 1032; https://doi.org/10.3390/e27101032 - 1 Oct 2025
Abstract
In quantum key distribution (QKD), public discussion over the authenticated classical channel inevitably leaks information about the raw key to a potential adversary, which must later be mitigated by privacy amplification. To limit this leakage, a one-time pad (OTP) has been proposed to [...] Read more.
In quantum key distribution (QKD), public discussion over the authenticated classical channel inevitably leaks information about the raw key to a potential adversary, which must later be mitigated by privacy amplification. To limit this leakage, a one-time pad (OTP) has been proposed to protect message exchanges in various settings. Building on the security proof of Tomamichel and Leverrier, which is based on a non-asymptotic framework and considers the effects of finite resources, we extend the analysis to the OTP-protected scheme. We show that when the OTP key is drawn from the entropy pool of the same QKD session, the achievable quantum key rate is identical to that of the reference protocol with unprotected error-correction exchange. This equivalence holds for a fixed security level, defined via the diamond distance between the real and ideal protocols modeled as completely positive trace-preserving maps. At the same time, the proposed approach reduces the computational requirements: for non-interactive low-density parity-check codes, the encoding problem size is reduced by the square of the syndrome length, while privacy amplification requires less compression. The technique preserves security, avoids the use of QKD keys between sessions, and has the potential to improve performance. Full article
(This article belongs to the Section Quantum Information)
Show Figures

Figure 1

12 pages, 1627 KB  
Article
RC-LDPC-Polar Codes for Information Reconciliation in Continuous-Variable Quantum Key Distribution
by Fei Hua, Kun Chen, Wei Deng, Jing Cheng, Banghong Guo and Huanwen Xie
Entropy 2025, 27(10), 1025; https://doi.org/10.3390/e27101025 - 29 Sep 2025
Abstract
Continuous-variable quantum key distribution faces significant challenges, including quantum channel instability, particularly fluctuations in the signal-to-noise ratio (SNR) and extremely low SNR scenarios. Furthermore, non-ideal polar codes, characterized by insufficient polarization in finite-length regimes, can lead to some sub-channels being neither completely noise-free [...] Read more.
Continuous-variable quantum key distribution faces significant challenges, including quantum channel instability, particularly fluctuations in the signal-to-noise ratio (SNR) and extremely low SNR scenarios. Furthermore, non-ideal polar codes, characterized by insufficient polarization in finite-length regimes, can lead to some sub-channels being neither completely noise-free nor fully noise-dominated. This phenomenon limits the error correction capability when such codes are applied to information reconciliation. To address these challenges, we propose a novel RC-LDPC-Polar code for the CV-QKD reconciliation algorithm. We combine the error resilience of LDPC codes with the efficiency advantages of polar coding. This scheme supports adaptive rate adjustment across varying SNR conditions. Our simulation experiments demonstrate that the RC-LDPC-Polar concatenated coding scheme achieves a lower error rate under varying SNR conditions. Meanwhile, the proposed scheme achieves a higher final key rate and a longer transmission distance. Full article
(This article belongs to the Section Quantum Information)
Show Figures

Figure 1

27 pages, 1844 KB  
Article
A Quantum Frequency-Domain Framework for Image Transmission with Three-Qubit Error Correction
by Udara Jayasinghe, Thanuj Fernando and Anil Fernando
Algorithms 2025, 18(9), 574; https://doi.org/10.3390/a18090574 - 11 Sep 2025
Viewed by 389
Abstract
Quantum communication enables high-fidelity image transmission but is vulnerable to channel noise, and while advanced quantum error correction (QEC) can reduce such effects, its complexity and time-domain dependence limit practical efficiency. This paper presents a novel, low-complexity, and noise-resilient quantum image transmission framework [...] Read more.
Quantum communication enables high-fidelity image transmission but is vulnerable to channel noise, and while advanced quantum error correction (QEC) can reduce such effects, its complexity and time-domain dependence limit practical efficiency. This paper presents a novel, low-complexity, and noise-resilient quantum image transmission framework that operates in the frequency domain using the quantum Fourier transform (QFT) combined with the three-qubit QEC code. In the proposed system, input images are first source-encoded (JPEG/HEIF) and mapped to quantum states using single-qubit superposition encoding. Three-qubit QEC is then applied for channel protection, effectively safeguarding the encoded data against quantum errors. The channel-encoded quantum data are subsequently transformed via QFT for transmission over noisy quantum channels. At the receiver, the inverse QFT recovers the frequency-domain representation, after which three-qubit error correction, quantum decoding, and corresponding source decoding are performed to reconstruct the image. Results are analyzed using bit error rate (BER), peak signal-to-noise ratio (PSNR), structural similarity index measure (SSIM), and universal quality index (UQI). Experimental results show that the proposed quantum frequency-domain approach achieves up to 4 dB channel SNR gain over equivalent quantum time-domain methods and up to 10 dB over an equivalent-bandwidth classical communication system, regardless of the image format. These findings highlight the practical advantages of integrating QFT-based transmission with lightweight QEC, offering an efficient, scalable, and noise-tolerant solution for future quantum communication networks. Full article
(This article belongs to the Section Combinatorial Optimization, Graph, and Network Algorithms)
Show Figures

