Quantum Computing Cryptography: A Systematic Review of Innovations, Applications, Challenges, and Algorithms

  • Peter Maitireni National University of Science and Technology, Zimbabwe
  • Vusumuzi Ncube National University of Science and Technology, Zimbabwe
  • Belinda Ndlovu University of South Africa, Zimbabwe
  • Thando Sibanda National University of Science and Technology, Zimbabwe
Keywords: Post-Quantum Cryptography, Quantum Computing Cryptography, Quantum Key Distribution, Quantum-Safe Blockchain, Quantum Machine Learning

Abstract

This study explores how to build quantum-resistant systems to safeguard digital infrastructure in the post-quantum era by uncovering the innovations, applications, algorithms, and challenges of Quantum Computing cryptography. Utilizing the Preferred Reporting Items for Systematic Reviews and Meta-Analyses approach a search was conducted across the following databases for the years 2021–2025: PubMed, IEEE Xplore, ScienceDirect, SpringerLink, and Google Scholar. We shortlisted 15 studies from 519 screened articles for a comprehensive evaluation based on their relevance. Findings show strong adoption in finance, healthcare, IoT, cybersecurity, and e-government, with lattice-based PQC emerging as the most dominant cryptographic family, followed by QKD and hybrid PQC–QKD models. The review highlights key obstacles, including transition complexity, lack of global standards, high implementation costs, and integration difficulty. The study contributes by providing the first sector-aligned synthesis of innovations, identifying algorithmic trends, and mapping global research disparities through a conceptual model. It also presents a structured set of future research directions to guide policymakers, cryptographers, and practitioners preparing for quantum-enabled threats.

Downloads

Download data is not yet available.

References

Durr-E-Shahwar, M. Imran, A. B. Altamimi, W. Khan, S. Hussain, and M. Alsaffar, “Quantum Cryptography for Future Networks Security: A Systematic Review,” IEEE Access, vol. PP, p. 1, 2024, doi: 10.1109/ACCESS.2024.3504815.

P. W. Shor, T. B. Labs, M. Ave, and M. Hill, “Algorithms for Quantum Computation : Discrete Log and Factoring Extended Abstract 1 Introduction,” Proc. 35th Annu. Symp. Found. Comput. Sci., p. 124, 1994.

M. Mosca, “Cybersecurity in a quantum world: will we be ready?,” Nist, no. April, pp. 13–16, 2015, [Online]. Available: csrc.nist.gov/groups/ST/post-quantum.../session8-mosca-michele.pdf

S. K. Sahu and K. Mazumdar, “State-of-the-art analysis of quantum cryptography: applications and future prospects,” Front. Phys., vol. 12, no. August, pp. 1–13, 2024, doi: 10.3389/fphy.2024.1456491.

D. Boscovic, A Survey on Quantum-safe Blockchain System, vol. 1, no. 1. Association for Computing Machinery, 2022. [Online]. Available: https://doi.org/10.1145/nnnnnnn.

P. Radanliev, “Artificial intelligence and quantum cryptography,” J. Anal. Sci. Technol., vol. 15, no. 1, 2024, doi: 10.1186/s40543-024-00416-6.

Z. Z. Sun et al., “Quantum Blockchain Relying on Quantum Secure Direct Communication Network,” IEEE Internet Things J., no. May, 2025, doi: 10.1109/JIOT.2025.3526443.

T. M. Fernandez-Carames, “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things,” IEEE Internet Things J., vol. 7, no. 7, pp. 6457–6480, 2020, doi: 10.1109/JIOT.2019.2958788.

L. Gyongyosi and S. Imre, “A Survey on quantum computing technology,” Comput. Sci. Rev., vol. 31, pp. 51–71, 2019, doi: 10.1016/j.cosrev.2018.11.002.

S. Pirandola et al., “Advances in quantum cryptography,” Adv. Opt. Photonics, vol. 12, no. 4, p. 1012, 2020, doi: 10.1364/aop.361502.

