Feasibility and Limitations of Generalized Grover Search Algorithm-Based Quantum Asymmetric Cryptography: An Implementation Study on Quantum Hardware
Abstract
1. Introduction
1.1. Limitations of Current Quantum Cryptographic Approaches
1.2. Quantum Asymmetric Encryption: A Paradigm Shift
1.3. Grover Search Algorithm in Quantum Cryptography
1.4. Current Challenges and Research Gaps
1.5. Contributions and Objectives
- First, we report the initial successful implementation of an asymmetric quantum cryptographic protocol on IBM quantum computers, demonstrating the feasibility of QPKC in near-term quantum devices and establishing a crucial benchmark for practical quantum cryptographic applications.
- Second, we provide a comprehensive performance evaluation of single-iteration GSA across different qubit systems, systematically revealing scalability challenges that emerge as system size increases, and quantifying the trade-offs between theoretical quantum advantages and hardware-imposed limitations. This analysis encompasses both computational complexity assessments and experimental characterization of quantum decoherence effects on cryptographic protocol fidelity.
- Third, we introduce a generalized GSA framework specifically designed for non-standard initial states, incorporating novel diffusion operators that ensure consistent cryptographic performance across diverse quantum state preparations, thereby extending the applicability of Grover-based cryptographic schemes beyond idealized theoretical conditions.
- Fourth, this work fundamentally bridges the gap between theoretical cryptographic protocols and practical quantum implementations, providing both experimental validation and algorithmic innovations that advance the transition from proof-of-concept QPKC schemes to deployable quantum cryptographic systems. The comparative analysis of multiple quantum asymmetric encryption schemes offers a broader perspective on the unique value and positioning of the proposed approach within the current landscape of quantum cryptographic protocols. This comparative framework establishes clear performance benchmarks and identifies specific advantages of our implementation methodology over existing alternatives.
2. Preliminary
2.1. Related Works
2.2. Grover Search Algorithm
3. The Proposed Modified Scheme with Quantum Circuit Implementation
3.1. Generalized Quantum Circuit Architecture for Grover Search Algorithm
3.1.1. Theoretical Foundation and Circuit Design Principles
3.1.2. Enhanced Initial State Preparation Circuit
3.1.3. Oracle Operation Implementation
- General Oracle Construction:
- Circuit Implementation Strategy:
3.1.4. Generalized Diffusion Operation
- (a)
- Modified Version: The circuit architecture in Figure 3a presents an enhanced version of the classical diffusion operator framework originally proposed by Sadana [17], incorporating adaptive gate placement mechanisms based on initial state configurations. The modification principle implements a conditional X-gate insertion strategy, where additional X-gates are systematically positioned in the quantum circuit whenever the condition is satisfied for qubit .
- (b)
- Quantum Gate Reduction Version: Figure 3b demonstrates a quantum gate-reduced version of the generalized diffusion operator, achieved through strategic gate minimization and resource optimization techniques. This implementation introduces a modified gate placement design that minimizes the total number of quantum gates while preserving the mathematical equivalence of the diffusion operation.
3.2. Quantum Circuit Implementation for Yoon Et Al.’S Quantum Asymmetric Encryption
3.2.1. Cryptographic Protocol Overview
- System Architecture:
- Alice: Message originator with key generation capabilities;
- Bob: Message recipient with encryption capabilities;
- Quantum Key Center (QKC): Trusted intermediary for key distribution.
- Security Foundation:
3.2.2. Key Generation and Distribution Protocol
- Enhanced Key Generation Process:
3.2.3. Encryption Protocol Implementation
- Enhanced Encryption Process:
3.2.4. Decryption Protocol and Circuit Realization
- Enhanced Decryption Process:
4. Experimental Results and Analysis
4.1. Simulation Environment
4.1.1. Quantum Computing Platform Configuration
4.1.2. Hardware and Simulation Infrastructure
4.1.3. Measurement and Statistical Analysis Framework
4.2. Quantum Asymmetric Encryption Protocol Implementation
4.2.1. Protocol Execution Framework
4.2.2. Key Generation and Distribution Phase
- Alice’s Key Generation Process:
- Bob’s Message Encoding:
- Ciphertext Generation:
4.2.3. Decryption Phase and Message Recovery
- Alice’s Decryption Process:
- Message Extraction:
4.3. Experimental Results and Performance Analysis
4.3.1. Simulation Results Under Ideal Conditions
- Performance Metrics: The experimental evaluation was conducted with 10,000 measurement shots to ensure statistical reliability, as demonstrated in Figure 5. Figure 5a presents results obtained using the IBM quantum simulator under ideal conditions, while Figure 5b illustrates performance on real quantum hardware.
