Quantum Computing Cryptography: A Systematic Review of Innovations, Applications, Challenges, and Algorithms
Abstract
This study explores how to build quantum-resistant systems to safeguard digital infrastructure in the post-quantum era by uncovering the innovations, applications, algorithms, and challenges of Quantum Computing cryptography. Utilizing the Preferred Reporting Items for Systematic Reviews and Meta-Analyses approach a search was conducted across the following databases for the years 2021–2025: PubMed, IEEE Xplore, ScienceDirect, SpringerLink, and Google Scholar. We shortlisted 15 studies from 519 screened articles for a comprehensive evaluation based on their relevance. Findings show strong adoption in finance, healthcare, IoT, cybersecurity, and e-government, with lattice-based PQC emerging as the most dominant cryptographic family, followed by QKD and hybrid PQC–QKD models. The review highlights key obstacles, including transition complexity, lack of global standards, high implementation costs, and integration difficulty. The study contributes by providing the first sector-aligned synthesis of innovations, identifying algorithmic trends, and mapping global research disparities through a conceptual model. It also presents a structured set of future research directions to guide policymakers, cryptographers, and practitioners preparing for quantum-enabled threats.
Downloads
References
Durr-E-Shahwar, M. Imran, A. B. Altamimi, W. Khan, S. Hussain, and M. Alsaffar, “Quantum Cryptography for Future Networks Security: A Systematic Review,” IEEE Access, vol. PP, p. 1, 2024, doi: 10.1109/ACCESS.2024.3504815.
P. W. Shor, T. B. Labs, M. Ave, and M. Hill, “Algorithms for Quantum Computation : Discrete Log and Factoring Extended Abstract 1 Introduction,” Proc. 35th Annu. Symp. Found. Comput. Sci., p. 124, 1994.
M. Mosca, “Cybersecurity in a quantum world: will we be ready?,” Nist, no. April, pp. 13–16, 2015, [Online]. Available: csrc.nist.gov/groups/ST/post-quantum.../session8-mosca-michele.pdf
S. K. Sahu and K. Mazumdar, “State-of-the-art analysis of quantum cryptography: applications and future prospects,” Front. Phys., vol. 12, no. August, pp. 1–13, 2024, doi: 10.3389/fphy.2024.1456491.
D. Boscovic, A Survey on Quantum-safe Blockchain System, vol. 1, no. 1. Association for Computing Machinery, 2022. [Online]. Available: https://doi.org/10.1145/nnnnnnn.
P. Radanliev, “Artificial intelligence and quantum cryptography,” J. Anal. Sci. Technol., vol. 15, no. 1, 2024, doi: 10.1186/s40543-024-00416-6.
Z. Z. Sun et al., “Quantum Blockchain Relying on Quantum Secure Direct Communication Network,” IEEE Internet Things J., no. May, 2025, doi: 10.1109/JIOT.2025.3526443.
T. M. Fernandez-Carames, “From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things,” IEEE Internet Things J., vol. 7, no. 7, pp. 6457–6480, 2020, doi: 10.1109/JIOT.2019.2958788.
L. Gyongyosi and S. Imre, “A Survey on quantum computing technology,” Comput. Sci. Rev., vol. 31, pp. 51–71, 2019, doi: 10.1016/j.cosrev.2018.11.002.
S. Pirandola et al., “Advances in quantum cryptography,” Adv. Opt. Photonics, vol. 12, no. 4, p. 1012, 2020, doi: 10.1364/aop.361502.
Z. Yang, H. Alfauri, B. Farkiani, R. Jain, R. Di Pietro, and A. Erbad, A Survey and Comparison of Post-Quantum and Quantum Blockchains, vol. 26, no. 2. IEEE, 2024. doi: 10.1109/COMST.2023.3325761.
