## Sushil Kumar Singh* , Abir El Azzaoui* , Mikail Mohammed Salim* and Jong Hyuk Park*## |

Parameter | Quantum cryptography | Post-quantum cryptography |
---|---|---|

Post-quantum cryptography | Requires special channel such as fiber-based channel, line of the sight-based channel | No need a special channel |

Algorithm needs | QKD has used a classical symmetrical algorithm such as AES, RSA, for bulk data sharing or communication. | Use larger keys than RSA and AES algorithm |

Computational assumption | Computational assumption relies on the hardness factoring | Computational assumption relies on the test of time |

Definition | It follows the properties of quantum mechanics, and optics for security is known as quantum cryptography | A new set of rules and regulations of classical algorithms is known as post-quantum cryptography |

Blockchain networks secure user records and data such as financial records stored in blocks as transactions using immutable ledgers supported by cryptographic methods such as digital signatures. Data stored in blocks require a considerable power to break the computationally complex mathematical problems protecting the network. Quantum computers pose a severe threat to the mining process of blocks, essential to growing the blockchain network. Attackers mine the blocks with a considerably higher computing power resulting in a much higher network hash rate than average users. Attacks such as 51% attacks are simpler to execute using Quantum computers, allowing malicious attackers to steal and manipulate stored data.

QKD based authentication is essential to secure data in the quantum period. It requires the sender and receiver to share quantum states of light across fiber or free-space quantum channels. Kiktenko et al. [21] proposed a blockchain protocol combining Byzantine Fault Theorem without digital signatures and QKD for secure authentication. The protocol consists of two layers where the first layer is a QKD network permitting transmission of keys securely for each pair of nodes. The second layer transmits messages using a secure Toeplitz hashing using private keys received during the first layer. Blocks are created in a decentralized manner using the broadcast protocol [22], which allows managing paired-based grouped authentication assuming the number of dishonest users is below 3.

The protocol is applied to each unconfirmed transaction at a periodic interval of 10 minutes based on pairs to prevent data manipulation by a corrupted node. Forking in the blockchain network is prevented by approving authorized transactions based on timestamps and forming a common node. QKD is used only for generating the private keys while data is transmitted using the broadcast protocol. Experimental analysis using an urban fiber QKD network between three nodes (A, B, C) shows successful, legitimate transactions. An unauthorized block with illegitimate transactions attempting to perform a double-spending attack is successfully blocked.

Quantum computers have successfully broken the current security protocols of the blockchain network [23,24]. Several recent types of research have proposed modifications of blockchain technology [21,25] to secure against quantum attacks; however, they are not considered reliable due to new quantum algorithms proposed [26-28] that threaten these security measures. An ideal approach to secure blockchain against quantum attacks is to merge quantum entanglement with blockchain architecture. Rajan and Visser [29] proposed a quantum blockchain method where timestamped blocks and hash functions are linked with a temporal Greenberger–Horne–Zeilinger (GHZ) state of photons that do not correspond at the same time. Using superdense coding, quantum blockchain replaces the traditional structure with a spatially entangled Bell states.

[TeX:] $$\left|\beta_{x y}\right\rangle=\frac{1}{\sqrt{2}}\left(|0\rangle|y\rangle+(-1)^{x}|1\rangle|\bar{y}\rangle\right)$$

[TeX:] $$\text { Here, } x y$$ represents two standard bits, 00, 01, 10. and 11. Every block in the traditional blockchain is transforming using temporal Bell state into a quantum block. The creation of the first block is represented as t=0 and r represents each record:

[TeX:] $$\left|\beta_{r 1 r 2}\right\rangle^{0, \tau}=\frac{1}{\sqrt{2}}\left(\left|0^{0}\right\rangle\left|r_{2}^{\tau}\right\rangle+(-1)^{r_{1}}\left|1^{0}\right\rangle\left|\overline{r_{2}^{\tau}}\right\rangle\right)$$

Entanglement between two quantum bits (qubits) exists initially as t= [TeX:] $$\tau$$. A new photon that did not exist earlier is created as a corresponding entangled qubit to the first qubit. The conversion of blockchain into temporal Bell state is as follows:

[TeX:] $$\left|\beta_{00}\right\rangle^{0, \tau},\left|\beta_{10}\right\rangle^{\tau, 2 \tau},\left|\beta_{11}\right\rangle^{2 \tau, 3 \tau}$$

The response of the proposed new quantum blockchain to an attacker’s attempt to modify a block’s contents or tamper with photons results in the entire malicious block destroyed. In standard blockchain technology, only the forward blocks are rejected. Since all previous photons are removed, an attacker cannot access the last photon.