- Scalability Analysis: The one-round quantum asymmetric encryption protocol demonstrates varying performance characteristics across different qubit configurations. For the 2-qubit implementation, the single Grover iteration maintains exceptional accuracy of 100%, as detailed in Table 1. However, systematic performance degradation occurs as the problem size increases.
- Accuracy Degradation: The experimental results demonstrate severe accuracy degradation as system size increases, with the 2-qubit system achieving perfect 100% accuracy (σ = 0.00), while the 3-qubit system exhibits a significant decline to 78.15% accuracy (σ = 0.35), and the 4-qubit system further deteriorates to 48.08% accuracy (σ = 0.51). This substantial accuracy reduction at higher qubit levels indicates fundamental limitations in the proposed single-iteration approach for quantum asymmetric encryption applications involving 4 qubits or more, suggesting that the quantum search algorithm’s effectiveness diminishes critically with increasing system complexity, thereby constraining the practical scalability of the encryption scheme.
4.3.2. Real Quantum Hardware Performance
- Hardware Implementation Results: Real quantum hardware deployment reveals additional performance challenges due to noise, decoherence, and gate error effects inherent in current quantum processors, as demonstrated by experimental results from the IBM 127-qubit Kyiv quantum processor, which show significant performance degradation compared to ideal simulation conditions. The hardware versus simulation comparison exhibits dramatic accuracy losses across all system sizes, with the 2-qubit system declining from 100% simulation accuracy to 93.88% on hardware, the 3-qubit system dropping from 78.15% to 45.84%, and the 4-qubit system experiencing a catastrophic reduction from 48.08% simulation accuracy to merely 7.63% on actual quantum hardware, as detailed in Table 2. These results underscore the critical impact of physical quantum device limitations on cryptographic fidelity, indicating that the gap between theoretical performance and practical implementation widens substantially with increasing system complexity, thereby highlighting the significant challenges facing near-term quantum cryptographic applications. The performance gap between simulation and hardware arises mainly from the multi-controlled Z gate (MCZ) rather than generic noise effects. Due to its high decomposition cost, central role in oracle and diffusion operators, and sensitivity to noise, the MCZ gate becomes the dominant source of errors, directly limiting the accuracy of encryption and decryption in current NISQ devices.
- Execution Time Analysis: Real quantum hardware exhibits significantly increased execution times due to multiple operational overhead factors, including queue processing for hardware scheduling and resource allocation, calibration overhead from real-time system calibration requirements, and communication latency arising from classical-quantum interface delays. The temporal performance impact is substantial, with average execution times ranging from 18.26 s for 2-qubit systems to 20.18 s for 4-qubit systems on quantum hardware, representing an increase by approximately a factor of 260 increase compared to the 0.07 s execution time observed in simulator-based implementations. This dramatic temporal overhead, combined with the previously demonstrated accuracy degradation, further compounds the practical limitations of current quantum hardware for cryptographic applications, highlighting the significant gap between theoretical quantum advantage and real-world implementation feasibility.
4.4. Practical Feasibility Assessment
4.5. Implementation Complexity and Resource Analysis
- Quantum Resource Requirements:
4.6. Discussion
4.6.1. Comparative Analysis and Emerging Trends in Quantum Asymmetric Encryption
- Quantum Resource Utilization Strategies. The examined schemes demonstrate three primary quantum resource approaches: rotation-based single qubit states employed by Nikolopoulos [3] and Zheng et al. [4], Bell state entanglement utilized by Gao et al. [5] and Wu et al. [6], and GSA implementations adopted by Luo & Liu [7], Yoon et al. [8], and the proposed modified scheme. This distribution indicates a research trend toward algorithmic quantum advantage exploitation rather than purely quantum state-based security mechanisms.
- Key Space and Security Architecture Analysis. The key space analysis reveals a strategic division between “Big” and “Small” key spaces, where schemes utilizing complex quantum state preparations (Nikolopoulos [3], Zheng et al. [4], and Luo & Liu [7]) maintain large key spaces, while Bell state-based approaches (Gao et al. [5], Wu et al. [6]) and GAS-based methods (Yoon et al. [8] and the proposed modified scheme) operate within smaller key spaces. Notably, all schemes maintain one-way security for private key protection, indicating consistent adherence to fundamental cryptographic security principles.
- Computational Efficiency Evaluation. Efficiency metrics reveal substantial performance disparities, with the proposed modified scheme achieving efficiency (1.0) alongside Yoon et al. [8], while other approaches demonstrate reduced efficiency ranging from 50% to 2/3. The superior efficiency of GAS-based methods indicates the computational advantage of quantum search algorithms over traditional quantum state manipulation techniques for cryptographic applications.
