Page 512 - Kaleidoscope Academic Conference Proceedings 2024
P. 512
P1.4 Exploring the Quantum Frontier: Applications, Challenges, and Future Directions in Quantum
Communication Technologies
Shreshtha Misra (NSUT, New Delhi, India); Vimal Dixit (Jawaharlal Nehru University, New
Delhi, India); Vikas Shukla (Amity University, Noida, India)
Quantum Communication becomes a new field of communication technologies with highly
diverse applications, and much complexity, and is a promising area deserving further exploration.
This paper aims to provide a complete expository of quantum communication, describing the
principles that govern it, which is quite different from classical communication. However, the
paper also reflects on the wide purposes of quantum technologies mentioning quantum key
distribution and quantum networks as examples of application areas as well as quantum
communication for IoT, Government, and defense industry as the areas of great impact. While the
potential advantages are huge, the obstacles are also great. In addition, the paper focuses on the
progression of quantum key distribution protocols, which ties in well alongside quantum
computing and Cryptography, and discusses hindrances and future research directions in this area,
which can help to drive this field even further. The paper aims to integrate the most recent
developments, difficulties, and future outlook of the subject, hence serving as a thorough manual
for both researchers and practitioners who operate in a complicated landscape of quantum
communication technologies.
P1.5 An End-To-End Trustworthy Scheme for Green Communications
Tianni Xu (China Mobile Communications Group Co., Ltd., China); Qin Qiu (China Mobile
Communications Group Co. Ltd, China); Gaoshan Zhang, Hua Zhu and Ben Zhou (China Mobile
Group Design Institute Co., Ltd., China)
Energy conservation has become a worldwide consensus in recent years. The Chinese government
has proposed the east-data-west-computing project to develop large-scale cross-regional green
communications and computing. In the process of balancing computing and energy resource
demands between the eastern and western regions, the security concern of cross-regional data
circulation rises. This paper presents a trustworthy scheme to address the problem of untrusted
computing nodes, immature computing security capabilities, and unsecured data transmission
within cross-regional data circulation. The solution focuses on building a secure and trustworthy
environment to protect the device and data, ensuring the confidentiality, integrity, and availability
of data usage. Practical deployment and testing have demonstrated that our solution can effectively
safeguard data privacy and security in the carrier's networks, enhancing the computational
performance of security services by more than twenty times, providing a new security paradigm
for the efficient and green development of the communications industry.
– 468 –