Page 302 - Kaleidoscope Academic Conference Proceedings 2024
P. 302
2024 ITU Kaleidoscope Academic Conference
a deep understanding of finding novel research trends in 2. FUNDAMENTALS OF QUANTUM
Quantum communication technology. Their work uses COMMUNICATION
a variety of methods to analyze the patent information
to identify the important developments and possible new In the quantum realm, physics is different than that in
directions in quantum computing, and as such, presents a classical mechanics. In a classic situation, the properties
rich picture of the innovation activity in the field. Likewise, of the particles are independent, regardless of the distance
Seol and Kim [13] present the potential of utilizing quantum separating them. This phenomenon, mathematically
technologies in amalgamating better cryptographic methods described by entangled states, such as Bell state | ⟩ =
1
for strengthening blockchain technologies’ availability and √ (|0⟩ ⊗ |1⟩ − |1⟩ ⊗ |0⟩ ) non-locally articulates these
2
security in quantum environments. Deshmukh and Mulay correlations between the quantum systems. When two
[14] explain the relevance of quantum clustering in the particles exert spooky action at a distance [4] on each
development of innovations by performing bibliometric and other (or are entangled) the state of one is changed
patentometric analysis that presents a correlation between instantly and contacted with the other’s state, even if they
the two indices and increased research and development of are light-years apart, and this is a violation of classical
quantum technologies. notions of locality. Quantum entanglement [5] warrants
that some applications are arising, for instance quantum
Coccia [15] also expands on the integration of artificial communication, cryptography, and computing. This
intelligence and quantum technologies, claiming that their enables effective communication channels with increased
alliance may increase the rate of technology development and security, powerful computing functions and novel ways
bring numerous improvements to numerous fields. Following of information processing, hence creating grounds for
this paper, Jiang and Chen [16] use the concept of patent breakthrough technologies and science.
mapping to analyze the organizational structures of patent
Superposition [5] is one of the fundamental concepts in
data to understand who the main players and the technological
quantum mechanics. It is the effect that a quantum system
clusters, which o shape the quantum technology sector
could be in different states at the same time. Mathematical
are. Aggarwal et al. [17] reveal the concept of quantum
languages of it are linear combinations, where a quantum state
measurement adversary to the subject of information theory in
| ⟩ can be shown as sums of complex probability amplitudes
the context of quantum technologies and their susceptibilities.
and with coefficients of their respective basis states | ⟩
and | ⟩. The and constant must meet the normalization
Murariu et al. [18] have laid down steps for designing QKD 2 2
condition | | + | | = 1, implying the total probability of
devices reporting that secure communications will remain an
1 is preserved. This principle signifies that the system is in
essential component in the era of quantum. In the study
remained in a superposition state of | ⟩ or | ⟩ until measured
[19], the authors presented the historical analysis of the
and the system collapses into a | ⟩ and | ⟩ state based on their
development of QC, while considering the theoretical and
respective probabilities. Owing to this principle the quantum
managerial applications of the present era’s quantum industry
interference arises, which is the base for quantum computing
that is crucial to strategizing and advancing future innovation.
and communication. This principle allows the simultaneous
Baseri et al. [20] have emphasized on the security threats of
handling of multiple tasks in order to performs the reasoning
quantum computing in networked systems and Quantum-safe
that is previously hard to accomplish.
network protocols to mitigate such threats. Coccia [21]
describes the technological pathways in quantum computing
Table 1 – Comparison between Classical and Quantum
and puts forward design options for the quantum environment
Communication
that can enable technological transformation for industries
while avoiding the unsustainable tendencies of technology Aspect Classical Comm. Quantum Comm.
development. Security Vulnerable Secure
Capacity Limited bandwidth High bandwidth
This paper aims to give an overview on the topic of Resistance Electromagnetic Resilient
quantum communication. This consists of the Quantum Complexity Simple Specialized
Communications Fundamentals, which lay down the Privacy Centralized Enhanced
foundation in the subject. The two main topics of
discussion are then Classical vs Quantum Cryptography,
3. CLASSICAL VS QUANTUM CRYPTOGRAPHY
aiming to shed light on the quantum methods. The
methods covered under the section Quantum Key Distribution 3.1 Principles of Classical Cryptography
(QKD) Protocols are the basic security measures needed
for secure communication. It considers present and Classical cryptography [6] responds to secure communication
further opportunities of the development of quantum problem between two parties, denoted as Alice and Bob, over
communication. The paper concludes with Section on a public channel in a way that the communication remains
Conclusion and Future Direction, indicating the major between the two parties only, none between other parties,
findings and recommendations for future research on quantum namely Eve, can eavesdrop. Alice begins encrypting the
communication. plaintext message by running an encryption algorithm
– 258 –