- Quantum Memory and Public Key Infrastructure. The analysis of quantum memory storage requirements shows that only Bell state-based schemes (Gao et al. [5], Wu et al. [6]) require quantum memory storage, while GAS-based approaches operate without this constraint, significantly reducing implementation complexity. Public key center requirements vary inconsistently across schemes, with three approaches (Gao et al. [5], Luo & Liu [7], and Yoon et al. [8], and the proposed modified scheme) requiring centralized key management infrastructure.
- Simulation and Experimental Validation. A critical distinguishing feature of the proposed modified scheme is the inclusion of comprehensive simulation and experimental validation, uniquely positioned among the compared approaches that universally lack experimental verification. This simulation capability provides essential performance assessment and practical feasibility evaluation, addressing a significant gap in quantum cryptographic scheme validation methodologies.
- Implementation of Quantum Asymmetric Encryption on IBM Quantum Devices: We demonstrate the first practical implementation of a quantum asymmetric encryption protocol on IBM Quantum hardware. Using Qiskit, the protocol’s key generation, encryption, and decryption stages are translated into executable quantum circuits, confirming its feasibility for real-world applications.
- Performance Analysis of One-Round GSA: Through simulations and experiments, we evaluate one-round GSA on different qubit configurations. These results highlight the impact of noise and state size on GSA performance on NISQ devices.
- Generalization of GSA: We extend GSA to handle initial states, addressing the challenge of designing diffusion operators compatible with generalized states.
- Quantum gate-reduced Diffusion Operators: We propose a specific diffusion operator design for non-standard initial states, improving algorithm performance under diverse qubit configurations and randomization scenarios.
- Quantum Cryptographic Insights: Real-device experiments reveal performance degradation in one-round GSA with increasing qubits, underscoring the need for additional iterations or higher hardware fidelity for larger systems.
4.6.2. Security Analysis and Limitations
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. J. Cryptol. 1992, 5, 3–28. [Google Scholar] [CrossRef]
- Cao, Y.; Zhao, Y.; Wang, Q.; Zhang, J.; Ng, S.X.; Hanzo, L. The evolution of quantum key distribution networks: On the road to the qinternet. IEEE. Commun. Surv. Tutor. 2022, 24, 839–894. [Google Scholar] [CrossRef]
- Nikolopoulos, G.M. Applications of single-qubit rotations in quantum public-key cryptography. Phys. Rev. A—At. Mol. Opt. Phys. 2008, 77, 032348. [Google Scholar] [CrossRef]
- Zheng, S.; Gu, L.; Xiao, D. Bit-oriented quantum public key probabilistic encryption schemes. Int. J. Theor. Phys. 2014, 53, 116–124. [Google Scholar] [CrossRef]
- Gao, F.; Wen, Q.; Qin, S.; Zhu, F. Quantum asymmetric cryptography with symmetric keys. Sci. China Ser. G Phys. Mech. Astron. 2009, 52, 1925–1931. [Google Scholar] [CrossRef]
- Wu, W.; Cai, Q.; Zhang, H.; Liang, X. Quantum public key cryptosystem based on bell states. Int. J. Theor. Phys. 2017, 56, 3431–3440. [Google Scholar] [CrossRef]
- Luo, W.; Liu, G. Asymmetrical quantum encryption protocol based on quantum search algorithm. China Commun. 2014, 11, 104–111. [Google Scholar] [CrossRef]
- Yoon, C.S.; Hong, C.H.; Kang, M.S.; Choi, J.-W.; Yang, H.J. Quantum asymmetric key crypto scheme using Grover iteration. Sci. Rep. 2023, 13, 3810. [Google Scholar] [CrossRef] [PubMed]
- Grover, L.K. A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; pp. 212–219. [Google Scholar]
- Tseng, H.-Y.; Tsai, C.-W.; Hwang, T.; Li, C.-M. Quantum secret sharing based on quantum search algorithm. Int. J. Theor. Phys. 2012, 51, 3101–3108. [Google Scholar] [CrossRef]
- Rathi, D.; Musanna, F.; Kumar, S. A Four-Party Quantum Secret-Sharing Scheme based on Grover’s Search Algorithm. arXiv 2021, arXiv:2111.08932. [Google Scholar]
- Yoon, C.S.; Kang, M.S.; Lim, J.I.; Yang, H.J. Quantum signature scheme based on a quantum search algorithm. Phys. Scr. 2014, 90, 015103. [Google Scholar] [CrossRef]
- Huang, X.; Zhang, S.-B.; Chang, Y.; Qiu, C.; Liu, D.-M.; Hou, M. Quantum key agreement protocol based on quantum search algorithm. Int. J. Theor. Phys. 2021, 60, 838–847. [Google Scholar] [CrossRef]
- Chen, T.-H.A. Grover Search-Based Quantum Key Agreement Protocol for Secure Internet of Medical Things Communication. Future Internet 2025, 17, 263. [Google Scholar] [CrossRef]
- Hung, W.-H.; Chen, T.-H. Revisiting Quantum Asymmetric Key Cryptography: Enhancing Practical Implementations with a Generalized Grover Search Algorithm. In Proceedings of the 2025 1st International Conference on Consumer Technology (ICCT-Pacific), Matsue, Japan, 29–31 March 2025; pp. 1–4. [Google Scholar]
- Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th annual symposium on foundations of computer science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
- Sadana, S. Grover’s search algorithm for $ n $ qubits with optimal number of iterations. arXiv 2020, arXiv:2011.04051. [Google Scholar]
- IBM Quantum Platform. Available online: https://quantum.ibm.com/ (accessed on 11 September 2025).