David Moher, “PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) Checklist Title 1 Identify the report as a systematic review, meta-analysis, or both,” pp. 4–6, 2009, [Online]. Available: www.prisma-statement.org
C. Gilbert and M. A. Gilbert, “Investigating the Challenges and Solutions in Cybersecurity using Quantum Computing and Cryptography,” no. December 2024.
N. P. Yvr, D. Choudhury, M. Ambika, and S. Kannadhasan, “Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems,” vol. 05005, pp. 1–8, 2025.
M. R. Masum, “Quantum Computing for Cryptography and Post-Quantum Security Training,” no. January, pp. 2–5, 2025, doi: 10.13140/RG.2.2.27793.95842.
A. Colwill and J. Scott, “Quantum Computing and Its Transformative Effects on Cryptography and Data Security,” no. March, pp. 3–5, 2025.
W. Poincaré and M. Hamilton, “Exploring the Potential of Quantum Computing in Cryptography,” pp. 43–51, 2024.
C. Easttom, “Quantum Computing and Cryptography,” Mod. Cryptogr., no. March, pp. 397–407, 2022, doi: 10.1007/978-3-031-12304-7_19.
D. Kumari, A. Namburi, K. Tanuj, R. Rangu, N. K. Muniswamy Naidu, and M. Mahmoud, “Quantum Computing in Cryptography,” Proc. - 2023 Int. Conf. Comput. Sci. Comput. Intell. CSCI 2023, pp. 490–495, 2023, doi: 10.1109/CSCI62032.2023.00086.
A. Rayhan, “The Quantum Computing Revolution : Challenges and Opportunities,” no. May, 2024, doi: 10.13140/RG.2.2.12467.85283.
B. Senapati and B. S. Rawal, “Quantum communication with RLP quantum resistant cryptography in industrial manufacturing,” Cyber Secur. Appl., vol. 1, no. February, 2023, doi: 10.1016/j.csa.2023.100019.
R. Bavdekar, E. J. Chopde, A. Bhatia, K. Tiwari, S. J. Daniel, and Atul, “Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research,” 2022.
B. Long, “Classical Solutions for Quantum Challenges: An Introduction to Postquantum Cryptography,” ACM SIGCAS Comput. Soc., vol. 52, no. 2, pp. 23–25, 2023, doi: 10.1145/3656021.3656030.
V. Chamola, A. Jolfaei, V. Chanana, P. Parashari, and V. Hassija, “Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography,” Comput. Commun., vol. 176, no. February, pp. 99–118, 2021, doi: 10.1016/j.comcom.2021.05.019.
L. Garms et al., “Experimental Integration of Quantum Key Distribution and Post-Quantum Cryptography in a Hybrid Quantum-Safe Cryptosystem,” Adv. Quantum Technol., vol. 7, no. 4, pp. 1–8, 2024, doi: 10.1002/qute.202300304.
D. Joseph et al., “Transitioning organizations to post-quantum cryptography,” Nature, vol. 605, no. 7909, pp. 237–243, 2022, doi: 10.1038/s41586-022-04623-2.
D. T. Dam, T. H. Tran, V. P. Hoang, C. K. Pham, and T. T. Hoang, “A Survey of Post-Quantum Cryptography: Start of a New Race,” Cryptography, vol. 7, no. 3, pp. 1–18, 2023, doi: 10.3390/cryptography7030040.
G. Alagic, C. Bai, J. Katz, and C. Majenz, “Post-Quantum Security of the Even-Mansour Cipher,” in Advances in Cryptology -- EUROCRYPT 2022, O. Dunkelman and S. Dziembowski, Eds., Cham: Springer International Publishing, 2022, pp. 458–487.
E. Alkim, P. S. L. M. Barreto, N. Bindel, J. Krämer, P. Longa, and J. E. Ricardini, “The Lattice-Based Digital Signature Scheme qTESLA,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 12146 LNCS, pp. 441–460, 2020, doi: 10.1007/978-3-030-57808-4_22.
