Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (963)

Search Parameters:
Keywords = quantum security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 1349 KB  
Review
Adversarial Robustness in Quantum Machine Learning: A Scoping Review
by Yanche Ari Kustiawan and Khairil Imran Ghauth
Computers 2026, 15(4), 233; https://doi.org/10.3390/computers15040233 - 9 Apr 2026
Abstract
Quantum machine learning (QML) is emerging as a promising paradigm at the intersection of quantum computing and artificial intelligence, yet its security under adversarial conditions remains insufficiently understood. This scoping review aims to systematically map empirical research on adversarial robustness in QML and [...] Read more.
Quantum machine learning (QML) is emerging as a promising paradigm at the intersection of quantum computing and artificial intelligence, yet its security under adversarial conditions remains insufficiently understood. This scoping review aims to systematically map empirical research on adversarial robustness in QML and to identify dominant threat models, defense strategies, evaluation approaches, practical constraints, and future research directions. Following PRISMA-ScR guidelines, four major databases were searched, resulting in 53 eligible empirical studies published between 2020 and 2026. The findings show that most research concentrates on input-level evasion attacks, particularly adversarial examples, and primarily evaluates robustness in classification-oriented models such as variational quantum circuits and quantum neural networks. Defense strategies are largely adapted from classical adversarial training and noise-based mitigation, with limited deployment on real quantum hardware. Robustness assessment is predominantly empirical, relying on accuracy degradation and attack success rate, while formal certification methods remain less common. The literature also highlights substantial constraints related to hardware limitations, NISQ noise, computational cost, and dataset scale. Overall, the evidence indicates that adversarial robustness research in QML is expanding but remains methodologically concentrated, underscoring the need for standardized benchmarking, scalable defenses, and hardware-validated robustness evaluation frameworks. Full article
Show Figures

