Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Prasanna Kumar K, Sathisha K, Rashmi S
DOI Link: https://doi.org/10.22214/ijraset.2024.66104
Certificate: View Certificate
This paper discusses the deep connection between Number Theory, Cryptography, and Quantum Computing techniques in an endeavor to understand their application in developing new cryptographic techniques, optimization problems, and computational complexity. Like modular arithmetic, which uses prime factorization, in most quantum algorithms like Shor’s and Grover\'s algorithms, number theory is one of the significant paradigms. This work gives a detailed analysis of some mathematical derivation, theore,m and proof of these algorithms to their practical use as well as computational efficiency. Discussed issues include scaling, correction of errors, and unsolved concerns applying number theory; all discussed from the perspective of existing quantum architecture. Addressing this new research directions of the field, the paper also presents further developments in quantum cryptography, topological quantum computing, and the algorithmic area. In highlighting both theoretical and computational challenges, this work has shown that the synergy between number theory and quantum computing has the opportunity to revolutionize cryptography and optimization and to lay the groundwork for future quantum advancements.
I. INTRODUCTION
A. Overview of Number Theory and Quantum Computing
Number theory is, in fact, one of the oldest branches of mathematics; it is also known as the “queen of mathematics” where the primary aim is to understand the properties of integers. It includes a number of its branches, for example, the theory of prime numbers, properties of the residues when dividing, and Diophantine equations, which were and are studied for their beautiful mathematical beauty and theoretical value. However, it is in the twentieth century that number theory was discovered to have deep germination in the contemporary computing sciences, specifically, cryptography, computational complexity, and error control codes. Also, the spectral aspects of number theory have received more attention due to quantum computing because of additional views on problem-solving methods and models. The new and emergent field of quantum computing uses the principles of quantum mechanics to transform the way programmable systems manage data flow. Qubits are as distinct from classical bits in that for the former it is possible to perform calculations in parallel as in qubits distinct states can co-exist. Moreover, phenomena like entanglement and tunneling offer that are not available for classical computers, and thus one can witness the implementation of an algorithm like Shor’s factorization or Grover’s search algorithms, which outperforms classical computation in certain tasks [1], [2].
One of quantum computing’s most productive areas is the link between number theory and parameters of quantum computing. Issues like integer factorization discrete logarithms and moderate arithmetic- which form the basis of cryptographic systems and various computational questions in general , are well suited to quantum computation. For instance, Shor’s algorithm applies quantum computation for the factorization problem, which runs efficiently substantially faster than all the known classical approaches, illustrating the need for integration between quantum computing and math [3], [4].
B. Relevance of Number Theory to Quantum Computing
There is substantial utility of number theory in several instances that quantum computing seeks to solve. The most important usage is in cryptography. Most of today’s cryptosystems like RSA and elliptic curve cryptography stem their security from the hardness of such mathematical problems as factorisation of large composite numbers and discrete logarithms. Nevertheless, quantum computers, using Shor’s type of algorisms, can disrupt these schemes as these problems can be efficiently solved [5].
This capability has squared the need for post-quantum cryptographic systems that are immune to quantum attacks; most of which are based on number-theoretic constructs [6].
In addition to implementation of cryptography, number theory have much significant responsibility in the areas of quantum error correction and quantum algorithms. As it was already mentioned, most of the known QEC employs modular arithmetic and other foundations of the number theory to maintain quantum coherence and resist the noise influence [7]. Other ones include quantum phase estimation algorithm, which is an essential part of most quantum computing operations shown to use modular exponentiation and periodicity derived out of number theory [8]. In quantum simulation and optimization, number theory is used to build up a plan and solve different mathematical problems. For example, information in modular arithmetic and Diophantine equations can be used for constructing quantum circuits and code computational problems in quantum formats [9], [10]. The combination of nonteoretical approaches with quantum computational abilities is promising, promising for the development of methodologies and solving scientific and practical problems in areas of optimization, data analysis, and secure communication.