Traditional blockchain technology implements the elliptic curve cryptography or the Rivest–Shamir–Adleman (RSA) to create digital signatures and secure blocks from attackers that rely on mathematical complexity [25]. Factoring of large composite numbers into two prime factors increases the complexity in RSA; however, quantum computers possess the computational capacity to solve difficult problems, which take hundreds of years on a standard computer. Quantum powered computers, due to high speedups in computation, can break RSA, DSA, and elliptic curve cryptography. One of the two popular quantum algorithms, Shor’s algorithm, breaks the RSA encryption due to its high efficiency in factoring large numbers. The Shor’s algorithm’s high execution speed compared to other existing algorithms is due to its input length being polynomial. To determine an odd integer N’s prime factors, we choose a co-prime of N, x. The order r relates x to N according to:

r determines the factors provided by the greatest common divisor [30] and this is made possible only by using quantum computers resulting in a 4096-bit RSA key, breakable.

The Grover’s algorithm attacks the Blockchain security using two methods, locate hash collisions and replace blocks without affecting the integrity of the blockchain network. The second method is to influence the chain’s integrity by increasing the creation of nonces to the level where chains of records are recreated using modified hashes. The speed of Grover’s algorithm is given by [TeX:] $$O \sqrt{N}$$ compared to [TeX:] $$O(n)$$ used by classical algorithms. The increase in speed allows the algorithm to break a hashing function and insert a modified block in the blockchain network. An attacker can potentially create multiple blocks in negligible times allowing them to take control of the entire network. The faster-growing chain in the network is decided to be the main chain, effectively allowing the attacker to rewrite transactions and initiate double-spending in cryptocurrency-based blockchain networks.

Quantum computing has grown in strides in recent years with organizations such as Google and IBM developing their quantum systems. Google’s Sycamore system computes complex mathematical problems in 200 seconds using 53 qbits, whereas today’s supercomputer requires a minimum of 10,000 years. IBM's Q Network allows various companies and academic institutions to improve and advance the quantum algorithms using an open-source Qiskit programming framework. Recent advances in quantum technology have prompted researchers to develop new algorithms to secure blockchain networks and counter any future quantum based attacks. Some of the proven algorithms that secure Blockchain networks against quantum based attacks include quantum entanglement, lattice-based cryptography, and QKD. We discussed earlier quantum entanglement in blockchain networks to secure stored data in blocks by Rajan and Visser [29] and now present lattice-based cryptography and QDK to secure blockchain networks.

The general lattice definition is described as a collection of points in n-dimensional space with a cyclic composition. The foundation of the lattice L is B=([TeX:] $$b_{1}, b_{2}, \ldots, b_{n}$$) and different lattices could represent the same lattice. For a group of independent vectors b, the lattice formed by them is as follows:

[TeX:] $$\mathcal{L}\left(b_{1}, \quad b_{2}, \ldots, b_{n}\right)=\sum_{i=1}^{n}\left[\mathrm{x}_{\mathrm{i}} b_{i}: x_{i} \epsilon \mathbb{Z}, b_{n} \epsilon \mathbb{R}^{m}\right]$$

Lattice-based algorithms are cited and suggested by several recent kinds of research due to their resistance to attacks against elliptic curve cryptography in blockchain networks. Torres et al. [31] proposed a one-time linkable ring signature (L2RS) relying on lattice-based cryptography, enabling verification of multiple signatures created by an identical signatory. The L2RS assures a privacy-preserving protocol for cryptocurrencies and presents a foundation for block building and homomorphic assurance fundamental to secure the post-quantum confidential transactions. Gao et al. [32] proposed a signature scheme relying on the lattice algorithm to produce secret keys using stochastic values. A post-quantum blockchain is designed by first signing the message using a preimage sampling algorithm, and secondly, a double signature reduces the relationship between the message and the signature. The analysis of the signature scheme showed resistance to quantum computing attacks.

To secure keys, QDK relies on exchanging cryptographic keys using individual photons where each photon contains a single bit of data as either 0 or 1. The theory of quantum physics states that each photon’s value is based on the spin and the polarization, i.e., the photon’s state. QKD destroys the block in the blockchain network if an attacker attempts to modify or read block contents. A laser at the sender's end produces a range of single photons where each photon is in a defined state of polarization, i.e., vertical, or horizontal. Additionally, the sender cannot create the same photon using the same state of polarization. The photon receiver measures the state of photons to assure the sender is a secure and authorized user. Using the Heisenberg uncertainty principle, QDK prevents an attacker from determining quantum particles' position and velocity.

This section discusses the recent global research trends with QCT for various advanced fields, including electronic market, semiconductor testing, energy storage, internet, and others for multiple countries such as the United States, the United Kingdom, Korea, Canada, and China. These countries are using various projects based on quantum cryptography and providing secure communication in the advanced industries.

