entropy-logo

Journal Browser

Journal Browser

Quantum Information Security

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Quantum Information".

Deadline for manuscript submissions: 31 May 2026 | Viewed by 1614

Special Issue Editor


E-Mail Website
Guest Editor
School of Computer Science and Technology, University of Science and Technology of China, Hefei 230026, China
Interests: quantum computing; quantum information processing; information security; machine learning; ubiquitous computing

Special Issue Information

Dear Colleagues,

The rapid advancement of quantum computing poses both unprecedented challenges and transformative opportunities for information security. While quantum technologies promise significant breakthroughs in computational power, they also threaten to undermine classical cryptographic systems that form the backbone of modern digital security. In response, quantum information security has emerged as a double-edged sword, both leveraging quantum principles to strengthen security and countering the threats posed by quantum-enabled attacks.

We invite contributions that explore quantum and quantum-resistant cryptography, security models for quantum networks, and post-quantum cryptographic algorithms. Additionally, we welcome research on quantum attack strategies, cryptographic protocols resilient to quantum threats, and novel quantum-based secure multi-party computation schemes. Submissions may also address integrating quantum security into existing infrastructures and standardization efforts for post-quantum security frameworks.

This Special Issue will provide a comprehensive overview of the evolving landscape of quantum information security, fostering collaboration between researchers in quantum computing, cryptography, and cybersecurity. Both theoretical and experimental studies, as well as survey papers offering new insights into the field, are encouraged for submission.

This Special Issue will accept unpublished original papers and comprehensive reviews focused on (but not restricted to) the following research areas:

  • Quantum Cryptography and Protocols;
  • Post-Quantum Cryptography;
  • Secure Multi-party Quantum Computation;
  • Security of Quantum Networks and the Quantum Internet;
  • Quantum Attacks and Security Analysis;
  • Quantum Machine Learning for Security Applications;
  • Privacy and Secure Computation in Quantum Environments;
  • Quantum-Secured Blockchain and Distributed Systems;
  • Formal Verification of Quantum Security;
  • Quantum-Safe Infrastructure and Hybrid Systems;
  • Quantum Hardware Security.

Dr. Wei Yang
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum computing
  • information security
  • cryptography
  • secure computation
  • attacks
  • machine learning

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 334 KB  
Article
An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits
by Kai Xing, Rongbo Lu, Sihai Liu and Lu Lan
Entropy 2025, 27(11), 1107; https://doi.org/10.3390/e27111107 - 26 Oct 2025
Viewed by 575
Abstract
This paper presents a semi-quantum secret sharing (SQSS) protocol based on three-particle W states, designed for efficient and secure secret sharing in quantum-resource-constrained scenarios. In the protocol, a fully quantum-capable sender encodes binary secrets using W, while receivers with limited quantum capabilities [...] Read more.
This paper presents a semi-quantum secret sharing (SQSS) protocol based on three-particle W states, designed for efficient and secure secret sharing in quantum-resource-constrained scenarios. In the protocol, a fully quantum-capable sender encodes binary secrets using W, while receivers with limited quantum capabilities reconstruct the secret through collaborative Z basis measurements and classical communication, ensuring no single participant can obtain the complete information independently. The protocol employs a four-state decoy photon technique ({|0,|1,|+,|}) and position randomization, combined with photon number splitting (PNS) and wavelength filtering (WF) technologies, to resist intercept–resend, entanglement–measurement, and double controlled-NOT(CNOT) attacks. Theoretical analysis shows that the detection probability of intercept–resend attacks increases exponentially with the number of decoy photons (approaching 1). For entanglement–measurement attacks, any illegal operation by an attacker introduces detectable quantum state disturbances. Double CNOT attacks are rendered ineffective by the untraceability of particle positions and mixed-basis strategies. Leveraging the robust entanglement of W states, the protocol proves that the mutual information between secret bits and single-participant measurement results is strictly zero, ensuring lossless reconstruction only through authorized collaboration. Full article
(This article belongs to the Special Issue Quantum Information Security)
Show Figures

Figure 1

18 pages, 712 KB  
Article
Lightweight Quantum Authentication and Key Agreement Scheme in the Smart Grid Environment
by Zehui Jiang and Run-Hua Shi
Entropy 2025, 27(9), 957; https://doi.org/10.3390/e27090957 - 14 Sep 2025
Viewed by 592
Abstract
Smart grids leverage smart terminal devices to collect information from the user side, achieving accurate load forecasting and optimized dispatching of power systems, effectively improving power supply efficiency and reliability while reducing energy consumption. However, the development of quantum technology poses severe challenges [...] Read more.
Smart grids leverage smart terminal devices to collect information from the user side, achieving accurate load forecasting and optimized dispatching of power systems, effectively improving power supply efficiency and reliability while reducing energy consumption. However, the development of quantum technology poses severe challenges to the communication security of smart grids that rely on traditional cryptography. To address this security risk in the quantum era, this paper draws on the core idea of quantum private comparison and proposes a quantum-secure identity authentication and key agreement scheme suitable for smart grids. This scheme uses Bell states as quantum resources, combines hash functions and XOR operations, and can adapt to resource-constrained terminal devices. Through a security proof, it verifies the scheme’s ability to resist various attacks; the experimental results further show that the scheme still has good robustness in different noise environments, providing a feasible technical path for the secure communication of smart grids in the quantum environment and having clear practical engineering value. Full article
(This article belongs to the Special Issue Quantum Information Security)
Show Figures

Figure 1

Back to TopTop