C. Objectives and Scope of the Research
This research aims to explore the applications of number theory within the context of quantum computing, focusing on its theoretical foundations, practical implementations, and potential advancements. The primary objectives are as follows:
This research covers both theoretical and applicative aspects and involves the presentation of mathematical models, the implementation of algorithms, and computational simulations. Quantum Technologies are more general and encompassing, in that, this work seeks to present a synthesis between mathematically theoretical aspects, especially number theory, and practical technological quantum computing.
D. Significance of Mathematical Derivations in This Context
Derivations involving mathematics is something, which cannot be avoided when dealing with enhancement of number theory as well as quantum computing. They enable one to establish correct theoretical models and build methods of testing these concepts and algorithms systematically as well as to guarantee soundness of computational environments. In the context of this research, mathematical derivations serve several critical purposes:
This research ends here stressing on how mathematical derivations have set the stage whereby important theoretical education can be synthesized with usable practical values. The case of, First, mathematical derivations marked progress in number theory and quantum computing while at the same time presenting a blueprint to potentials that can revolutionize technology and society.
II. BACKGROUND AND LITERATURE REVIEW
A. Historical Context of Number Theory and Its Classical Applications
Number theory has always been among the most important fields of mathematical investigation. When its beginnings perhaps it owes it to the study of integers and their mutual dependencies with each other passing through the work of the early mathematician such as Euclid and Diophantus. This paper seeks to discuss the historical background of number theory and its basic tools and axioms that have played significant roles for modern number theory like Euclid’s algorithm for greatest common divisor with details and the fundamental theorem of arithmetic.
Traditional use of number theory falls into several categories. For example, modular arithmetic is applied even in such cryptosystems as RSA. Another remarkable use of the objects includes in coding theory, the concepts like; error detection and correction codes which involve a lot of concepts of prime numbers and modular arithmetic.
Table 1 provides a summary of some classical number theory applications.
Application |
Key Concepts |
Real-World Usage |
Cryptography |
Modular Arithmetic, Primes |
RSA, Diffie-Hellman, Elliptic Curves |
Coding Theory |
Finite Fields, Modular Arithmetic |
Error Correction Codes |
Diophantine Equations |
Integer Solutions |
Mathematical Problem Solving |
B. Overview of Key Advancements in Quantum Computing
Quantum computing as a next generation paradigm based on principles like superposition, entanglement and quantum interference is aimed at summing up the problems that are intractable for classical modes. Feynman and Deutsch gave the idea of quantum computing in the 1980s [2]. Since then, the field has seen a lot progress especially in the quantum algorithms and quantum hardware. Quantum computing special highlights include the Shor’s algorithm for integer factorization which significantly decreases computational difficulty compared to classical algorithms, Grover’s algorithm yields quadratic speed up for search problems databases [3]. Something equally significant is on the application of quantum error correction codes that make quantum computations to function properly amidst noise [18][19].
C. Review of Existing Research Connecting Number Theory to Quantum Algorithms
The field of number theory quantum computing has been mainly investigated through the computational algorithms that depend on the integer characteristics. Shor’s algorithm is a typical one: it could provide a solution to a problem in the field of integer factorization and discrete logarithms, unlike a classical framework [3].
1) Shor's Algorithm and Its Mathematical Foundations
Shor's algorithm operates on the principle of quantum Fourier transform (QFT) and periodicity. It efficiently computes the factors of a composite number NN by exploiting periodicity in modular arithmetic. The algorithm's steps include:
Compute GCD(a,N) using the Euclidean algorithm. If GCD(a,N)>1, then a non-trivial factor of N has been found.
ar ≡1 (mod N).
The algorithm's efficiency stems from the ability of QFT to compute periodicities in polynomial time, specifically O((log?N)^2(log?log?N)(log?log?log?N)). This represents a significant improvement over classical methods, which generally require sub-exponential time for factorization.
The efficiency of this algorithm is rooted in its use of QFT, which identifies periodicities in polynomial time, a significant improvement over classical methods that require sub-exponential time [4].
Table 2 illustrates the computational complexity of factorization algorithms.
