Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = quantum-inspired cryptography

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 1620 KB  
Article
A Multi-Layer Quantum-Resilient IoT Security Architecture Integrating Uncertainty Reasoning, Relativistic Blockchain, and Decentralised Storage
by Gerardo Iovane
Appl. Sci. 2025, 15(16), 9218; https://doi.org/10.3390/app15169218 - 21 Aug 2025
Viewed by 280
Abstract
The rapid development of the Internet of Things (IoT) has enabled the implementation of interconnected intelligent systems in extremely dynamic contexts with limited resources. However, traditional paradigms, such as those using ECC-based heuristics and centralised decision-making frameworks, cannot be modernised to ensure resilience, [...] Read more.
The rapid development of the Internet of Things (IoT) has enabled the implementation of interconnected intelligent systems in extremely dynamic contexts with limited resources. However, traditional paradigms, such as those using ECC-based heuristics and centralised decision-making frameworks, cannot be modernised to ensure resilience, scalability and security while taking quantum threats into account. In this case, we propose a modular architecture that integrates quantum-inspired cryptography (QI), epistemic uncertainty reasoning, the multiscale blockchain MuReQua, and the quantum-inspired decentralised storage engine (DeSSE) with fragmented entropy storage. Each component addresses specific cybersecurity weaknesses of IoT devices: quantum-resistant communication on epistemic agents that facilitate cognitive decision-making under uncertainty, lightweight adaptive consensus provided by MuReQua, and fragmented entropy storage provided by DeSSE. Tested through simulations and use case analyses in industrial, healthcare and automotive networks, the architecture shows exceptional latency, decision accuracy and fault tolerance compared to conventional solutions. Furthermore, its modular nature allows for incremental integration and domain-specific customisation. By adding reasoning, trust and quantum security, it is possible to design intelligent decentralised architectures for resilient IoT ecosystems, thereby strengthening system defences alongside architectures. In turn, this work offers a specific architectural response and a broader perspective on secure decentralised computing, even for the imminent advent of quantum computers. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

27 pages, 960 KB  
Article
Quantum-Inspired Algorithms and Perspectives for Optimization
by Gerardo Iovane
Electronics 2025, 14(14), 2839; https://doi.org/10.3390/electronics14142839 - 15 Jul 2025
Cited by 1 | Viewed by 1005
Abstract
This paper starts with an updated review and analyzes recent developments in quantum-inspired algorithms for cybersecurity, with specific attention to possible perspectives of optimization. The enhancement of classical computing capabilities with quantum principles is transforming fields such as machine learning, optimization, and cybersecurity. [...] Read more.
This paper starts with an updated review and analyzes recent developments in quantum-inspired algorithms for cybersecurity, with specific attention to possible perspectives of optimization. The enhancement of classical computing capabilities with quantum principles is transforming fields such as machine learning, optimization, and cybersecurity. Evolutionary algorithms are one example where progress has already been made using quantum techniques through increased efficiency, generalization, and problem-solving techniques exploited by quantum principles. Quantum-inspired evolutionary algorithms (QIEAs) and quantum kernel methods are prime examples of such approaches. Quantum techniques are also used in the field of cybersecurity: QML-based identification systems for intrusion detection strengthen threat detection and encoding through quantum techniques with advanced cryptographic security, while quantum-secure hashing (QSHA) offers sophisticated means of protecting sensitive information. More specifically, QGANs are known for their integration into adversarial generative networks that increase efficiency by replacing classical models in adversarial defense through the generation of synthetic attack models. In this work, a set of benchmarks is provided for comparison with classical and other quantum-inspired technologies. The results demonstrate that these methods far outperform others in terms of computational efficiency and satisfactory scalability. Although fully functional models are still awaited, quantum computing benefits greatly from quantum-inspired technologies, as the latter enable the development of frameworks that bring us closer to the quantum era. Consequently, the work takes the form of an updated systematic review enriched with optimized perspectives. Full article
Show Figures