P. Thanalakshmi, A. Rishikhesh, J. Marion Marceline, G. P. Joshi, and W. Cho, “A Quantum-Resistant Blockchain System: A Comparative Analysis,” Mathematics, vol. 11, no. 18, pp. 1–19, 2023, doi: 10.3390/math11183947.
J. Oosthuizen and B. C. Campus, “Expanding Schwab ’ s Four-type Intelligence Proposition to Meaningfully Address the Challenges of the Fourth Industrial Revolution ’,” no. September 2016, 2024.
V. R. Krishna, R. K. Jalli, and K. N. V. P. S. B. Ramesh, “Quantum Computing : Implications for Artificial Intelligence and Machine Quantum Computing : Implications for Artificial Intelligence and Machine Learning,” no. March, 2025.
A. Lohia, “Quantum Artificial Intelligence: Enhancing Machine Learning with Quantum Computing,” J. Quantum Sci. Technol., vol. 1, no. 2, pp. 6–11, 2024, doi: 10.36676/jqst.v1.i2.9.
L. Monostori, “Cyber-physical production systems: Roots from manufacturing science and technology,” At-Automatisierungstechnik, vol. 63, no. 10, pp. 766–776, 2015, doi: 10.1515/auto-2015-0066.
Y. Ruan, H. Chen, J. Tan, and X. Li, “Quantum computation for large-scale image classification,” Quantum Inf. Process., vol. 15, no. 10, pp. 4049–4069, 2016, doi: 10.1007/s11128-016-1391-z.
V. A. Muderere, B. Ndlovu, and K. Maguraushe, “Blockchain Adoption in Healthcare : Enhancing Interoperability , Security and Data Exchange,” J. Inf. Syst. Informatics, vol. 7, no. 3, pp. 2939–2977, 2025, doi: 10.51519/journalisi.v7i3.1267.
R. Sibanda, B. Ndlovu, S. Dube, and K. Maguraushe, “Towards Health 4.0 : Blockchain-Based Electronic Health Record for Care Coordination,” pp. 712–720, 2024, doi: 10.34190/ecie.19.1.2606.
P. Jhamba, B. Ndlovu, S. Dube, M. Muduva, and F. Jacqueline, “A Blockchain-based Patient Portal for Mental Health Management,” 2024, doi: 10.46254/AF05.20240251.
H. B. Ncube, B. M. Ndlovu, S. Dube, and Maguraushe Kudakwashe, “Blockchain-Based Fraud Detection System for Healthcare Insurance Claims,” no. 2023, pp. 540–547, 2024, doi: 10.34190/ecie.19.1.2558.
B. Mutunhu, S. Dube, N. Ncube, and S. Sibanda, “Cyber Security Awareness and Education Framework for Zimbabwe Universities: A Case of National University of Science and Technology,” Proc. Int. Conf. Ind. Eng. Oper. Manag. Nsukka, Niger., pp. 5–7, 2022.
B. Mutunhu, B. Chipangura, and S. Singh, “Towards a quantified-self technology conceptual framework for monitoring diabetes,” South African J. Sci. Technol., vol. 43, no. 1, pp. 69–84, 2024, doi: 10.36303/SATNT.2024.43.1.970.
B. Mutunhu, B. Chipangura, and H. Twinomurinzi, “Internet of Things in the Monitoring of Diabetes,” Int. J. Heal. Syst. Transl. Med., vol. 2, no. 1, pp. 1–20, 2022, doi: 10.4018/ijhstm.300336.
S. Chishakwe, N. Moyo, B. M. Ndlovu, and S. Dube, “Intrusion Detection System for IoT environments using Machine Learning Techniques,” 2022 1st Zimbabwe Conf. Inf. Commun. Technol. ZCICT 2022, pp. 1–7, 2022, doi: 10.1109/ZCICT55726.2022.10045992.