Algorithm |
Computational Complexity |
Classical/Quantum |
Trial Division |
O(√N) |
Classical |
Pollard's Rho |
O(N^1/4) |
Classical |
Shor's Algorithm |
O((log?N)^2(loglogN)) |
Quantum |
2) Lattice-Based Quantum Algorithms
Other applications of number theory in Quantum computing are instantiated by Lattice based problems for instance the shortest vector problem (SVP). Some quantum algorithms, for anyone, that were created to solve hidden subgroup problems (HSP) rely on number-theoretic aspects of lattices. The described algorithms seem to have practical use in the field of cryptanalysis, specifically for the cracking of lattice-based cryptosystems [17][5].
3) Quantum Modular Exponentiation
Quantum modular exponentiation, a critical component of Shor's algorithm, showcases the synergy between quantum computing and number theory. This operation involves computing a^x mod N efficiently on a quantum computer, leveraging quantum parallelism and entanglement. Research has shown that optimizing quantum modular exponentiation can significantly enhance the performance of quantum algorithms for number-theoretic problems [6].
D. Emerging Trends and Challenges
New analysis is aimed at expanding the use of number theory in the field of quantum computing. For instance, actual progress in quantum hardware imply possibilities to perform elliptic curve cryptographic algorithms on quantum devices, which is yet another intersection of algebraic number theory for quantum computing [7].
But, there are difficulties, for example, in achieving national-scale quantum systems for performing complex calculations and overcoming the errors resulting from quantum dissipation. Further studies for the purpose of removing such barriers are planned for the future so that actualizations of the role of number theory in quantum computer science can be done in a more proper manner.
III. FUNDAMENTAL CONCEPTS
A. Key Number Theory Principles Relevant to Quantum Computing
Number theory provides foundational concepts pivotal for quantum computing, particularly in areas such as prime factorization, modular arithmetic, and discrete logarithms [22][25]. These principles underpin several quantum algorithms, such as Shor’s algorithm, which leverages the periodicity inherent in modular arithmetic for efficient factorization.
1) Modular Arithmetic Modular arithmetic deals with integers under a modular constraint. If a,b,m∈Z, then
a≡b (mod m)?m?(a−b).
A key property is:
(a×b) mod m=[(a mod m)×(b mod m)] mod m
which ensures efficiency in handling large numbers and is essential for cryptographic operations and quantum computations.
2) Prime Numbers Prime numbers are the building blocks of integers and play a significant role in cryptography. Efficient prime factorization is a major computational challenge addressed by quantum computing.
3) Euler’s Totient Function Defined as ?(n), Euler’s totient function counts integers up to n that are coprime to n:
where p represents the prime factors of n. This function is integral to cryptographic protocols like RSA and quantum studies involving modular arithmetic.
4) Quantum Fourier Transform (QFT) The QFT is the quantum counterpart of the discrete Fourier transform, instrumental in uncovering periodicities in quantum states. For N basis states, the QFT is defined as
Its efficiency underpins algorithms like Shor’s, enabling integer factorization in polynomial time.
B. Quantum Computing Fundamentals Necessary to Understand the Applications
Quantum computing relies on principles such as superposition, entanglement, and unitary operations. These principles allow quantum systems to solve problems that are infeasible for classical systems.
1) Superposition A quantum bit (qubit) exists in a superposition of ?0〉 ?1〉:
Superposition exponentially expands the computational space.
2) Entanglement correlates qubits such that their states cannot be described independently. For a two-qubit system:
Entangled states enable non-local computations that are critical in quantum protocols.
3) Quantum Gates and Circuits Quantum gates manipulate qubits, such as the Hadamard (HH) and Controlled-NOT (CNOT) gates[20][21]. For instance, the Hadamard gate is represented as:
Quantum circuits implement algorithms like Shor’s using these gates.
C. Definitions, Theorems, and Properties
Theorem: Chinese Remainder Theorem (CRT) The CRT provides solutions for systems of congruences:
x≡ai? (mod ni?), where ni ?are pairwise coprime.