Z. Yang, H. Alfauri, B. Farkiani, R. Jain, R. Di Pietro, and A. Erbad, A Survey and Comparison of Post-Quantum and Quantum Blockchains, vol. 26, no. 2. IEEE, 2024. doi: 10.1109/COMST.2023.3325761.

David Moher, “PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) Checklist Title 1 Identify the report as a systematic review, meta-analysis, or both,” pp. 4–6, 2009, [Online]. Available: www.prisma-statement.org

C. Gilbert and M. A. Gilbert, “Investigating the Challenges and Solutions in Cybersecurity using Quantum Computing and Cryptography,” no. December 2024.

N. P. Yvr, D. Choudhury, M. Ambika, and S. Kannadhasan, “Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems,” vol. 05005, pp. 1–8, 2025.

M. R. Masum, “Quantum Computing for Cryptography and Post-Quantum Security Training,” no. January, pp. 2–5, 2025, doi: 10.13140/RG.2.2.27793.95842.

A. Colwill and J. Scott, “Quantum Computing and Its Transformative Effects on Cryptography and Data Security,” no. March, pp. 3–5, 2025.

W. Poincaré and M. Hamilton, “Exploring the Potential of Quantum Computing in Cryptography,” pp. 43–51, 2024.

C. Easttom, “Quantum Computing and Cryptography,” Mod. Cryptogr., no. March, pp. 397–407, 2022, doi: 10.1007/978-3-031-12304-7_19.

D. Kumari, A. Namburi, K. Tanuj, R. Rangu, N. K. Muniswamy Naidu, and M. Mahmoud, “Quantum Computing in Cryptography,” Proc. - 2023 Int. Conf. Comput. Sci. Comput. Intell. CSCI 2023, pp. 490–495, 2023, doi: 10.1109/CSCI62032.2023.00086.

A. Rayhan, “The Quantum Computing Revolution : Challenges and Opportunities,” no. May, 2024, doi: 10.13140/RG.2.2.12467.85283.

B. Senapati and B. S. Rawal, “Quantum communication with RLP quantum resistant cryptography in industrial manufacturing,” Cyber Secur. Appl., vol. 1, no. February, 2023, doi: 10.1016/j.csa.2023.100019.

R. Bavdekar, E. J. Chopde, A. Bhatia, K. Tiwari, S. J. Daniel, and Atul, “Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research,” 2022.

B. Long, “Classical Solutions for Quantum Challenges: An Introduction to Postquantum Cryptography,” ACM SIGCAS Comput. Soc., vol. 52, no. 2, pp. 23–25, 2023, doi: 10.1145/3656021.3656030.

V. Chamola, A. Jolfaei, V. Chanana, P. Parashari, and V. Hassija, “Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography,” Comput. Commun., vol. 176, no. February, pp. 99–118, 2021, doi: 10.1016/j.comcom.2021.05.019.

L. Garms et al., “Experimental Integration of Quantum Key Distribution and Post-Quantum Cryptography in a Hybrid Quantum-Safe Cryptosystem,” Adv. Quantum Technol., vol. 7, no. 4, pp. 1–8, 2024, doi: 10.1002/qute.202300304.

D. Joseph et al., “Transitioning organizations to post-quantum cryptography,” Nature, vol. 605, no. 7909, pp. 237–243, 2022, doi: 10.1038/s41586-022-04623-2.

D. T. Dam, T. H. Tran, V. P. Hoang, C. K. Pham, and T. T. Hoang, “A Survey of Post-Quantum Cryptography: Start of a New Race,” Cryptography, vol. 7, no. 3, pp. 1–18, 2023, doi: 10.3390/cryptography7030040.