B. Ndlovu and K. Maguraushe, “Balancing Ethics and Privacy in the Use of Artificial Intelligence in Institutions of Higher Learning: A Framework for Responsive AI Systems,” IJIE (Indonesian J. Informatics Educ., vol. 9, no. 1, p. 39, 2025, doi: 10.20961/ijie.v9i1.100723.
S. Hadebe, B. Ndlovu, and K. Maguraushe, “Managing Diabetes Using Machine Learning and Digital Twins,” Indones. J. Innov. Appl. Sci., vol. 5, no. 2, pp. 145–162, 2025, doi: 10.47540/ijias.v5i2.1981.
N. Bindel, M. Hamburg, K. Hövelmanns, A. Hülsing, and E. Persichetti, “Tighter Proofs of CCA Security in the Quantum Random Oracle Model,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11892 LNCS, pp. 61–90, 2019, doi: 10.1007/978-3-030-36033-7_3.
S. J. Devitt, “Performing quantum computing experiments in the cloud,” Phys. Rev. A, vol. 94, no. 3, pp. 1–29, 2016, doi: 10.1103/PhysRevA.94.032329.
L. K. Grover, “A fast quantum mechanical algorithm for database search,” Proc. Annu. ACM Symp. Theory Comput., vol. Part F1294, pp. 212–219, 1996, doi: 10.1145/237814.237866.
C. Peikert, “A decade of lattice cryptography,” Found. Trends Theor. Comput. Sci., vol. 10, no. 4, pp. 283–424, 2016, doi: 10.1561/0400000074.
W. Beullens, S. Dobson, S. Katsumata, Y. F. Lai, and F. Pintore, “Group signatures and more from isogenies and lattices: generic, simple, and efficient,” Des. Codes, Cryptogr., vol. 91, no. 6, pp. 2141–2200, 2023, doi: 10.1007/s10623-023-01192-x.
W. Castryck, “An efficient key recovery attack on SIDH,” no. 101020788, pp. 1–26, 2020.
C. H. Bennett and G. Brassard, “Some of the Most Fundamental Principles,” pp. 475–480, 1985.
F. Xu, X. Ma, Q. Zhang, H. K. Lo, and J. W. Pan, “Secure quantum key distribution with realistic devices,” Rev. Mod. Phys., vol. 92, no. 2, pp. 1–68, 2020, doi: 10.1103/REVMODPHYS.92.025002.
Dekkaki, K. C., & Tasic, I. (2024). Exploring Post-Quantum Cryptography : Review and Directions for the Transition Process.
Parida, N. K., Jatoth, C., Reddy, V. D., Hussain, M., & Faizi, J. (2023). Post ‑ quantum distributed ledger technology : a systematic survey. Scientific Reports, 1–23. https://doi.org/10.1038/s41598-023-47331-1
Barrett-danes, F., & Ahmad, F. (2025). Quantum computing and cybersecurity : a rigorous systematic review of emerging threats , post-quantum solutions , and research directions ( 2019 – 2024 ). 5.
Abstract views: 19 times
Download PDF: 11 times
Copyright (c) 2025 Journal of Information Systems and Informatics

This work is licensed under a Creative Commons Attribution 4.0 International License.
- I certify that I have read, understand and agreed to the Journal of Information Systems and Informatics (Journal-ISI) submission guidelines, policies and submission declaration. Submission already using the provided template.
- I certify that all authors have approved the publication of this and there is no conflict of interest.
- I confirm that the manuscript is the authors' original work and the manuscript has not received prior publication and is not under consideration for publication elsewhere and has not been previously published.
- I confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- I confirm that the paper now submitted is not copied or plagiarized version of some other published work.
- I declare that I shall not submit the paper for publication in any other Journal or Magazine till the decision is made by journal editors.
- If the paper is finally accepted by the journal for publication, I confirm that I will either publish the paper immediately or withdraw it according to withdrawal policies
- I Agree that the paper published by this journal, I transfer copyright or assign exclusive rights to the publisher (including commercial rights)