In North America, the United States has allocated US$1.2 billion for quantum research as part of the National Quantum Initiative Act. The focus of the Act is to build development research centers to be developed. The research centers aim to collaborate with academia, industry, and the government to accelerate the quantum research progress. The focus of research is on developing quantum processors that enable further computing applications, quantum clocks for precise timekeeping and maintaining communications during warfare incidents in GPS denied conditions, and research on gravity using the quantum information theory. Research on quantum-resistant cryptography for the post-quantum era, such as new optimizations using novel algorithms and cybersecurity systems [33].

Canada has invested more than US$1 billion in the past decade for research and development in quantum computing technology. It ranks 5th in the world for patents filed in the field of quantum computing. The focus of research is on quantum information processing, metrology, communications, cryptography, and networks. In collaboration with the Canadian Space Agency, Canada’s government, with a funding of US$80.9 million, is actively researching quantum key distribution to enhance secure and encrypted communication in space and protect digital communication. Quantum sensors are recognized as an important research area to help the country extract oil in an environmentally friendly manner [34].

Germany has pledged €2 billion, the highest in Europe, to promote quantum computing research from its COVID recovery fund to catch up with other countries such as the United States and China, which have filed 500 and 200 patents, respectively [35]. The increase in quantum technology investment comes after a government decision in 2018 to invest €650 million. The German research minister, Anja Karliczek, announced the building of an experimental Q System One quantum computer in collaboration with IBM near Stuttgart by 2021. The Fraunhofer Gesellschaft, Europe’s leading applied research institute, works with IBM to develop new quantum technology, application scenarios, and new algorithms [36]. As part of its National Quantum Technologies Programme in the United Kingdom, the UK Research and Innovation (UKRI) aims to establish the National Quantum Computing Centre (NQCC) at the Harwell Campus in Oxfordshire by 2025. The NQCC will invest £95 million in working on multiple workstreams. The research projects include 100+ qubit Noisy Intermediate-Scale Quantum hardware platform, Quantum software, algorithm, applications development, and high performing and scalable qubit technology. Participants include multiple stakeholders from the government, business organizations, and academic researchers [37]. On March 24, 2020, the National Cyber Security Center released a whitepaper on quantum-safe cryptography, highlighting the best mitigation methods against quantum computers and suggests reducing reliance on asymmetric cryptography due to their vulnerability against quantum computers [38].

In Asia, China is leading the research in quantum technology to build computers outperforming the computational power of existing systems, and sensors that can view through smog and corners [39]. The research area of focus in developing QKD's industrial applications was initiated by the National Development and Reform Commission and the China Academy of Science between 2011–2015, with an investment of US$490 million. The focus of research pushed by both the central and local governments since 2016 has centered on quantum communication, computation, and metrology. In 2017, the study’s direction was on building a national standard of quantum cryptography [40]. The research for satellite-based quantum communication proved to be a success with the launch of satellite Micius. Quantum cryptographic keys were distributed between Vienna and Beijing’s ground stations, facilitating a secure virtual meeting between academics from Austria and China [41].

Quantum research in Japan in quantum information processing, metrology, and sensing is funded by the Japan Science and Technology (JST) and the Japan Society for the Promotion of Science (JSPS). Quantum communication and cryptography are funded by the National Institute of Information and Communications Technology (NICT). Between the years 2001–2015, the research focus in QKD in collaboration between industries and universities resulted in designing high-speed QKD systems performing at a 1-GHz repetition rate known as the Tokyo QKD network. The research focus has expanded to secure cryptographic applications such as TV conferencing, IP routers, and smartphone systems. The JST has funded numerous projects between 2003–2010 in quantum information processing with photonic qubits, superconducting qubits, quantum information processing by entangled photons, optical lattice clock, and quantum simulation tools [42].

Several mobile companies, including SKT, KT, Samsung, and LG, provide telecommunication services and electronic business for industries and humans in Korea. KT and Samsung electronics companies, however, already started developing technologies for quantum-based communication with quantum computers [43]. So, Korea’s e-market is jumping into the quantum industries, followed by SKT. KT telecommunication company is going to discover a quantum information research center, known as Korea Advanced Nano Fab Center, with the Korea Institute of Science and Technology (KIST). KIST, KT operate this research center, and it has planning to concentrate their capabilities in secure communication with quantum computers. Already, SAIT (Samsung Advanced Institute Of Technology) completed one project, Global Research Outreach (GRO), which is dependent on quantum computers. In Korea, now Samsung aims to develop quantum error-free, highly effective, more secure, recent qubit equipment, and algorithms. In 2014, quantum information communication medium and long-term promotion strategies were established by the South Korean Government.