- Zindorf, B.; Bose, S. Efficient implementation of multi-controlled quantum gates. arXiv 2024, arXiv:2404.02279. [Google Scholar] [CrossRef]
- Silva, J.D.; da Silva, A.J. Logarithmic Depth Decomposition of Approximate Multi-Controlled Single-Qubit Gates Without Ancilla Qubits. arXiv 2025, arXiv:2507.00400. [Google Scholar]
GGSA 1 | Average Accuracy 2 | SD 3 of Accuracy | Average Execution Time (s) 4 |
---|---|---|---|
2-qubit | 100% | 0.00 | 0.062 |
3-qubit | 78.15% | 0.35 | 0.069 |
4-qubit | 48.08% | 0.51 | 0.070 |
GGSA | Average Accuracy | SD of Accuracy | Average Execution Time (s) |
---|---|---|---|
2-qubit | 93.88% | 1.80 | 18.26 |
3-qubit | 45.84% | 10.26 | 18.87 |
4-qubit | 7.63% | 2.44 | 20.18 |
Component | Qubits | Gates | Depth |
---|---|---|---|
Key Generation 1 | 2 | ||
Encryption | 2 | 3 | |
Decryption | 2 | 3 |
Nikolopoulos [3] | Gao et al. [5] | Zheng et al. [4] | Wu et al. [6] | Luo & Liu [7] | Yoon et al. [8] | Ours | |
---|---|---|---|---|---|---|---|
Quantum resource | Rotation to single-qubit state | Bell state | Rotation to single-qubit state | Bell state | GAS | GAS | GAS |
Key space | Big | Small | Big | Small | Big | Small | Small |
Security of private key | One-way security | One-way security | One-way security | One-way security | One-way security | One-way security | One-way security |
State of Private/ Public key | Classical/ Quantum | Quantum/ Quantum | Classical/ Quantum | Quantum/ Quantum | Classical/ Quantum | Classical/ Quantum | Classical/ Quantum |
Key pair | Asymmetric | Symmetric | Asymmetric | Asymmetric | Asymmetric | Asymmetric | Asymmetric |
Problem with quantum memory storage | No | Yes | No | Yes | No | No | No |
Public key center | 1 N.S. | Yes | N.S. | N.S. | Yes | Yes | Yes |
Validation | N/A | N/A | N/A | N/A | N/A | N/A | Simulated, hardware-tested |
Efficiency | 1 | 50% | <50% | 50% | 2/3 | 1 | 1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, T.-H.; Hung, W.-H. Feasibility and Limitations of Generalized Grover Search Algorithm-Based Quantum Asymmetric Cryptography: An Implementation Study on Quantum Hardware. Electronics 2025, 14, 3821. https://doi.org/10.3390/electronics14193821
Chen T-H, Hung W-H. Feasibility and Limitations of Generalized Grover Search Algorithm-Based Quantum Asymmetric Cryptography: An Implementation Study on Quantum Hardware. Electronics. 2025; 14(19):3821. https://doi.org/10.3390/electronics14193821
Chicago/Turabian StyleChen, Tzung-Her, and Wei-Hsiang Hung. 2025. "Feasibility and Limitations of Generalized Grover Search Algorithm-Based Quantum Asymmetric Cryptography: An Implementation Study on Quantum Hardware" Electronics 14, no. 19: 3821. https://doi.org/10.3390/electronics14193821
APA StyleChen, T.-H., & Hung, W.-H. (2025). Feasibility and Limitations of Generalized Grover Search Algorithm-Based Quantum Asymmetric Cryptography: An Implementation Study on Quantum Hardware. Electronics, 14(19), 3821. https://doi.org/10.3390/electronics14193821