The solution is:
Quantum Algorithm Example: Period Finding Shor’s algorithm reduces integer factorization to period finding in a quantum system. For a function f(x)=a^x mod N, the algorithm identifies r, the period of f, by exploiting QFT to detect periodicity efficiently.
Step |
Operation |
Description |
1 |
Superposition |
Prepare a superposition of all states. |
2 |
Modular Exponentiation |
Compute f(x). |
3 |
QFT |
Apply QFT to extract periodicity. |
4 |
Classical post-processing |
Use r to deduce factors of N. |
A. Approach for Exploring the Connections Between Number Theory and Quantum Computing
The methodology integrates theoretical analysis, simulation, and mathematical derivations to explore how number theory principles underpin quantum computing algorithms.
1) Theoretical Analysis
2) Simulation of Quantum Algorithms Quantum simulation tools like Qi skit are employed to demonstrate algorithms like Shor’s and Grover’s.
3) Mathematical Derivations
B. Description of Mathematical Derivations, Techniques, and Algorithms Used
1) Derivation: Modular Exponentiation
Modular exponentiation, y=a^x mod N, is a fundamental operation in number theory and cryptography, often serving as a computational bottleneck in classical systems. In quantum computing, it is efficiently implemented using reversible quantum gates [22].
The operation can be represented as a sequence of controlled multiplications modulo N, which is pivotal in quantum algorithms like Shor's. By encoding a^x mod N into quantum states, quantum systems leverage parallelism to reduce computational overhead.
Mathematical Representation:
y = a^x mod N
The quantum circuit for modular exponentiation uses modular multiplication gates to encode the result of a^x mod N into a quantum register. This approach is highly efficient and scalable for large numbers [23].
2) Period Finding via QFT
For f(x)=a^x mod N:
The QFT transforms the quantum state into one that reveals r:
3) Quantum Search Algorithms
Grover’s algorithm illustrates quantum advantage in searching unsorted datasets. It applies the amplitude amplification principle to locate a target in O(N)O(\sqrt{N}) time [24][26].
C. Algorithm Implementation
The research focuses on implementing algorithms using quantum simulation platforms. For example, the implementation of Shor’s algorithm involves the following steps:
D. Evaluation Metrics
The evaluation focuses on:
Conclusion
The presented methodologies blend theory and exercise to analyze the connection between number theory and quantum computing. These efforts help to develop an understanding of how quantum systems realize computational advantage due to quantized problems that in classical contexts rely on number theory.
IV. KEY APPLICATIONS
A. Prime Factorization Using Shor’s Algorithm
One of the most celebrated applications of number theory in quantum computing is Shor’s algorithm for prime factorization. Classical algorithms for factorization, such as trial division or Pollard's rho, scale poorly for large numbers, requiring exponential time. Shor’s algorithm, leveraging the quantum Fourier transform (QFT), identifies periodicity in modular arithmetic, enabling efficient factorization in polynomial time. For a composite number N, Shor’s algorithm finds its factors by identifying the period r of the function f(x)=a^x mod N. Once r is determined, the factors of N can be computed as gcd?(a^r/2±1, N). This breakthrough underpins the potential to compromise classical cryptographic systems like RSA, which rely on the computational difficulty of prime factorization.
B. Quantum Cryptography and Secure Communications
Basic concepts of number theory are particularly pertinent in quantum cryptographic systems, including the QKD. In all the QKD systems such as BB84 the mathematical framework relies in the difficulty of logarithms and factoring of large numbers to produce secure communication network [28]. In contrast, classical systems rest on hypotheses about the difficulty of computation, quantum cryptography depends on few principles of quantum mechanics including entanglement and superposition to give unconditional security. Post-quantum cryptographic approaches are already being developed to match other quantum algorithms such as Shor’s to create future-proof communication systems.