Figure 1

30 pages, 2308 KB  
Article
Early Detection of Virtual Machine Failures in Cloud Computing Using Quantum-Enhanced Support Vector Machine
by Bhargavi Krishnamurthy, Saikat Das and Sajjan G. Shiva
Mathematics 2026, 14(7), 1229; https://doi.org/10.3390/math14071229 - 7 Apr 2026
Abstract
Cloud computing is one of the essential computing platforms for modern enterprises. A total of 84 percent of large businesses use cloud computing services in 2025 to enable remote working and higher flexibility of operation with reduction in the cost of operation. Cloud [...] Read more.
Cloud computing is one of the essential computing platforms for modern enterprises. A total of 84 percent of large businesses use cloud computing services in 2025 to enable remote working and higher flexibility of operation with reduction in the cost of operation. Cloud environments are dynamic and multitenant, often demanding high computational resources for real-time processing. However, the cloud system’s behavior is subjected to various kinds of anomalies in which patterns of data deviate from the normal traffic. The varieties of anomalies that exist are performance anomalies, security anomalies, resource anomalies, and network anomalies. These anomalies disrupt the normal operation of cloud systems by increasing the latency, reducing throughput, frequently violating service level agreements (SLAs), and experiencing the failure of virtual machines. Among all anomalies, virtual machine failures are one of the potential anomalies in which the normal operation of the virtual machine is interrupted, resulting in the degradation of services. Virtual machine failure happens because of resource exhaustion, malware access, packet loss, Distributed Denial of Service attacks, etc. Hence, there is a need to detect the chances of virtual machine failures and prevent it through proactive measures. Traditional machine learning techniques often struggle with high-dimensional data and nonlinear correlations, ending up with poor real-time adaptation. Hence, quantum machine learning is found to be a promising solution which effectively deals with combinatorially complex and high-dimensional data. In this paper, a novel quantum-enhanced support vector machine (QSVM) is designed as an optimized binary classifier which combines the principles of both quantum computing and support vector machine. It encodes the classical data into quantum states. Feature mapping is performed to transform the data into the high-dimensional form of Hilbert space. Quantum kernel evaluation is performed to evaluate similarities. Through effective optimization, optimal hyperplanes are designed to detect the anomalous behavior of virtual machines. This results in the exponential speed-up of operation and prevents the local minima through entanglement and superposition operation. The performance of the proposed QSVM is analyzed using the QuCloudSim 1.0 simulator and further validated using expected value analysis methodology. Full article
27 pages, 4837 KB  
Article
AI-Driven Adaptive Encryption Framework for a Modular Hardware-Based Data Security Device: Conceptual Architecture, Formal Foundations, and Security Analysis
by Pruthviraj Pawar and Gregory Epiphaniou
Appl. Sci. 2026, 16(7), 3522; https://doi.org/10.3390/app16073522 - 3 Apr 2026
Viewed by 136
Abstract
This paper presents a conceptual architecture for an AI-Driven Adaptive Encryption Device (AI-AED), a tri-modular hardware platform embodied in a registered industrial design. The device integrates a Secure Input Module, an AI-Enhanced Central Processing Unit with biometric authentication, and a Secure Output Module [...] Read more.
This paper presents a conceptual architecture for an AI-Driven Adaptive Encryption Device (AI-AED), a tri-modular hardware platform embodied in a registered industrial design. The device integrates a Secure Input Module, an AI-Enhanced Central Processing Unit with biometric authentication, and a Secure Output Module connected by unidirectional buses. We formalise the adaptive encryption policy as a constrained Markov decision process (CMDP) over a discrete action space of 216 cryptographic configurations, with safety constraints that provably prevent convergence to insecure states. A formal threat model based on extended Dolev–Yao assumptions with four physical access tiers defines attacker capabilities, and anti-downgrade safeguards enforce a monotonically non-decreasing security floor during threat escalation. An information-theoretic analysis shows that adaptive algorithm selection contributes an additional entropy term H(α) to ciphertext uncertainty, upper-bounded by log2(|L_enc|) ≈ 1.58 bits, while noting this represents increased attacker uncertainty rather than a strengthening of any individual cipher. A component-level latency model estimates 0.91–1.00 ms pipeline latency under normal operation and 3.14–3.42 ms under active threat, including integration overhead. Simulation validation over 1000 episodes compares a tabular Q-learning baseline against the proposed Deep Q-Network operating on the continuous state space: the DQN achieves 82% fewer constraint violations, 6× faster threat response, and more stable policy switching, demonstrating the advantage of continuous-state reinforcement learning for safety-critical adaptive encryption. All claims are positioned as theoretical contributions requiring empirical validation through prototype implementation. Full article
Show Figures

Figure 1

19 pages, 352 KB  
Article
Enhancing Polynomial Multiplication in Post-Quantum Cryptography for IoT Applications: A Hybrid Serial–Parallel Systolic Architecture
by Atef Ibrahim and Fayez Gebali
Computers 2026, 15(4), 224; https://doi.org/10.3390/computers15040224 - 3 Apr 2026
Viewed by 235
Abstract
The rapid growth of the Internet of Things (IoT) is fundamentally altering industrial and economic landscapes by embedding smart, connected devices into everyday operations. Despite these benefits, significant concerns regarding data protection and user privacy continue to obstruct the widespread use of these [...] Read more.
The rapid growth of the Internet of Things (IoT) is fundamentally altering industrial and economic landscapes by embedding smart, connected devices into everyday operations. Despite these benefits, significant concerns regarding data protection and user privacy continue to obstruct the widespread use of these technologies, particularly with the looming threat of quantum computing. Implementing post-quantum cryptographic (PQC) solutions is vital for addressing these risks, yet the limited resources found in IoT edge devices present major deployment challenges. Lattice-based cryptography has become a leading solution to these problems, largely because it depends on efficient polynomial multiplication. Enhancing the execution of this mathematical operation is crucial for improving the overall performance of PQC protocols. In this work, we introduce a hybrid serial–parallel systolic architecture specifically engineered for polynomial multiplication within the Binary Ring Learning With Errors (BRLWE) scheme. Designed for the security processors used in IoT hardware, this architecture significantly increases processing speeds while minimizing the use of hardware resources and reducing energy consumption. Such improvements are critical for establishing a secure IoT infrastructure that is resilient against quantum-era attacks and capable of supporting industrial expansion. Moreover, this research aligns with global Sustainable Development Goals (SDGs) 8 and 9 by building trust in innovative systems and fostering a more secure, sustainable, and productive digital economy. Full article
Show Figures

