Challenges and Future Directions in the Implementation of Quantum Authentication Protocols

Document Type

Conference Article

Publication Title

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)


Quantum computing is a powerful concept in the technological world that is critically valued in information security due to its enhanced computation powers. Researchers have developed algorithms that allow quantum computers to hack into information security concepts that were previously considered difficult, if not impossible, including asymmetric key cryptography and elliptic curve cryptography. Studies have been done to focus on improving security protocols through quantum computing to counter these vulnerabilities. One such focus is on the topic of quantum authentication (QA). However, while several QA protocols have been theorized, only a few have been implemented and further tested. Among the protocols, we selected and implemented five quantum authentication protocols to determine their feasibility in a real-world setting. In this late-breaking work, we discuss the difficulties and obstacles developers might face while implementing authentication protocols that use quantum computing.

First Page


Last Page




Publication Date


This document is currently not available here.