G. Alagic, C. Bai, J. Katz, and C. Majenz, “Post-Quantum Security of the Even-Mansour Cipher,” in Advances in Cryptology -- EUROCRYPT 2022, O. Dunkelman and S. Dziembowski, Eds., Cham: Springer International Publishing, 2022, pp. 458–487.

E. Alkim, P. S. L. M. Barreto, N. Bindel, J. Krämer, P. Longa, and J. E. Ricardini, “The Lattice-Based Digital Signature Scheme qTESLA,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 12146 LNCS, pp. 441–460, 2020, doi: 10.1007/978-3-030-57808-4_22.

P. Thanalakshmi, A. Rishikhesh, J. Marion Marceline, G. P. Joshi, and W. Cho, “A Quantum-Resistant Blockchain System: A Comparative Analysis,” Mathematics, vol. 11, no. 18, pp. 1–19, 2023, doi: 10.3390/math11183947.

J. Oosthuizen and B. C. Campus, “Expanding Schwab ’ s Four-type Intelligence Proposition to Meaningfully Address the Challenges of the Fourth Industrial Revolution ’,” no. September 2016, 2024.

V. R. Krishna, R. K. Jalli, and K. N. V. P. S. B. Ramesh, “Quantum Computing : Implications for Artificial Intelligence and Machine Quantum Computing : Implications for Artificial Intelligence and Machine Learning,” no. March, 2025.

A. Lohia, “Quantum Artificial Intelligence: Enhancing Machine Learning with Quantum Computing,” J. Quantum Sci. Technol., vol. 1, no. 2, pp. 6–11, 2024, doi: 10.36676/jqst.v1.i2.9.

L. Monostori, “Cyber-physical production systems: Roots from manufacturing science and technology,” At-Automatisierungstechnik, vol. 63, no. 10, pp. 766–776, 2015, doi: 10.1515/auto-2015-0066.

Y. Ruan, H. Chen, J. Tan, and X. Li, “Quantum computation for large-scale image classification,” Quantum Inf. Process., vol. 15, no. 10, pp. 4049–4069, 2016, doi: 10.1007/s11128-016-1391-z.

V. A. Muderere, B. Ndlovu, and K. Maguraushe, “Blockchain Adoption in Healthcare : Enhancing Interoperability , Security and Data Exchange,” J. Inf. Syst. Informatics, vol. 7, no. 3, pp. 2939–2977, 2025, doi: 10.51519/journalisi.v7i3.1267.

R. Sibanda, B. Ndlovu, S. Dube, and K. Maguraushe, “Towards Health 4.0 : Blockchain-Based Electronic Health Record for Care Coordination,” pp. 712–720, 2024, doi: 10.34190/ecie.19.1.2606.

P. Jhamba, B. Ndlovu, S. Dube, M. Muduva, and F. Jacqueline, “A Blockchain-based Patient Portal for Mental Health Management,” 2024, doi: 10.46254/AF05.20240251.

H. B. Ncube, B. M. Ndlovu, S. Dube, and Maguraushe Kudakwashe, “Blockchain-Based Fraud Detection System for Healthcare Insurance Claims,” no. 2023, pp. 540–547, 2024, doi: 10.34190/ecie.19.1.2558.

B. Mutunhu, S. Dube, N. Ncube, and S. Sibanda, “Cyber Security Awareness and Education Framework for Zimbabwe Universities: A Case of National University of Science and Technology,” Proc. Int. Conf. Ind. Eng. Oper. Manag. Nsukka, Niger., pp. 5–7, 2022.

B. Mutunhu, B. Chipangura, and S. Singh, “Towards a quantified-self technology conceptual framework for monitoring diabetes,” South African J. Sci. Technol., vol. 43, no. 1, pp. 69–84, 2024, doi: 10.36303/SATNT.2024.43.1.970.

B. Mutunhu, B. Chipangura, and H. Twinomurinzi, “Internet of Things in the Monitoring of Diabetes,” Int. J. Heal. Syst. Transl. Med., vol. 2, no. 1, pp. 1–20, 2022, doi: 10.4018/ijhstm.300336.