Graphical abstract

20 pages, 5393 KB  
Article
Resource-Efficient Decoding of Topological Color Codes via Neural-Guided Union-Find Optimization
by Minghao Fu, Cewen Tian, Zaixu Fan and Hongyang Ma
Appl. Sci. 2025, 15(16), 8937; https://doi.org/10.3390/app15168937 - 13 Aug 2025
Viewed by 581
Abstract
Quantum error correction (QEC) is crucial for achieving reliable quantum computation. Among topological QEC codes, color codes can correct bit-flip and phase-flip errors simultaneously, enabling efficient resource utilization. However, existing decoders such as the Union–Find (UF) algorithm exhibit limited accuracy under high noise [...] Read more.
Quantum error correction (QEC) is crucial for achieving reliable quantum computation. Among topological QEC codes, color codes can correct bit-flip and phase-flip errors simultaneously, enabling efficient resource utilization. However, existing decoders such as the Union–Find (UF) algorithm exhibit limited accuracy under high noise levels. We propose a hybrid decoding framework that augments a modified UF algorithm—enhanced with a secondary growth strategy—with a lightweight recurrent neural network (RNN). The RNN refines the error chains identified by UF, improving resolution without significantly increasing computational overhead. The simulation results show that our method achieves notable accuracy gains over baseline UF decoding, particularly in high-error regimes, while preserving the near-linear runtime scaling and low memory footprint of UF. At higher physical error rates, RNN-based path optimization improves UF decoding accuracy by approximately 4.7%. The decoding threshold of the color code reaches 0.1365, representing an increase of about 2% compared to UF without RNN optimization. With its simple data structure and low space complexity, the proposed method is well suited for low-latency, resource-constrained quantum computing environments. Full article
(This article belongs to the Topic Quantum Information and Quantum Computing, 2nd Volume)
Show Figures

Figure 1

13 pages, 1031 KB  
Article
MITS: A Quantum Sorcerer’s Stone for Designing Surface Codes
by Avimita Chatterjee, Debarshi Kundu and Swaroop Ghosh
Entropy 2025, 27(8), 812; https://doi.org/10.3390/e27080812 - 29 Jul 2025
Viewed by 536
Abstract
In the evolving field of quantum computing, optimizing Quantum Error Correction (QEC) parameters is crucial due to the varying types and amounts of physical noise across quantum computers. Traditional simulators use a forward paradigm to derive logical error rates from inputs like code [...] Read more.
In the evolving field of quantum computing, optimizing Quantum Error Correction (QEC) parameters is crucial due to the varying types and amounts of physical noise across quantum computers. Traditional simulators use a forward paradigm to derive logical error rates from inputs like code distance and rounds, but this can lead to resource wastage. Adjusting QEC parameters manually with tools like STIM is often inefficient, especially given the daily fluctuations in quantum error rates. To address this, we introduce MITS, a reverse engineering tool for STIM that automatically determines optimal QEC settings based on a given quantum computer’s noise model and a target logical error rate. This approach minimizes qubit and gate usage by precisely matching the necessary logical error rate with the constraints of qubit numbers and gate fidelity. Our investigations into various heuristics and machine learning models for MITS show that XGBoost and Random Forest regressions, with Pearson correlation coefficients of 0.98 and 0.96, respectively, are highly effective in this context. Full article
Show Figures