The government joined the race of the next generation of ICT developments field, including quantum computing. It is investing 44.5 billion Korean won over the next 5 years, which will enhance computa¬tional performance with secure sharing information worldwide with quantum computers and quantum mechanics [44]. By developing key technologies for quantum computing, the government plans to complete a presentation of the effective five-qubit quantum computer system with more than 90% security by 2023. Market Research Media in Korea estimates that global markets for quantum cryptography communication and quantum computers will be worth more than US$23.2 billion (26 trillion Korean won) in 2025 [44]. The Korean government will provide an investment of 13.4 billion Korean won for next-generation ICT technology, including ultra-high-computing data, computer software, intelligence systems, and human-computer interaction, and quantum computing.

Based on the current research trends, researchers are focusing on QKD as it is one of the most applicable techniques nowadays. The leading application for quantum Internet [45] enables secure remote communication between two or more parties based on quantum mechanic’s laws. This section will propose QMC; a model that uses small, relatively restricted devices compared to the normal quantum repeater to send a message through the quantum Internet, between two quantum computers separated by at least 300 km.

Quantum Internet, unlike classical internet, will theatrically support and develop several applications, including secure access to quantum computers from relatively restricted devices, clock synchronization, and other scientific applications in physics, medicine, and astronomy. Transferring qubit between quantum computers in the quantum Internet layer, however, is not a straightforward nor simple task to do. Due to photons and particles’ physical nature, they cannot be entangled perfectly in a distance over 300 km. The progress has been significant in recent years. Researchers in China have successfully managed to measure for 900 times two entangled particles destined over 1,400 km from each other using a satellite as a Quantum Repeater. This is a huge step toward quantum Internet in future ICT. Nonetheless, the quintessential architecture and design for quantum computers are quite complex. Relying on quantum entanglement distribution, quantum repeaters require two-way communication between the sender and receiver. To apply the BSM, and a large quantum memory to save the particles’ state [46], not to mention that the quantum information needs to be sent all through the same repeater that must be a trusted node; otherwise, security and privacy concerns arise.

To this end, we propose in this paper a one-way single qubit transmission to send quantum information from a quantum computer to another, as discussed in Fig. 4. To understand the proposal, we take the case-example where a quantum computer wants to send a message to another quantum computer located at a distance of over 300 km. The first quantum computer named QC1 will generate the message and encode it into qubits; every single qubit should be sent through the QMC. QMC is a group of quantum machines will only at least 1 qubit. Unlike Quantum Repeaters, those machine does not require large quantum memory and computational power. QMCs are distributed around the future smart city; it could be phones, base stations, and personal computers connected to quantum computers in the cloud. The QC1 encode each qubit of the message into a Bell measure¬ment and send it through signals to the first quantum machine in the QMC based on the proximity with a time-stamp to memorize the time slot of each message.

The quantum machine that received the signals will re-encode it and check if the destinated QC2 (receiver) is close by (less than 50 km). If yes, the signals, along with the time stamp, will be sent directly to the receiver. If not, they will be sent to the next quantum machine, and it keeps going until it reaches the receiver. Another case is if the quantum machine is busy and cannot receive the signals, in this condition, the next approximate available quantum machine will be a solicitation. Moreover, if the quantum machine has already carried a bit in the previous time slot for the same quantum computer, it cannot be solicited again, and we will move directly to the next quantum machine. After receiving all the signals, the receiver end (QC2) will start to decode them based on their timestamp and starting with the oldest signals to retrieve the original message.

To understand the flow of the proposed model, we refer to the Fig. 5. Here we use the notion of photonic tree clusters presented by Borregaard et al. [47]. The QC1 encodes his message into multiple qubits. Each qubit is encoded using BSM with the root spin qubit of the photonic tree cluster. The encoded qubit is sent to the next quantum machine, where it will be re-encoded using BSM. The re-encoding is done between the first-level photonic qubit and the next new photonic tree. Again, the photons will be sent either to the next quantum machine, and the same phases will be repeated, or directly to the QC2 (receiver). The receiver decodes the qubit by measuring the photon tree received. the tree-cluster scheme’s overview is shown in Fig. 5.

The timestamp is used every time the qubit is sent from a quantum machine to another to keep track of qubits order. The encoding, re-encoding, and decoding phases fell out of the scope of this study; however, it will be covered in detail in our future work. After receiving the qubits, the quantum machine starts organizing them based on their history and time stamp from the oldest Qubit to the newly received ones and decoding them to retrieve the message. Fig. 6 depicts in detail the proposed model’s phases as methodological flow.

Quantum computers and processors are very soon to become our daily reality and replace classical computers. This industry's advancement is speedy, especially with tech-giant companies such as Google and IBM’s efforts to develop quantum computers. Moreover, hosting a quantum computer in the cloud can facilitate the task. In the future smart cities, quasi all IoT devices, and machines with only 1 qubit processor, will be able to use the full power and benefit from a highly developed quantum computer hosted in the cloud layer. To realize this, however, we will need a quantum network known as quantum Internet. Nowadays, countries worldwide are engaging in quantum communication research such as the United States, European countries, and China. Quantum Internet will enable high-private networks where devices and machines built upon quantum mechanics rules will be able to communicate and share information securely using QKD law. Moreover, based on quantum Internet, a quantum computer can be hosted on the cloud and used by several machines with a lower quantum processor’s capability (at least 1 qubit).