S. Chishakwe, N. Moyo, B. M. Ndlovu, and S. Dube, “Intrusion Detection System for IoT environments using Machine Learning Techniques,” 2022 1st Zimbabwe Conf. Inf. Commun. Technol. ZCICT 2022, pp. 1–7, 2022, doi: 10.1109/ZCICT55726.2022.10045992.

B. Ndlovu and K. Maguraushe, “Balancing Ethics and Privacy in the Use of Artificial Intelligence in Institutions of Higher Learning: A Framework for Responsive AI Systems,” IJIE (Indonesian J. Informatics Educ., vol. 9, no. 1, p. 39, 2025, doi: 10.20961/ijie.v9i1.100723.

S. Hadebe, B. Ndlovu, and K. Maguraushe, “Managing Diabetes Using Machine Learning and Digital Twins,” Indones. J. Innov. Appl. Sci., vol. 5, no. 2, pp. 145–162, 2025, doi: 10.47540/ijias.v5i2.1981.

N. Bindel, M. Hamburg, K. Hövelmanns, A. Hülsing, and E. Persichetti, “Tighter Proofs of CCA Security in the Quantum Random Oracle Model,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11892 LNCS, pp. 61–90, 2019, doi: 10.1007/978-3-030-36033-7_3.

S. J. Devitt, “Performing quantum computing experiments in the cloud,” Phys. Rev. A, vol. 94, no. 3, pp. 1–29, 2016, doi: 10.1103/PhysRevA.94.032329.

L. K. Grover, “A fast quantum mechanical algorithm for database search,” Proc. Annu. ACM Symp. Theory Comput., vol. Part F1294, pp. 212–219, 1996, doi: 10.1145/237814.237866.

C. Peikert, “A decade of lattice cryptography,” Found. Trends Theor. Comput. Sci., vol. 10, no. 4, pp. 283–424, 2016, doi: 10.1561/0400000074.

W. Beullens, S. Dobson, S. Katsumata, Y. F. Lai, and F. Pintore, “Group signatures and more from isogenies and lattices: generic, simple, and efficient,” Des. Codes, Cryptogr., vol. 91, no. 6, pp. 2141–2200, 2023, doi: 10.1007/s10623-023-01192-x.

W. Castryck, “An efficient key recovery attack on SIDH,” no. 101020788, pp. 1–26, 2020.

C. H. Bennett and G. Brassard, “Some of the Most Fundamental Principles,” pp. 475–480, 1985.

F. Xu, X. Ma, Q. Zhang, H. K. Lo, and J. W. Pan, “Secure quantum key distribution with realistic devices,” Rev. Mod. Phys., vol. 92, no. 2, pp. 1–68, 2020, doi: 10.1103/REVMODPHYS.92.025002.

Dekkaki, K. C., & Tasic, I. (2024). Exploring Post-Quantum Cryptography : Review and Directions for the Transition Process.

Parida, N. K., Jatoth, C., Reddy, V. D., Hussain, M., & Faizi, J. (2023). Post ‑ quantum distributed ledger technology : a systematic survey. Scientific Reports, 1–23. https://doi.org/10.1038/s41598-023-47331-1

Barrett-danes, F., & Ahmad, F. (2025). Quantum computing and cybersecurity : a rigorous systematic review of emerging threats , post-quantum solutions , and research directions ( 2019 – 2024 ). 5.

Published
2025-12-10
Abstract views: 19 times
Download PDF: 11 times
How to Cite
Maitireni, P., Ncube, V., Ndlovu, B., & Sibanda, T. (2025). Quantum Computing Cryptography: A Systematic Review of Innovations, Applications, Challenges, and Algorithms. Journal of Information Systems and Informatics, 7(4), 3668-3710. https://doi.org/10.63158/journalisi.v7i4.1331
Section
Articles