Figure 1

23 pages, 1755 KB  
Article
An Efficient Continuous-Variable Quantum Key Distribution with Parameter Optimization Using Elitist Elk Herd Random Immigrants Optimizer and Adaptive Depthwise Separable Convolutional Neural Network
by Vidhya Prakash Rajendran, Deepalakshmi Perumalsamy, Chinnasamy Ponnusamy and Ezhil Kalaimannan
Future Internet 2025, 17(7), 307; https://doi.org/10.3390/fi17070307 - 17 Jul 2025
Viewed by 510
Abstract
Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate. This work presents an effective continuous-variable quantum key [...] Read more.
Quantum memory is essential for the prolonged storage and retrieval of quantum information. Nevertheless, no current studies have focused on the creation of effective quantum memory for continuous variables while accounting for the decoherence rate. This work presents an effective continuous-variable quantum key distribution method with parameter optimization utilizing the Elitist Elk Herd Random Immigrants Optimizer (2E-HRIO) technique. At the outset of transmission, the quantum device undergoes initialization and authentication via Compressed Hash-based Message Authentication Code with Encoded Post-Quantum Hash (CHMAC-EPQH). The settings are subsequently optimized from the authenticated device via 2E-HRIO, which mitigates the effects of decoherence by adaptively tuning system parameters. Subsequently, quantum bits are produced from the verified device, and pilot insertion is executed within the quantum bits. The pilot-inserted signal is thereafter subjected to pulse shaping using a Gaussian filter. The pulse-shaped signal undergoes modulation. Authenticated post-modulation, the prediction of link failure is conducted through an authenticated channel using Radial Density-Based Spatial Clustering of Applications with Noise. Subsequently, transmission occurs via a non-failure connection. The receiver performs channel equalization on the received signal with Recursive Regularized Least Mean Squares. Subsequently, a dataset for side-channel attack authentication is gathered and preprocessed, followed by feature extraction and classification using Adaptive Depthwise Separable Convolutional Neural Networks (ADS-CNNs), which enhances security against side-channel attacks. The quantum state is evaluated based on the signal received, and raw data are collected. Thereafter, a connection is established between the transmitter and receiver. Both the transmitter and receiver perform the scanning process. Thereafter, the calculation and correction of the error rate are performed based on the sifting results. Ultimately, privacy amplification and key authentication are performed using the repaired key via B-CHMAC-EPQH. The proposed system demonstrated improved resistance to decoherence and side-channel attacks, while achieving a reconciliation efficiency above 90% and increased key generation rate. Full article
Show Figures

Graphical abstract

13 pages, 323 KB  
Article
Application-Oriented Study of Next-Generation Alternant Codes over Gaussian Integers for Secure and Efficient Communication
by Muhammad Sajjad and Nawaf A. Alqwaifly
Mathematics 2025, 13(14), 2263; https://doi.org/10.3390/math13142263 - 13 Jul 2025
Viewed by 485
Abstract
This paper presents the construction and analysis of a novel class of alternant codes over Gaussian integers, aimed at enhancing error correction capabilities in high-reliability communication systems. These codes are constructed using parity-check matrices derived from finite commutative local rings with unity, specifically [...] Read more.
This paper presents the construction and analysis of a novel class of alternant codes over Gaussian integers, aimed at enhancing error correction capabilities in high-reliability communication systems. These codes are constructed using parity-check matrices derived from finite commutative local rings with unity, specifically Zn[i], where i2=1. A detailed algebraic investigation of the polynomial xn1 over these rings is conducted to facilitate the systematic construction of such codes. The proposed alternant codes extend the principles of classical BCH and Goppa codes to complex integer domains, enabling richer algebraic structures and greater error-correction potential. We evaluate the performance of these codes in terms of error correction capability, and redundancy. Numerical results show that the proposed codes outperform classical short-length codes in scenarios requiring moderate block lengths, such as those applicable in certain segments of 5G and IoT networks. Unlike conventional codes, these constructions allow enhanced structural flexibility that can be tuned for various application-specific parameters. While the potential relevance to quantum-safe communication is acknowledged, it is not the primary focus of this study. This work demonstrates how extending classical coding techniques into non-traditional algebraic domains opens up new directions for designing robust and efficient communication codes. Full article
(This article belongs to the Special Issue Mathematics for Algebraic Coding Theory and Cryptography)
12 pages, 1174 KB  
Article
Quantum Surface Topological Code for Bell State Stabilization in Superconducting Physical Qubit Systems
by Jordi Fabián González-Contreras, Erik Zamora, Jesús Yaljá Montiel-Pérez, Juan Humberto Sossa-Azuela, Elsa Rubio-Espino and Víctor Hugo Ponce-Ponce
Mathematics 2025, 13(13), 2041; https://doi.org/10.3390/math13132041 - 20 Jun 2025
Viewed by 1349
Abstract
Stabilizing quantum states in physical qubits quantum computers has been a widely explored topic in the Noisy Intermediate-Scale Quantum era. However, much of this work has focused on simulation rather than practical implementation. In this study, an experimental advancement in Bell state stabilization [...] Read more.
Stabilizing quantum states in physical qubits quantum computers has been a widely explored topic in the Noisy Intermediate-Scale Quantum era. However, much of this work has focused on simulation rather than practical implementation. In this study, an experimental advancement in Bell state stabilization is presented, which utilizes surface codes for quantum error correction across three quantum computers: ibm_fez, ibm_torino, and ibm_brisbane. Our findings indicate that error correction produces an improvement of approximately 3% in accuracy for 127-qubit systems while demonstrating a more significant enhancement of around 20% for 156-qubit systems in stabilizing the Bell state with fidelity up to 0.6 in all the experiments. This paper outlines the methodology for implementing this strategy in other applications, offering a pathway to improve results (20%) when experimenting with superconducting quantum computers. Full article
(This article belongs to the Special Issue Codes, Designs, Cryptography and Optimization, 3rd Edition)
Show Figures