Due to quantum state fragility, however, two qubits cannot be entangled throughout long distances. That was the reason behind the use of quantum repeaters. As explained previously, a quantum repeater can entangle the sender’s state with the receiver’s state; it acts as a middle-point to transfer the information. Nonetheless, quantum repeaters require large quantum memory and a powerful quantum processor to save the quantum state and re-encode it, which creates a serious dilemma. With this method, creating a scalable quantum network will upscale the cost and demand high requirements. To this end, we propose in this paper a QMC model that can replace the Quantum Repeaters. The main purpose is to lower the cost of creating quantum Internet and scalable communication for future ICT.

QMC relies on dividing the encoded message into several qubit, sent to multiple quantum machines with relatively smaller quantum processors compared with Quantum Repeaters. It does not require large quantum memory as it deals with only one qubit of information. The model uses time stamper to record the history of each qubit and organize the message later at the receiver side. Our future work will be focusing on the encoding, re-encoding, and decoding phases as we intend to explain them in detail and prove our proposal’s performance compared to other related works.

The science and technology have achieved so much in the field of quantum computers and quantum Internet. In the future ICT and due to the heterogeneous nature of future smart cities [48-50]. Quantum computers will be stored in the cloud rather than local machines. They give access to relatively smaller and restricted devices into the quantum cloud, where they can benefit from the computational power to execute complex tasks. Quantum Internet and computers will improve and empower smart cities and be the main pillars for future ICT. It is still, however, not an easy task yet. Quantum computers and Quantum Internet still face multiple challenges, which is shown in Fig. 7.

Limited Resource: Quantum repeaters require multiple systems available for widespread public usage with sufficient processing power to forward a single qubit to other devices. The most powerful Quantum computer built by IBM processes 65 qubits, but by 2023, IBM expects to make a quantum computer capable of processing 1,000 qubits. Current classical systems operate well in room temperatures, whereas current quantum computers require near-zero temperatures using cooling systems, making them confined to laboratories.

High Error Rate: Performance enhancement of ion trap computers requires improving the gates’ laser intensity exposing qubits to environmental factors such as electromagnetic waves and temperature variations, result in decoherence, i.e., loss of data from the qubit to the environment. An error rate of 10^(-6) per gate can be avoided by placing ions in small holes or pits preventing unwanted transformations. Furthermore, fault tolerance schemes using error-correcting algorithms can tolerate error probability rates of 10^(-6), which is adequately below the accuracy threshold.

Decoherence: Quantum computers follow superposition, entanglement problems resolving by quantum principles, and these principles properties. These computers utilize quantum states. Decoherence is the next open research challenge for quantum communication technology for future ICT because quantum states are more vulnerable to error than the classical computer in communication. Decoherence is when the environment interacts with the qubits and changes their quantum states and loses or changes the information in the quantum computers. Various aspects generate decoherence, including radiation from warm objects, a collision between qubits, changing electric and magnetic fields, the collapse of wave functions in quantum mechanics. Thus, it represents an open issue for the practical implementation of quantum computers.

Quantum State Fragility: It is another open challenge for quantum communication for future ICT. As already knows that, quantum computers use quantum states value (0 and 1 bunch) as qubits. Qubits states may be incredibly fragile, compared to bits because they use the outside environment, electric and magnetic fields, wave functions, and object radiations. Using these environments, quantum states may be changed, which means original pieces of information also change or lost in the quantum computers with quantum communications in future ICT. Thus, quantum state fragility is a very crucial open research issue for secure transmission in advanced applications.

This paper reviewed quantum communication technologies for future ICT and proposed a quantum communication model system based on quantum machines to create a scalable quantum Internet network. We discussed all phases of the quantum machine chain in futuristic communications. We showed how to use blockchain in quantum computing for providing the secret-sharing the data to each other with the help of the quantum computers. We also discuss the latest global research trends for quantum communi¬cation technology as several countries, including the United States, Canada, United Kingdom, Korea, and others. Finally, we discussed some open research challenges for quantum communication technology. We also provided a comparison table of quantum communication cryptography and post-quantum cryptography.

He received his M.Tech. degree in Computer Science and Engineering from Uttarakhand Technical University, Dehradun, India, in 2018. He also received an M.E. degree in Information Technology from Karnataka State University, Mysore, India, in 2011. Currently, he is pursuing his Ph.D. degree under the supervision of Prof. Jong Hyuk Park at the Ubiquitous Computing Security (UCS) Lab, Seoul National University of Science and Technology, Seoul, South Korea. He has more than 9-year experience of teaching in the field of computer science. His current research interests include blockchain, artificial intelligence, big data, and the Internet of Things. He is a reviewer of the IEEE Systems Journal, FGCS, Computer Network, HCIS, JIPS, and Others.