Figure 1

31 pages, 2231 KB  
Article
A Hybrid Key Generator Model Based on Multiscale Prime Sieve and Quantum-Inspired Approaches
by Gerardo Iovane and Elmo Benedetto
Appl. Sci. 2025, 15(14), 7660; https://doi.org/10.3390/app15147660 - 8 Jul 2025
Viewed by 386
Abstract
This article examines a hybrid generation of cryptographic keys, whose novelty lies in the fusion of a multiscale subkey generation with prime sieve and subkeys inspired by quantum mechanics. It combines number theory with techniques emulated and inspired by quantum mechanics, also based [...] Read more.
This article examines a hybrid generation of cryptographic keys, whose novelty lies in the fusion of a multiscale subkey generation with prime sieve and subkeys inspired by quantum mechanics. It combines number theory with techniques emulated and inspired by quantum mechanics, also based on two demons capable of dynamically modifying the cryptographic model. The integration is structured through the JDL. In fact, a specific information fusion model is used to improve security. As a result, the resulting key depends not only on the individual components, but also on the fusion path itself, allowing for dynamic and cryptographically agile configurations that remain consistent with quantum mechanics-inspired logic. The proposed approach, called quantum and prime information fusion (QPIF), couples a simulated quantum entropy source, derived from the numerical solution of the Schrödinger equation, with a multiscale prime number sieve to construct multilevel cryptographic keys. The multiscale sieve, based on recent advances, is currently among the fastest available. Designed to be compatible with classical computing environments, the method aims to contribute to cryptography from a different perspective, particularly during the coexistence of classical and quantum computers. Among the five key generation algorithms implemented here, the ultra-optimised QRNG offers the most effective trade-off between performance and randomness. The results are validated using standard NIST statistical tests. This hybrid framework can also provide a conceptual and practical basis for future work on PQC aimed at addressing the challenges posed by the quantum computing paradigm. Full article
Show Figures

Figure 1

26 pages, 339 KB  
Review
Quantum-Inspired Statistical Frameworks: Enhancing Traditional Methods with Quantum Principles
by Theodoros Kyriazos and Mary Poga
Encyclopedia 2025, 5(2), 48; https://doi.org/10.3390/encyclopedia5020048 - 4 Apr 2025
Cited by 1 | Viewed by 1578
Abstract
This manuscript introduces a comprehensive framework for augmenting classical statistical methodologies through the targeted integration of core quantum mechanical principles—specifically superposition, entanglement, measurement, wavefunctions, and density matrices. By concentrating on these foundational concepts instead of the whole expanse of quantum theory, we propose [...] Read more.
This manuscript introduces a comprehensive framework for augmenting classical statistical methodologies through the targeted integration of core quantum mechanical principles—specifically superposition, entanglement, measurement, wavefunctions, and density matrices. By concentrating on these foundational concepts instead of the whole expanse of quantum theory, we propose “quantum-inspired” models that address persistent shortcomings in conventional statistical approaches. In particular, five pivotal distributions (normal, binomial, Poisson, Student’s t, and chi-square) are reformulated to incorporate interference terms, phase factors, and operator-based transformations, thereby facilitating the representation of multimodal data, phase-sensitive dependencies, and correlated event patterns—characteristics that are frequently underrepresented in purely real-valued, classical frameworks. Furthermore, ten quantum-inspired statistical principles are delineated to guide practitioners in systematically adapting quantum mechanics for traditional inferential tasks. These principles are illustrated through domain-specific applications in finance, cryptography (distinct from direct quantum cryptography applications), healthcare, and climate modeling, demonstrating how amplitude-based confidence measures, density matrices, and measurement analogies can enrich standard statistical models by capturing more nuanced correlation structures and enhancing predictive performance. By unifying quantum constructs with established statistical theory, this work underscores the potential for interdisciplinary collaboration and paves the way for advanced data analysis tools capable of addressing high-dimensional, complex, and dynamically evolving datasets. Complete R code ensures reproducibility and further exploration. Full article
(This article belongs to the Section Mathematics & Computer Science)
23 pages, 7508 KB  
Article
Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain
by Taowei Chen, Zhixin Ren, Yimin Yu, Jie Zhu and Jinyi Zhao
Appl. Sci. 2023, 13(13), 7765; https://doi.org/10.3390/app13137765 - 30 Jun 2023
Cited by 8 | Viewed by 2285
Abstract
To address the quantum attacks on number theory-based ciphertext policy attribute-based encryption (CP-ABE), and to avoid private key leakage problems by relying on a trustworthy central authority, we propose a lattice-inspired CP-ABE scheme for data access and sharing based on blockchain in this [...] Read more.
To address the quantum attacks on number theory-based ciphertext policy attribute-based encryption (CP-ABE), and to avoid private key leakage problems by relying on a trustworthy central authority, we propose a lattice-inspired CP-ABE scheme for data access and sharing based on blockchain in this paper. Firstly, a CP-ABE-based algorithm using learning with errors (LWE) assumption is constructed, which is selective security under linear independence restriction in the random oracle model. Secondly, the blockchain nodes can act as a distributed key management server to offer control over master keys used to generate private keys for different data users that reflect their attributes through launching transactions on the blockchain system. Finally, we develop smart contracts for proving the correctness of proxy re-encryption (PRE) and provide auditability for the whole data-sharing process. Compared with the traditional CP-ABE algorithm, the post-quantum CP-ABE algorithm can significantly improve the computation speed according to the result of the functional and experimental analysis. Moreover, the proposed blockchain-based CP-ABE scheme provides not only multi-cryptography collaboration to enhance the security of data access and sharing but also reduces average transaction response time and throughput. Full article
(This article belongs to the Special Issue Cryptography and Its Applications in Information Security, Volume II)
Show Figures

Figure 1

Back to TopTop