Figure 1

17 pages, 340 KB  
Article
Efficient Serial Systolic Polynomial Multiplier for Lattice-Based Post-Quantum Cryptographic Schemes in IoT Edge Node
by Atef Ibrahim and Fayez Gebali
Network 2026, 6(2), 21; https://doi.org/10.3390/network6020021 - 1 Apr 2026
Viewed by 127
Abstract
The rapid development of the Internet of Things (IoT) is transforming various economic and industrial sectors by embedding interconnected devices within their operational processes. However, security and privacy risks associated with these interconnected devices pose significant barriers to widespread adoption, particularly in light [...] Read more.
The rapid development of the Internet of Things (IoT) is transforming various economic and industrial sectors by embedding interconnected devices within their operational processes. However, security and privacy risks associated with these interconnected devices pose significant barriers to widespread adoption, particularly in light of potential quantum threats. To mitigate these challenges, it is imperative to employ post-quantum cryptographic schemes. However, essential constraints on IoT edge nodes complicate the effective implementation of such schemes. Among the most promising approaches in post-quantum cryptography are lattice-based schemes, which rely heavily on polynomial multiplication operations at their core. Improving the implementation of polynomial multiplication will significantly enhance the performance of these schemes. Therefore, this paper proposes an efficent low-complexity serial systolic array optimized for polynomial multiplication, particularly tailored for the Binary Ring Learning With Errors (BRLWE) scheme. Designed for cryptographic processors targeting capable IoT edge nodes, the proposed architecture demonstrates remarkable performance improvements, achieving a maximum operating frequency of 280 MHz for a field size of 256, while requiring only 8232 lookup tables (LUTs) and 2616 flip-flops (FFs). These results reflect a 16.8% reduction in LUT usage and a 19% reduction in FFs compared to the nearest competing designs, all while maintaining high throughput and low area utilization. This work significantly advances the establishment of secure and efficient infrastructure for IoT systems, bolstering their resilience against post-quantum attacks and supporting the growth of a robust digital economy. Furthermore, it aligns with sustainable development goals 8 and 9 by fostering trust and facilitating the adoption of cutting-edge IoT technologies, ultimately promoting more resilient and innovative economic activities. Full article
Show Figures

Figure 1

16 pages, 2012 KB  
Article
The Role of Averages in CV-QKD over Fast Fading Channels
by Miguel Castillo-Celeita and Matteo Schiavon
Entropy 2026, 28(4), 388; https://doi.org/10.3390/e28040388 - 1 Apr 2026
Viewed by 185
Abstract
This work presents a study of continuous-variable quantum key distribution (CV-QKD) protocols over fast-fading channels, typically found in free-space communication links. Two eavesdropping models are considered to evaluate their security under collective attacks: Holevo bound average (HBA) and covariance matrix average (CMA). In [...] Read more.
This work presents a study of continuous-variable quantum key distribution (CV-QKD) protocols over fast-fading channels, typically found in free-space communication links. Two eavesdropping models are considered to evaluate their security under collective attacks: Holevo bound average (HBA) and covariance matrix average (CMA). In the HBA approach, the Holevo bound is averaged over the channel transmittance. In contrast, the CMA method calculates the Holevo bound from the average covariance matrix. Analytical expressions are developed for both strategies. The two methods also differ in how they calculate the mutual information between the legitimate parties. The results demonstrate that the SKR is significantly influenced by how you treat channel fluctuations, highlighting the importance of choosing the model that best describes the actual implementation of the protocol. Full article
Show Figures