C. Solving the Discrete Logarithm Problem
Another important use is the solution of the discrete logarithm problem when the application is required, for, instance, when implementing DL-based cryptographic methods such as Diffie-Hellman key exchange and Elliptic Curve Cryptography [29]. Unfortunately, the index calculus method is among the classical algorithms for solving discrete logarithms and is computationally intensive. Hillery and alii in their quantum algorithm based on Shor’s technique work out the discrete logarithm problem polynomial time, threatening the security of currently used cryptosystems [32][33]. This has led to the creation of quantum-safe cryptography that aims at protecting sensitive information from the quantum intruders.
D. Quantum Search Algorithms and Optimization
Searching an unsorted database is made faster by the use of quantum search algorithms like Grover’s algorithm. While we here do not meet a direct generalization of number theory concepts in these algorithms, they are often used to enhance number theoretic outcomes. For example, Grover’s algorithm can and is used to optimize a search of a range of values for a particular number, such as finding prime numbers, or solve certain problems of modular arithmetic fast, which helps with the creation of cryptographic keys, and a number of other applications.
E. Quantum Simulation of Number-Theoretic Functions
Number theoretic functions for example modular exponentiation, finds an easy simulation with the help of quantum computing. Such simulations are critical for concepts of cryptography and for designing secure systems and networks. Furthermore, quantum simulators facilitate investigation of various characteristics of zeta functions and other number-theoretic constructs, as well as penetrating cryptographic developments.
F. Implications for Post-Quantum Cryptography
The concern of quantum algorithms eroding the cryptographic stand of classical cryptosystems is the reason behind post quantum cryptography. Number theory is used when creating lattice-based cryptography, hash-based cryptography, and multivariate polynomial cryptography which do not succumb to quantum attacks. These approaches depend on such problems as the calculation of short lattice vectors to remain a problem even in quantum systems.
V. INSIGHTS GAINED FROM MATHEMATICAL ANALYSIS
In fact, analyzing quantum algorithms points to different types of problems that could be solved with great efficiency by harnessing quantum mechanical features.
Exponential Speedup: Shors’ algorithm is a representative example of how quantum systems can provide exponential improvements to the time quiz of integer factorization. Some of the classical methods fail for large integers, they rely on sub-exponential or exponential runtimes. Period finding in modular arithmetic, on the other hand, involves a quantum Fourier transform (QFT) which brings the problem to polynomial time according to Shor. This insight exposes a key weakness in cryptographic techniques such as the RSA technique which is major on the degree of difficulty of factoring.
Quadratic Speedup: Grover’s algorithm dispenses a quadratic benefit over the classical approaches in general SU(2) at large inquiries. Therefore when using amplitude amplification, it lowers the search of unsorted databases to N, previously it was N. This universal requires understanding and this shows why it can be used in various fields such as database retrieval, optimization, and machine learning.
Scalability of Quantum Algorithms: Computer models support numerical variants of quantum algorithms for larger problem dimensions. Shor’s algorithm can efficiently factorize integers of increasing sizes and Grover results show better computation for larger dataset. It is this scalability that has application in contemporary cryptography solutions, big data, and quantum ML.
Periodicity and Modular Arithmetic: The essence of Shor’s algorithm lies in the extraordinary capability of QFT to determine the presence of period in modular arithmetic, which forms the corner stone of number theory. Modular arithmetic health’s the talent of encoding large integers into quantum states which let quantum systems set up eroticisms. This observation does not only reveal the deterministic nature of the algorithms, which is characteristic of quantum algorithms, but also goes further to inquiring into the effectiveness of quantum algorithms with reference to number-theoretic queries.
Such computing based on the principles of quantum theory suggests that new frontiers for solving large computational problems can be opened with new parameters for efficiency in a variety of domains ranging from cryptography and optimization all the way to complex systems modeling.