Figure 1

13 pages, 820 KB  
Article
An Efficient Algorithmic Way to Construct Boltzmann Machine Representations for Arbitrary Stabilizer Code
by Yuan-Hang Zhang, Zhian Jia, Yu-Chun Wu and Guang-Can Guo
Entropy 2025, 27(6), 627; https://doi.org/10.3390/e27060627 - 13 Jun 2025
Cited by 1 | Viewed by 573
Abstract
Restricted Boltzmann machines (RBMs) have demonstrated considerable success as variational quantum states; however, their representational power remains incompletely understood. In this work, we present an analytical proof that RBMs can exactly and efficiently represent stabilizer code states—a class of highly entangled quantum states [...] Read more.
Restricted Boltzmann machines (RBMs) have demonstrated considerable success as variational quantum states; however, their representational power remains incompletely understood. In this work, we present an analytical proof that RBMs can exactly and efficiently represent stabilizer code states—a class of highly entangled quantum states that are central to quantum error correction. Given a set of stabilizer generators, we develop an efficient algorithm to determine both the RBM architecture and the exact values of its parameters. Our findings provide new insights into the expressive power of RBMs, highlighting their capability to encode highly entangled states, and may serve as a useful tool for the classical simulation of quantum error-correcting codes. Full article
(This article belongs to the Special Issue Quantum Information and Quantum Computation)
Show Figures

Figure 1

23 pages, 2407 KB  
Article
Enhancing Quantum Information Distribution Through Noisy Channels Using Quantum Communication Architectures
by Francisco Delgado
Information 2025, 16(6), 485; https://doi.org/10.3390/info16060485 - 11 Jun 2025
Viewed by 1238
Abstract
Quantum information transmission is subject to imperfections in communication processes and systems. These phenomena alter the original content due to decoherence and noise. However, suitable communication architectures incorporating quantum and classical redundancy can selectively remove these errors, boosting destructive interference. In this work, [...] Read more.
Quantum information transmission is subject to imperfections in communication processes and systems. These phenomena alter the original content due to decoherence and noise. However, suitable communication architectures incorporating quantum and classical redundancy can selectively remove these errors, boosting destructive interference. In this work, a selection of architectures based on path superposition or indefinite causal order were analyzed under appropriate configurations, alongside traditional methods such as classical redundancy, thus enhancing transmission. For that purpose, we examined a broad family of decoherent channels associated with the qubit chain transmission by passing through tailored arrangements or composite architectures of imperfect channels. The outcomes demonstrated that, when combined with traditional redundancy, these configurations could significantly improve the transmission across a substantial subset of the channels. For quantum key distribution purposes, two alternative bases were considered to encode the information chain. Because a control system must be introduced in the proposed architectures, two strategies for its disposal at the end of the communication process were compared: tracing and measurement. In addition, eavesdropping was also explored under a representative scenario, to quantify its impact on the most promising architecture analyzed. Thus, in terms of transmission quality and security, the analysis revealed significant advantages over direct transmission schemes. Full article
(This article belongs to the Section Information and Communications Technology)
Show Figures

