Page 302 - Kaleidoscope Academic Conference Proceedings 2024
P. 302

2024 ITU Kaleidoscope Academic Conference




           a deep understanding of finding novel research trends in  2.  FUNDAMENTALS OF QUANTUM
           Quantum communication technology.  Their work uses                  COMMUNICATION
           a variety of methods to analyze the patent information
           to identify the important developments and possible new  In the quantum realm, physics is different than that in
           directions in quantum computing, and as such, presents a  classical mechanics. In a classic situation, the properties
           rich picture of the innovation activity in the field. Likewise,  of the particles are independent, regardless of the distance
           Seol and Kim [13] present the potential of utilizing quantum  separating them.  This phenomenon, mathematically
           technologies in amalgamating better cryptographic methods  described by entangled states, such as Bell state |  ⟩ =
                                                               1
           for strengthening blockchain technologies’ availability and  √ (|0⟩    ⊗ |1⟩    − |1⟩    ⊗ |0⟩    ) non-locally articulates these
                                                               2
           security in quantum environments. Deshmukh and Mulay  correlations between the quantum systems.  When two
           [14] explain the relevance of quantum clustering in the  particles exert spooky action at a distance [4] on each
           development of innovations by performing bibliometric and  other (or are entangled) the state of one is changed
           patentometric analysis that presents a correlation between  instantly and contacted with the other’s state, even if they
           the two indices and increased research and development of  are light-years apart, and this is a violation of classical
           quantum technologies.                              notions of locality.  Quantum entanglement [5] warrants
                                                              that some applications are arising, for instance quantum
           Coccia [15] also expands on the integration of artificial  communication, cryptography, and computing.  This
           intelligence and quantum technologies, claiming that their  enables effective communication channels with increased
           alliance may increase the rate of technology development and  security, powerful computing functions and novel ways
           bring numerous improvements to numerous fields. Following  of information processing, hence creating grounds for
           this paper, Jiang and Chen [16] use the concept of patent  breakthrough technologies and science.
           mapping to analyze the organizational structures of patent
                                                              Superposition [5] is one of the fundamental concepts in
           data to understand who the main players and the technological
                                                              quantum mechanics. It is the effect that a quantum system
           clusters, which o shape the quantum technology sector
                                                              could be in different states at the same time. Mathematical
           are. Aggarwal et al. [17] reveal the concept of quantum
                                                              languages of it are linear combinations, where a quantum state
           measurement adversary to the subject of information theory in
                                                              |  ⟩ can be shown as sums of complex probability amplitudes
           the context of quantum technologies and their susceptibilities.
                                                                 and   with coefficients of their respective basis states |  ⟩
                                                              and |  ⟩. The    and    constant must meet the normalization
           Murariu et al. [18] have laid down steps for designing QKD    2    2
                                                              condition |  | + |  | = 1, implying the total probability of
           devices reporting that secure communications will remain an
                                                              1 is preserved. This principle signifies that the system is in
           essential component in the era of quantum. In the study
                                                              remained in a superposition state of |  ⟩ or |  ⟩ until measured
           [19], the authors presented the historical analysis of the
                                                              and the system collapses into a |  ⟩ and |  ⟩ state based on their
           development of QC, while considering the theoretical and
                                                              respective probabilities. Owing to this principle the quantum
           managerial applications of the present era’s quantum industry
                                                              interference arises, which is the base for quantum computing
           that is crucial to strategizing and advancing future innovation.
                                                              and communication. This principle allows the simultaneous
           Baseri et al. [20] have emphasized on the security threats of
                                                              handling of multiple tasks in order to performs the reasoning
           quantum computing in networked systems and Quantum-safe
                                                              that is previously hard to accomplish.
           network protocols to mitigate such threats.  Coccia [21]
           describes the technological pathways in quantum computing
                                                              Table 1 – Comparison between Classical and Quantum
           and puts forward design options for the quantum environment
                                                              Communication
           that can enable technological transformation for industries
           while avoiding the unsustainable tendencies of technology  Aspect  Classical Comm.  Quantum Comm.
           development.                                           Security  Vulnerable       Secure
                                                                  Capacity  Limited bandwidth  High bandwidth
           This paper aims to give an overview on the topic of    Resistance  Electromagnetic  Resilient
           quantum communication.  This consists of the Quantum   Complexity  Simple         Specialized
           Communications Fundamentals,  which lay down the       Privacy   Centralized      Enhanced
           foundation in the subject.  The two main topics of
           discussion are then Classical vs Quantum Cryptography,
                                                               3.  CLASSICAL VS QUANTUM CRYPTOGRAPHY
           aiming to shed light on the quantum methods.  The
           methods covered under the section Quantum Key Distribution  3.1 Principles of Classical Cryptography
           (QKD) Protocols are the basic security measures needed
           for secure communication.  It considers present and  Classical cryptography [6] responds to secure communication
           further opportunities of the development of quantum  problem between two parties, denoted as Alice and Bob, over
           communication.  The paper concludes with Section on  a public channel in a way that the communication remains
           Conclusion and Future Direction, indicating the major  between the two parties only, none between other parties,
           findings and recommendations for future research on quantum  namely Eve, can eavesdrop. Alice begins encrypting the
           communication.                                     plaintext message    by running an encryption algorithm   




                                                          – 258 –
   297   298   299   300   301   302   303   304   305   306   307