Figure 1

54 pages, 570 KB  
Article
Quantum Blockchains: Post-Quantum and Intrinsically Quantum Schemes
by Andrea Addazi
Electronics 2026, 15(7), 1447; https://doi.org/10.3390/electronics15071447 - 30 Mar 2026
Viewed by 345
Abstract
The advent of fault-tolerant quantum computers poses an existential threat to the current blockchain technology, which relies on cryptographic primitives like elliptic-curve cryptography and SHA-256 hashing. This manuscript surveys the emerging field of quantum-secure blockchains, categorizing the main research directions into two paradigms. [...] Read more.
The advent of fault-tolerant quantum computers poses an existential threat to the current blockchain technology, which relies on cryptographic primitives like elliptic-curve cryptography and SHA-256 hashing. This manuscript surveys the emerging field of quantum-secure blockchains, categorizing the main research directions into two paradigms. The first, post-quantum blockchain, seeks to replace classical cryptographic elements with quantum-resistant algorithms. The second, more radical approach aims to construct an intrinsically quantum blockchain, where the ledger’s security and state are encoded directly in quantum mechanical principles. We delve into three promising intrinsic schemes: those based on Greenberger–Horne–Zeilinger (GHZ) states and entanglement in time, those leveraging multi-time states and pseudo-density matrices, and hypergraph-based approaches. As the principal original contribution of this work, we present a comprehensive theoretical framework for a topological quantum blockchain based on non-Abelian anyons, providing the first detailed encoding scheme mapping classical blockchain data to braiding sequences. We further develop the connection to Chern–Simons theory, establishing a field-theoretic foundation where the blockchain’s history is encoded in Wilson loops, and its immutability follows from topological and gauge invariance. Extending this framework, we introduce a holographic AdS/CFT interpretation, revealing that the topological blockchain can be understood as a dual description of a black hole analog in anti-de Sitter space, where the blockchain’s history is encoded in the microstates of a black hole and linking braids between blocks correspond to wormholes. We provide a detailed physical and mathematical analysis of each scheme, comparing their security assumptions, resource requirements, and feasibility in the near and long terms. The topological approach, in particular, offers a compelling new path toward a blockchain with inherent fault tolerance, where the chain’s history is encoded in the topology of anyon worldlines, making it naturally resistant to decoherence and local tampering. Full article
Show Figures

Figure 1

13 pages, 263 KB  
Article
A Quantum Public-Key Cryptosystem with Reusable Keys Using Entangled States
by Xiaoyu Li and Yue Zhou
Appl. Sci. 2026, 16(7), 3335; https://doi.org/10.3390/app16073335 - 30 Mar 2026
Viewed by 156
Abstract
In most traditional quantum public-key cryptosystems, the public key held by the key management center (KMC) is a group of quantum systems. The public key is destroyed after a secret communication process, and so users must reconstruct the public key with the KMC [...] Read more.
In most traditional quantum public-key cryptosystems, the public key held by the key management center (KMC) is a group of quantum systems. The public key is destroyed after a secret communication process, and so users must reconstruct the public key with the KMC after every communication process or hold many copies of the public key in the beginning. This requirement is an obstacle to the practical application of such quantum cryptosystems. This paper describes a quantum public-key cryptosystem with reusable keys using entangled states. Each user shares a set of entangled quantum systems with the KMC as that individual user’s (public key, private key) pair. Two users can exchange secret communications with the help of the KMC. Moreover, the states of the quantum systems revert to their original states. The user’s (public key, private key) pair is unchanged so that the keys are reusable. It is unnecessary for users to reconstruct the public key with the KMC or save many copies of the public key in the KMC. As a result, this public-key cryptosystem is much less expensive to manage and easier to realize in practice than most traditional quantum public-key cryptosystems. Full article
(This article belongs to the Special Issue Quantum Communication and Quantum Information)
28 pages, 16669 KB  
Article
SQDPoS: A Secure and Practical Semi-Quantum Blockchain System for the Post-Quantum Era
by Ang Liu, Qi An, Sijiang Xie and Yalong Yan
Computers 2026, 15(4), 210; https://doi.org/10.3390/computers15040210 - 27 Mar 2026
Viewed by 390
Abstract
The rapid development of quantum computing poses severe threats to traditional blockchain security mechanisms, while existing full-quantum blockchains face challenges regarding high hardware costs and limited scalability. To address these issues, this paper proposes a secure and practical semi-quantum blockchain system. Specifically, a [...] Read more.
The rapid development of quantum computing poses severe threats to traditional blockchain security mechanisms, while existing full-quantum blockchains face challenges regarding high hardware costs and limited scalability. To address these issues, this paper proposes a secure and practical semi-quantum blockchain system. Specifically, a Semi-Quantum Delegated Proof of Stake consensus mechanism is constructed by integrating an adapted semi-quantum voting protocol with the Borda count method and a malicious behavior penalty model. Furthermore, a lightweight transaction verification framework is designed based on semi-quantum key distribution, enabling classical users with limited quantum capabilities to participate securely. Theoretical analysis demonstrates that the system achieves unconditional security against quantum attacks while maintaining high throughput. These results indicate that the proposed asymmetric resource design significantly lowers hardware barriers compared to full-quantum schemes, effectively balancing security, practicality, and cost-effectiveness for post-quantum blockchain networks. Full article
Show Figures