Figure 1

23 pages, 2270 KB  
Article
Developing and Analyzing the Defect-Based Surface Codes Using Optimization Algorithms
by Samira Sayedsalehi, Nader Bagherzadeh, Alberto A. Del Barrio, Guillermo Botella and Ratko Pilipović
Quantum Rep. 2025, 7(2), 25; https://doi.org/10.3390/quantum7020025 - 31 May 2025
Viewed by 3414
Abstract
Fault tolerance is crucial for enabling large-scale quantum computations, with surface codes emerging as prominent error correction techniques due to their high error threshold and reliance on nearest-neighbor interactions. Despite the advantages of surface codes, they demand a substantial number of qubits to [...] Read more.
Fault tolerance is crucial for enabling large-scale quantum computations, with surface codes emerging as prominent error correction techniques due to their high error threshold and reliance on nearest-neighbor interactions. Despite the advantages of surface codes, they demand a substantial number of qubits to encode a single logical qubit, making them resource-intensive. Two primary approaches exist to encode multiple logical qubits: patch-based and defect-based. This study focuses on the latter approach, which involves creating holes in the surface code for logical qubit encoding. With the defect-based approach, we need to account for trade-offs between the number of logical qubits and the logical error rates, so we employ an optimization algorithm to evaluate the maximum number of logical qubits for a given error rate. Through a series of experiments, we assess the limitations of the defect-based approach and investigate the impact of various hole types on logical qubit encoding. Full article
Show Figures

Figure 1

37 pages, 786 KB  
Review
Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives
by Siddhartha Siddhiprada Bhoi, Arathi Arakala, Amy Beth Corman and Asha Rao
Cryptography 2025, 9(2), 31; https://doi.org/10.3390/cryptography9020031 - 12 May 2025
Cited by 1 | Viewed by 2280
Abstract
Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computations, researchers have been working on building post-quantum homomorphic encryption (PQHE) algorithms. Most [...] Read more.
Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computations, researchers have been working on building post-quantum homomorphic encryption (PQHE) algorithms. Most of the current PQHE algorithms are secured by Lattice-based problems and there have been limited attempts to build ciphers based on error-correcting code-based problems. This review presents an overview of the current approaches to building PQHE schemes and justifies code-based encryption as a novel way to diversify post-quantum algorithms. We present the mathematical underpinnings of existing code-based cryptographic frameworks and their security and efficiency guarantees. We compare lattice-based and code-based homomorphic encryption solutions identifying challenges that have inhibited the progress of code-based schemes. We finally propose five new research directions to advance post-quantum code-based homomorphic encryption. Full article
(This article belongs to the Section Cryptography Reviews)
Show Figures

Figure 1

19 pages, 4902 KB  
Article
Q-Pandora Unboxed: Characterizing Resilience of Quantum Error Correction Codes Under Biased Noise
by Avimita Chatterjee, Subrata Das and Swaroop Ghosh
Appl. Sci. 2025, 15(8), 4555; https://doi.org/10.3390/app15084555 - 21 Apr 2025
Cited by 1 | Viewed by 1250
Abstract
Quantum error correction codes (QECCs) are essential for reliable quantum computing as they protect quantum states against noise and errors. Limited research has explored the resilience of QECCs to biased noise, critical for selecting optimal codes. We examine how different noise types impact [...] Read more.
Quantum error correction codes (QECCs) are essential for reliable quantum computing as they protect quantum states against noise and errors. Limited research has explored the resilience of QECCs to biased noise, critical for selecting optimal codes. We examine how different noise types impact QECCs, considering the varying susceptibility of quantum systems to specific errors. Our goal is to identify opportunities to minimize the resources—or overhead—needed for effective error correction. We conduct a detailed study on two QECCs—rotated and unrotated surface codes—under various noise models using simulations. Rotated surface codes generally perform better due to their simplicity and lower qubit overhead. They exceed the noise threshold of current quantum processors, making them more effective at lower error rates. This study highlights a hierarchy in surface code implementation based on resource demand, consistently observed across both code types. Our analysis ranks the code-capacity model as the most pessimistic and the circuit-level model as the most realistic, mapping error thresholds that show surface code advantages. Additionally, higher code distances improve performance without excessively increasing qubit overhead. Tailoring surface codes to align with the target logical error rate and the biased physical error profile is crucial for optimizing reliability and resource use. Full article
(This article belongs to the Special Issue Resource Management for Emerging Computing Systems)
Show Figures