She received the B.S. degree in computer science from the University of Picardie Jules-Verne, Amiens, France. She graduated from the National School of Higher Education Hassan II in the Development of Information Systems, Marrakech, Morocco. She is currently pursuing a master’s degree in computer science and engineering with the Ubiquitous Computing Security (UCS) Laboratory, Seoul National University of Science and Technology, Seoul, South Korea, under the supervision of Prof. Jong Hyuk Park. Her current research interests include blockchain, the Internet-of-Things (IoT) security, and post-quantum cryptography. She is also a reviewer of the IEEE Access. She has received the Quarterly Franklin Membership from the London Journal of Engineering Research (LJER), London, UK.

He received his bachelor’s degree in Computer Applications from Bangalore University, Bangalore, India in May 2011. He also received his Post Graduate Diploma in Management from Integrated Learning in Management, Greater Noida, India in 2014. Currently he is pursuing his Master’s combined Ph.D. degree under the supervision of Prof. Jong Hyuk Park at the UCS Lab, Seoul National University of Science and Technology, Seoul, South Korea. He has 5 years of experience working as a Marketing and Project Manager designing web services for clients. His research interests include IoT and 5G network security. He is the reviewer of the Journal of Supercomputing, and Human-centric Computing and Information Science.

He received Ph.D. degrees from the Graduate School of Information Security, Korea University, Korea and the Graduate School of Human Sciences of Waseda University, Japan. Dr. Park served as a research scientist at the R&D Institute, Hanwha S&C Co. Ltd., Korea from December 2002 to July 2007, and as a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea from September 2007 to August 2009. He is currently employed as a professor at the Department of Computer Science and Engineering and the Department of Interdisciplinary Bio IT Materials, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 200 research papers in international journals and conferences. He has also served as the chair, program committee chair or organizing committee chair at many international conferences and workshops. He is a founding steering chair of various international conferences including MUE, FutureTech, CSA, UCAWSN, etc. He is employed as editor-in-chief of Human-centric Computing and Information Sciences (HCIS) by Springer, The Journal of Information Processing Systems (JIPS) by KIPS, and the Journal of Convergence (JoC) by KIPS CSWRG. He is also the associate editor or editor of fourteen international journals, including eight journals indexed by SCI(E). In addition, he has been employed as a guest editor for various international journals by such publishers as Springer, Elsevier, Wiley, Oxford University Press, Hindawi, Emerald, and Inderscience. Dr. Park’s research interests include security and digital forensics, human-centric ubiquitous computing, context awareness, and multimedia services. He has received "best paper" awards from the ISA-08 and ITCS-11 conferences and "outstanding leadership" awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, and PDCAT-11. Furthermore, he received an "outstanding research" award from SeoulTech in 2014. Also, Dr. Park's research interests include human-centric ubiquitous computing, vehicular cloud computing, information security, digital forensics, secure communications, multimedia computing, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, and KMMS.