Figure 1

14 pages, 770 KB  
Article
A Searchable Encryption Scheme Based on CRYSTALS-Dilithium
by Minghui Zheng, Anqi Xiao, Shicheng Huang and Deju Kong
Cryptography 2026, 10(2), 22; https://doi.org/10.3390/cryptography10020022 - 27 Mar 2026
Viewed by 250
Abstract
With the advancement in quantum computing technology, the number theory-based hard problems underlying traditional searchable encryption algorithms are now vulnerable to efficient quantum attacks. To address this challenge, this paper proposes Dilithium-PAEKS (Dilithium-Public Authenticated Encryption with Keyword Search), a searchable encryption scheme based [...] Read more.
With the advancement in quantum computing technology, the number theory-based hard problems underlying traditional searchable encryption algorithms are now vulnerable to efficient quantum attacks. To address this challenge, this paper proposes Dilithium-PAEKS (Dilithium-Public Authenticated Encryption with Keyword Search), a searchable encryption scheme based on the post-quantum cryptographic algorithm CRYSTALS-Dilithium. By transforming the verification relationship of digital signatures into a matching relationship between trapdoors and ciphertexts, the scheme not only meets the functional requirements of searchable encryption but also demonstrates quantum resistance. The implementation enhances algorithm efficiency through keyword-based signatures and dynamic matching testing mechanisms. The security of the scheme is defined by the MLWE and MSIS hard problems, with proofs of keyword ciphertext indistinguishability and trapdoor indistinguishability under the random oracle model. Additionally, the scheme provides strong resistance against both outside and insider keyword guessing attacks through sender–receiver binding mechanisms and trapdoor indistinguishability properties. Experimental results show that, compared to the post-quantum schemes CP-Absel and LB-FSSE, the proposed scheme demonstrates superior overall computational efficiency while maintaining stronger quantum resistance than the traditional scheme SM9-PAEKS. Full article
Show Figures

Figure 1

26 pages, 1262 KB  
Article
Sensitivity Analysis of Variational Quantum Classifiers for Identifying Dummy Power Traces in Side-Channel Analysis
by Seungun Park and Yunsik Son
Appl. Sci. 2026, 16(7), 3243; https://doi.org/10.3390/app16073243 - 27 Mar 2026
Viewed by 272
Abstract
The application of quantum machine learning (QML) to security-relevant problems has attracted growing attention, yet its practical behavior in realistic workloads remains insufficiently characterized. This paper investigates the feasibility and limitations of variational quantum classifiers (VQCs) for identifying dummy power traces in side-channel [...] Read more.
The application of quantum machine learning (QML) to security-relevant problems has attracted growing attention, yet its practical behavior in realistic workloads remains insufficiently characterized. This paper investigates the feasibility and limitations of variational quantum classifiers (VQCs) for identifying dummy power traces in side-channel analysis (SCA). A controlled benchmarking framework is developed to evaluate training stability, sensitivity to key design parameters, and resource–performance trade-offs under realistic constraints. To move beyond idealized simulation, hardware-relevant factors, including finite measurement budgets and device noise, are incorporated, and inference robustness under degraded operating conditions is assessed. The results show that VQCs can capture meaningful discriminative patterns in structured side-channel data, although robustness and performance depend strongly on encoding strategy, circuit depth, and measurement conditions. These findings provide an empirical assessment of the potential and limitations of QML for side-channel security and offer practical guidance for future research. Full article
(This article belongs to the Special Issue Advances in Intelligent Systems—2nd edition)
Show Figures