Figure 1

19 pages, 3370 KB  
Article
Lattice Surgery for Dummies
by Avimita Chatterjee, Subrata Das and Swaroop Ghosh
Sensors 2025, 25(6), 1854; https://doi.org/10.3390/s25061854 - 17 Mar 2025
Cited by 4 | Viewed by 1839
Abstract
Quantum error correction (QEC) plays a crucial role in correcting noise and paving the way for fault-tolerant quantum computing. This field has seen significant advancements, with new quantum error correction codes emerging regularly to address errors effectively. Among these, topological codes, particularly surface [...] Read more.
Quantum error correction (QEC) plays a crucial role in correcting noise and paving the way for fault-tolerant quantum computing. This field has seen significant advancements, with new quantum error correction codes emerging regularly to address errors effectively. Among these, topological codes, particularly surface codes, stand out for their low error thresholds and feasibility for implementation in large-scale quantum computers. However, these codes are restricted to encoding a single qubit. Lattice surgery is crucial for enabling interactions among multiple encoded qubits or between the lattices of a surface code, ensuring that its sophisticated error-correcting features are maintained without significantly increasing the operational overhead. Lattice surgery is pivotal for scaling QECCs across more extensive quantum systems. Despite its critical importance, comprehending lattice surgery is challenging due to its inherent complexity, demanding a deep understanding of intricate quantum physics and mathematical concepts. This paper endeavors to demystify lattice surgery, making it accessible to those without a profound background in quantum physics or mathematics. This work explores surface codes, introduces the basics of lattice surgery, and demonstrates its application in building quantum gates and emulating multi-qubit circuits. Full article
(This article belongs to the Section Physical Sensors)
Show Figures

Figure 1

22 pages, 2728 KB  
Article
Hybrid Dynamic Galois Field with Quantum Resilience for Secure IoT Data Management and Transmission in Smart Cities Using Reed–Solomon (RS) Code
by Abdullah Aljuhni, Amer Aljaedi, Adel R. Alharbi, Ahmed Mubaraki and Moahd K. Alghuson
Symmetry 2025, 17(2), 259; https://doi.org/10.3390/sym17020259 - 8 Feb 2025
Cited by 1 | Viewed by 1239
Abstract
The Internet of Things (IoT), which is characteristic of the current industrial revolutions, is the connection of physical devices through different protocols and sensors to share information. Even though the IoT provides revolutionary opportunities, its connection to the current Internet for smart cities [...] Read more.
The Internet of Things (IoT), which is characteristic of the current industrial revolutions, is the connection of physical devices through different protocols and sensors to share information. Even though the IoT provides revolutionary opportunities, its connection to the current Internet for smart cities brings new opportunities for security threats, especially with the appearance of new threats like quantum computing. Current approaches to protect IoT data are not immune to quantum attacks and are not designed to offer the best data management for smart city applications. Thus, post-quantum cryptography (PQC), which is still in its research stage, aims to solve these problems. To this end, this research introduces the Dynamic Galois Reed–Solomon with Quantum Resilience (DGRS-QR) system to improve the secure management and communication of data in IoT smart cities. The data preprocessing includes K-Nearest Neighbors (KNN) and min–max normalization and then applying the Galois Field Adaptive Expansion (GFAE). Optimization of the quantum-resistant keys is accomplished by applying Artificial Bee Colony (ABC) and Moth Flame Optimization (MFO) algorithms. Also, role-based access control provides strong cloud data security, and quantum resistance is maintained by refreshing keys every five minutes of the active session. For error correction, Reed–Solomon (RS) codes are used which provide data reliability. Data management is performed using an attention-based Bidirectional Long Short-Term Memory (Att-Bi-LSTM) model with skip connections to provide optimized city management. The proposed approach was evaluated using key performance metrics: a key generation time of 2.34 s, encryption time of 4.56 s, decryption time of 3.56 s, PSNR of 33 dB, and SSIM of 0.99. The results show that the proposed system is capable of protecting IoT data from quantum threats while also ensuring optimal data management and processing. Full article
(This article belongs to the Special Issue New Advances in Symmetric Cryptography)
Show Figures

Figure 1

Back to TopTop