- 1 N. Datta, "Course 9 - Quantum entropy and quantum information,"
*Les Houches*, vol. 83, pp. 395-466, 2006.custom:[[[-]]] - 2 E. G. Rieffel, W. H. Polak,
*Quantum Computing: A Gentle Introduction*, MA: MIT Press, Cambridge, 2011.custom:[[[-]]] - 3
*Y*, Computable and Uncomputable. MoscowRussia: Sovetskoye Radio, Manin, 1980.custom:[[[-]]] - 4 R. P. Feynman, "Simulating physics with computers,"
*International Journal of Theoretical Physics*, vol. 21, pp. 467-488, 1982.custom:[[[-]]] - 5 B. Schumacher, "Quantum coding,"
*Physical Review A*, vol. 51, no. 4, pp. 2738-2747, 1995.custom:[[[-]]] - 6 A. Einstein, B. Podolsky, N. Rosen, "Can quantum-mechanical description of physical reality be considered complete?,"
*Physical Review*, vol. 47, no. 10, pp. 777-780, 1935.custom:[[[-]]] - 7 M. Pant, H. Krovi, D. Towsley, L. Tassiulas, L. Jiang, P. Basu, D. Englund, S. Guha, "Routing entanglement in the quantum internet,"
*npj Quantum Information*, vol. 5, no. 25, 2019.custom:[[[-]]] - 8
*Quantum Flagship, 2020 (Online). Available:*, https://qt.eu/discover-quantum/underlying-principles/quantum-repeaters/ - 9 B. Zhao, M. Muller, K. Hammerer, P. Zoller, "Efficient quantum repeater based on deterministic Rydberg gates,"
*Physical Review A*, vol. 81, no. 5, 2010.custom:[[[-]]] - 10 Z. Dou, G. Xu, X. B. Chen, J. Li, M. Naseri, "Rational non-hierarchical quantum state sharing protocol,"
*ComputersMaterials & Continua*, vol. 58, no. 2, pp. 335-347, 2019.custom:[[[-]]] - 11 Y. Sun, Y. Chen, H. Ahmad, Z. Wei, "An asymmetric controlled bidirectional quantum state transmission protocol,"
*Computers Materials & Continua*, vol. 59, no. 1, pp. 215-227, 2019.custom:[[[-]]] - 12 Y. Chang, S. Zhang, L. Yani, G. Han, H. Song, Y. Zhang, X. Li, Q. Wang, "A quantum authorization management protocol based on EPR-pairs,"
*Computers Materials & Continua*, vol. 59, no. 3, pp. 1005-1014, 2019.custom:[[[-]]] - 13 W. Liu, Y. Xu, J. C. Y ang, W. Y u, L. Chi, "Privacy-preserving quantum two-party geometric intersection,"
*Computers Materials & Continua*, vol. 60, no. 3, pp. 1237-1250, 2019.custom:[[[-]]] - 14 C. Li, G. Xu, Y. Chen, H. Ahmad, J. Li, "A new anti-quantum proxy blind signature for blockchain-enabled Internet of Things,"
*Computers Materials & Continua*, vol. 61, no. 2, pp. 711-726, 2019.custom:[[[-]]] - 15 J. C. S. Sicato, S. K. Singh, S. Rathore, J. H. Park, "A comprehensive analyses of intrusion detection system for IoT environment,"
*Journal of Information Processing Systems*, vol. 16, no. 4, pp. 975-990, 2020.custom:[[[-]]] - 16 A. El Azzaoui, S. K. Singh, Y. Pan, J. H. Park, "Block5gintell: blockchain for AI-enabled 5G networks,"
*IEEE Access*, vol. 8, pp. 145918-145935, 2020.custom:[[[-]]] - 17 Y. Lee, S. Rathore, J. H. Park, J. H. Park, J, "A blockchain-based smart home gateway architecture for preventing data forgery,"
*Human-centric Computing and Information Sciences*, vol. 10, no. 9, 2020.custom:[[[-]]] - 18 K. Gafurov, T. M. Chung, "Comprehensive survey on Internet of Things, architecture, security aspects, applications, related technologies, economic perspective, and future directions,"
*Journal of Information Processing Systems*, vol. 15, no. 4, pp. 797-819, 2019.custom:[[[-]]] - 19 V. Mohammadi, A. M. Rahmani, A. M. Darwesh, A. Sahafi, "Trust-based recommendation systems in Internet of Things: a systematic literature review,"
*Human-centric Computing and Information Sciences*, vol. 9, no. 21, 2019.custom:[[[-]]] - 20
*Y. Kim, 2017 (Online). Available:*, https://english.etnews.com/20170615200001 - 21 E. O. Kiktenko, N. O. Pozhar, M. N. Anufriev, A. S. Trushechkin, R. R. Yunusov, Y. V. Kurochkin, A. I. Lvovsky, A. K. Fedorov, "Quantum-secured blockchain,"
*Quantum Science and Technology*, vol. 3, no. 3, 2018.custom:[[[-]]] - 22 D. Malkhi,
*Concurrency: The Works of Leslie Lamport*, CA: ACM, San Rafael, 2019.custom:[[[-]]] - 23
*D. Aggarwal, G. K. Brennen, T. Lee, M. Santha, and M. Tomamichel, 2017 (Online).*, https://arxiv.org/abs/1710.10377 - 24
*S. King and S. Nadal, 2012 (Online). Available:*, https://decred.org/research/king2012.pdf - 25
*J. H. Witte, 2016 (Online). Available:*, https://arxiv.org/abs/1612.06244 - 26 D. McMahon,
*Quantum Computing Explained*, NJ: John Wiley & Sons, Hoboken, 2007.custom:[[[-]]] - 27 A. Montanaro, "Quantum algorithms: an overview,"