Figure 1

23 pages, 3226 KB  
Article
A Detection and Recognition Method for Interference Signals Based on Radio Frequency Fingerprint Characteristics
by Yang Guo and Yuan Gao
Electronics 2026, 15(7), 1393; https://doi.org/10.3390/electronics15071393 - 27 Mar 2026
Viewed by 282
Abstract
With the advancement of 5G and the Internet of Things (IoT), traditional upper-layer authentication mechanisms are vulnerable to attacks, while quantum computing threatens cryptographic security. Radio frequency fingerprint identification (RFFI) offers a physical-layer solution by exploiting inherent hardware imperfections. However, in complex electromagnetic [...] Read more.
With the advancement of 5G and the Internet of Things (IoT), traditional upper-layer authentication mechanisms are vulnerable to attacks, while quantum computing threatens cryptographic security. Radio frequency fingerprint identification (RFFI) offers a physical-layer solution by exploiting inherent hardware imperfections. However, in complex electromagnetic environments, narrowband and especially agile interference (characterized by low power and narrow bandwidth) can severely distort fingerprint features, rendering conventional detection algorithms ineffective. To address this challenge, this paper proposes a novel interference detection framework tailored for Orthogonal Frequency Division Multiplexing (OFDM) systems. First, a signal transmission model incorporating non-ideal hardware characteristics (e.g., DC offset, I/Q imbalance) is established. Based on this model, we design an agile interference detection algorithm comprising two key components: (1) a time-series anomaly detection method that fuses multi-domain expert features (fractal, complexity, and high-order statistics) with machine learning, demonstrating superior performance over the traditional CME algorithm under narrowband interference, and (2) a progressive search segmental detection algorithm that, combined with reconstruction error features extracted by an autoencoder, effectively identifies low-power agile interference by appropriately trading-off computation time for detection sensitivity. Finally, an OFDM simulation platform is developed to validate the proposed methods. The results show that the segmental detection algorithm achieves reliable detection at a jammer-to-signal ratio (JSR) as low as −10 dB, significantly outperforming existing approaches and enhancing the robustness of RFFI in challenging interference environments. Full article
Show Figures

Figure 1

11 pages, 5663 KB  
Article
Quantum Random Number Generation Using Nanodiamonds and Nanopillar-Isolated Single NV Centers
by Oskars Rudzitis, Reinis Lazda, Valts Krumins, Heinrihs Meilerts, Mona Jani and Marcis Auzinsh
Nanomaterials 2026, 16(7), 404; https://doi.org/10.3390/nano16070404 - 27 Mar 2026
Viewed by 337
Abstract
Quantum random number generation (QRNG) provides fundamentally unpredictable randomness derived from intrinsic quantum processes. In this work we demonstrate two solid-state, room-temperature QRNG implementations based on nitrogen-vacancy (NV) centers in diamond, i.e., ensemble fluorescence from nanodiamonds and single-photon emission from single NV centers [...] Read more.
Quantum random number generation (QRNG) provides fundamentally unpredictable randomness derived from intrinsic quantum processes. In this work we demonstrate two solid-state, room-temperature QRNG implementations based on nitrogen-vacancy (NV) centers in diamond, i.e., ensemble fluorescence from nanodiamonds and single-photon emission from single NV centers located at the tips of fabricated diamond nanopillars for enhanced light collection efficiency, spatial isolation and minimized crosstalk. We compare entropy rates (above 0.98 bits), statistical performance, and robustness of both approaches in our experimental setup, the results contribute to establishing diamond-based QRNG as a scalable solution for quantum-secure randomness generation. Full article
(This article belongs to the Section Physical Chemistry at Nanoscale)
Show Figures

Figure 1

17 pages, 254 KB  
Article
Quantum Entanglement in Digital Forensics: Methodology and Experimental Findings
by Shatha Alhazmi, Khaled Elleithy and Abdelrahman Elleithy
Electronics 2026, 15(7), 1372; https://doi.org/10.3390/electronics15071372 - 26 Mar 2026
Viewed by 272
Abstract
The fast-paced progress in quantum computing introduces significant new challenges for digital forensics by undermining classical cryptographic mechanisms that protect digital evidence. Algorithms such as Shor’s and Grover’s threaten the long-term reliability of traditional hash functions, digital signatures, and encryption schemes, thereby compromising [...] Read more.
The fast-paced progress in quantum computing introduces significant new challenges for digital forensics by undermining classical cryptographic mechanisms that protect digital evidence. Algorithms such as Shor’s and Grover’s threaten the long-term reliability of traditional hash functions, digital signatures, and encryption schemes, thereby compromising the integrity, authenticity, and confidentiality of evidence. This paper investigates how quantum entanglement can be leveraged to enhance the security of digital forensic evidence in the post-quantum era. A hybrid quantum–classical forensic framework is proposed, integrating three entanglement-based components: an entanglement-assisted quantum hashing mechanism for integrity assurance, a CHSH nonlocality-based protocol for authenticity verification, and a BBM92 quantum key distribution scheme for confidentiality and secure chain-of-custody management. All components are implemented using IBM Qiskit and evaluated with the AerSimulator under realistic Noisy Intermediate-Scale Quantum conditions. Experimental results measured using Hamming distance, CHSH S-values, and Quantum Bit Error Rate demonstrate improved tamper detection, reliable authenticity validation, and strong overall confidentiality. Full article
(This article belongs to the Special Issue Feature Papers in Networks: 2025–2026 Edition)
33 pages, 2907 KB  
Article
Reimagining Bitcoin Mining as a Virtual Energy Storage Mechanism in Grid Modernization: Enhancing Security, Sustainability, and Resilience of Smart Cities Against False Data Injection Cyberattacks
by Ehsan Naderi
Electronics 2026, 15(7), 1359; https://doi.org/10.3390/electronics15071359 - 25 Mar 2026
Viewed by 457
Abstract
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and [...] Read more.
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and controllable load capable of delivering large-scale demand response services, positioning it as a competitive alternative to traditional energy storage systems, including electrical, mechanical, thermal, chemical, and electrochemical storage solutions. By strategically aligning mining activities with grid conditions, Bitcoin mining can absorb excess electricity during periods of oversupply, converting it into digital assets, and reduce operations during times of scarcity, effectively emulating the behavior of conventional energy storage systems without the associated capital expenditures and material requirements. Beyond its operational flexibility, this paper explores the cyber–physical benefits of integrating Bitcoin mining into the power transmission systems as a defensive mechanism against false data injection (FDI) cyberattacks in smart city infrastructure. To achieve this goal, a decentralized and adaptive control strategy is proposed, in which mining loads dynamically adjust based on authenticated grid-state information, thereby improving system observability and hindering adversarial efforts to disrupt state estimation. In addition, to handle the proposed approach, this paper introduces a high-performance algorithm, a combination of quantum-augmented particle swarm optimization and wavelet-oriented whale optimization (QAPSO-WOWO). Simulation results confirm that strategic deployment of mining loads improves grid sustainability by utilizing curtailed renewables, enhances resilience by mitigating load-generation imbalances, and bolsters cybersecurity by reducing the impacts of FDI attacks. This work lays the foundation for a transdisciplinary paradigm shift, positioning Bitcoin mining not as a passive energy consumer but as an active participant in securing and stabilizing the future power grid in smart cities. Full article
Show Figures

Figure 1

Back to TopTop