*npj Quantum Informationvo. 2*, no. 1, pp. 1-8, 2016.custom:[[[-]]] - 28 W. Zeng, B. Johnson, R. Smith, N. Rubin, M. Reagor, C. Ryan, C. Rigetti, "First quantum computers need smart software,"
*Nature News*, vol. 549, no. 7671, pp. 149-151, 2017.custom:[[[-]]] - 29 D. Rajan, M. Visser, "Quantum Blockchain using entanglement in time,"
*Quantum Reports*, vol. 1, no. 1, pp. 3-11, 2019.custom:[[[-]]] - 30 A. E. Azzaoui, J. H. Park, "Post-quantum blockchain for a scalable smart city,"
*Journal of Internet Technology*, vol. 21, no. 4, pp. 1171-1178, 2020.custom:[[[-]]] - 31 W. A. A. Torres, R. Steinfeld, A. Sakzad, J. K. Liu, V. Kuchta, N. Bhattacharjee, M. H. Au, J. Cheng, "Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0),"
*in Information Security and Privacy. ChamSwitzerland: Springer*, pp. 558-576, 2018.custom:[[[-]]] - 32 Y. L. Gao, X. B. Chen, Y. L. Chen, Y. Sun, X. X. Niu, Y. X. Yang, "A secure cryptocurrency scheme based on post-quantum blockchain,"
*IEEE Access*, vol. 6, pp. 27205-27213, 2018.doi:[[[10.1109/ACCESS.2018.2827203]]] - 33
*National Science and Technology Council, 2018 (Online). Available:*, https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Strategic-Overview-for-Quantum-Information-Science.pdf - 34 B. Sussman, P. Corkum, A. Blais, D. Cory, A. Damascelli, "Quantum Canada,"
*Quantum Science and Technology*, vol. 4, no. 2, 2019.custom:[[[-]]] - 35
*Inside Quantum Technology, 2020 (Online). Available:*, https://www.insidequantumtechnology.com/news/germanys-billions-in-funding-for-quantum-computing-reflects-its-push-for-technological-sovereignty-european-self-reliance/ - 36
*J. Eitner, 2020 (Online). Available:*, https://www.fraunhofer.de/en/press/research-news/2020/march/ibm-and-fraunhofer-bring-quantum-computin-to-germany.html - 37
*National Quantum Computing Centre (Online). Available:*, https://www.ukri.org/about-us/nqcc/ - 38
*National Cyber Security Center, 2016 (Online). Available:*, https://www.ncsc.gov.uk/whitepaper/quantum-safe-cryptography - 39
*J. Whalen, 2019 (Online). Available:*, https://www.washingtonpost.com/business/2019/08/18/quantum-revolution-is-coming-chinese-scientists-are-forefront/ - 40 Q. Zhang, F. Xu, L. Li, N. L. Liu, J. W. Pan, "Quantum information research in China,"
*Quantum Science and Technology*, vol. 4, no. 4, 2019.custom:[[[-]]] - 41
*H. Siljak, 2020 (Online). Available:*, https://theconversation.com/chinas-quantum-satellite-enables-first-totally-secure-long-range-messages-140803 - 42 Y. Y amamoto, M. Sasaki, H. Takesue, "Quantum information science and technology in Japan,"
*Quantum Science and Technology*, vol. 4, no. 2, 2019.custom:[[[-]]] - 43
*Korea-EU Research Centre, 2019 (Online). Available:*, https://k-erc.eu/korea-rd-research-trends-and-results/korea-starts-five-year-development-program-for-quantum-computing-technology/ - 44 A. S. Cacciapuoti, M. Caleffi, F. Tafuri, F. S. Cataliotti, S. Gherardini, G. Bianchi, "Quantum internet: networking challenges in distributed quantum computing,"
*IEEE Network*, vol. 34, no. 1, pp. 137-143, 2019.custom:[[[-]]] - 45 S. Wehner, D. Elkouss, R. Hanson, "Quantum internet: a vision for the road ahead,"
*Science*, vol. 362, no. 6412, 2018.doi:[[[10.1126/science.aam9288]]] - 46 W. J. Munro, K. Azuma, K. Tamaki, K. Nemoto, "Inside quantum repeaters,"
*IEEE Journal of Selected Topics in Quantum Electronics*, vol. 21, no. 3, pp. 78-90, 2015.custom:[[[-]]] - 47 J. Borregaard, H. Pichler, T. Schroder, M. D. Lukin, P. Lodahl, A. S. Sorensen, "One-way quantum repeater based on near-deterministic photon-emitter interfaces,"
*Physical Review X*, vol. 10, no. 2, 2020.custom:[[[-]]] - 48 S. K. Singh, N. Rastogi, "Role of cyber cell to handle cyber crime within the public and private sector: an Indian case study," in
*Proceedings of 2018 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU)*, Bhimtal, India, 2018;pp. 1-6. custom:[[[-]]] - 49 S. K. Singh, Y. S. Jeong, J. H. Park, "A deep learning-based IoT-oriented infrastructure for secure smart city,"
*Sustainable Cities and Society*, vol. 60, no. 102252, 2020.custom:[[[-]]] - 50 S. K. Singh, S. Rathore, J. H. Park, "Blockiotintelligence: a blockchain-enabled intelligent IoT architecture with artificial intelligence,"
*Future Generation Computer Systems*, vol. 110, pp. 721-743, 2020.custom:[[[-]]]