VI. CHALLENGES AND LIMITATIONS
A. Mathematical Challenges in Integrating Number Theory with Quantum Computing
B. Computational Issues in Quantum Context
C. Limitations in Applications
Table 3: Challenges and Their Impacts
Challenge |
Description |
Impact |
Decoherence |
Loss of quantum state due to noise |
Reduces algorithm efficiency |
Scaling |
Large qubit requirement |
Limits applicability for large numbers |
Error Correction Overhead |
Additional qubits for stability |
Increases system complexity |
VII. FUTURE PROSPECTS
A. New Developments in the Field
B. Potential Advancements
C. Long-Term Implications
Table 4: Future Prospects in Quantum Applications
Prospect |
Application Domain |
Expected Impact |
Quantum Cryptography |
Security and Privacy |
Enhanced resilience against attacks |
Hardware Advancements |
Computational Sciences |
Practical implementation of large systems |
Interdisciplinary Research |
Academic Collaborations |
Innovations in algorithmic efficiency |
D. Summary
There are profound mathematical and hardware implementation issues in relation to integration of number theory with quantum computing. However, new opportunities in both the field of hardware and algorithms, as well as in interdisciplinary research and development, open up a set of revolutionary applications. Solving these challenges will turn quantum computing from being a concept to an application that will transform cryptography, optimization and simulation.
The kind of relationship between number theory and quantum computability introduced into the world of mathematics and computational science may be considered a groundbreaking paradigm. Discussing intricate links between these subjects in this research paper, it is also important to stress the key function number theory exhibits in quantum algorithms and the development of quantum technologies. A. Summary of Key Insights It means that such branches of number theory as modular arithmetic, factors and primes, elliptic curves serve as the basis which is required for building quantum algorithms such as Shor’s and Grover’s. These algorithms have often times proved to be efficient in solving some classical difficult problems as seen from cryptography and optimization. The work then takes the analysis a step further, proving where necessary the mathematical relationships that underpin these algorithms before demonstrating how the conceptual elegance of number theory translates to the quantum realm. The ends in quantum computing, with the inherent parallelism qualitatively and the probabilistic quantitatively, supply the computation to efficiently search for solution spaces. However, it seems to be well integrated with number theory; still, there are some complex issues. Challenges like noise, decoherence and quantum system scalability are some of the restrictions that hinders current implementation of quantum computing. Nevertheless, growth in interconnectivity of these disciplines remains the dominant force towards innovation in areas of cryptographic security, optimization, and other complex simulations. B. Challenges and Limitations Incorporation of the number theory with quantum computing faces both theoretical and practical barriers. Some quantum algorithms remain limited by the unsolved questions in number theory of which the Riemann Hypothesis is an example. The problems in error correction, the scalability of qubits, and their impact still pose a major obstacle to using number theory algorithms with quantum computers. The above challenges underscore the need for further progress of the interdisciplinary investigations and developments within the subject. C. Future Outlook The potential of applying number theory in ap quantum computer is promising because of the following reasons. New trends in quantum cryptography, upgrading algorithms, and topological developments in quantum computing present the unexplored potential of this combination. Current restraints include emerging quantum hardware, development in errors controlling, and teamwork with interdisciplinary professionals, which will allow future use of quantum systems in solving real-life issues. D. Broader Implications The findings of this research have several consequences not only in mathematics and computer science disciplines. The established expectations from the upcoming enhancement in cryptography, optimization, and quantum simulations will vastly transform several sectors like finances, healthcare, logistics, and cyber sec. In addition, the active introduction of number theory into quantum computing acts as stimuli to educational and research activities and producing young generation scientists to face the advanced challenges of this ever-growing field.
[1] Termanova et al, \"Tensor quantum programming,\" New Journal of Physics, vol. 26, (12), pp. 123019, 2024. Available: https://www.proquest.com/scholarly-journals/tensor-quantum-programming/docview/3146512012/se-2. DOI: https://doi.org/10.1088/1367-2630/ad985b. [2] M. Rath and H. Date, \"Quantum data encoding: a comparative analysis of classical-to-quantum mapping techniques and their impact on machine learning accuracy,\" EPJ Quantum Technology, vol. 11, (1), pp. 72, 2024. Available: https://www.proquest.com/scholarly-journals/quantum-data-encoding-comparative-analysis/docview/3120694581/se-2. DOI: https://doi.org/10.1140/epjqt/s40507-024-00285-3. [3] M. Brang et al, \"Spooky action at a distance? A two-phase study into learners’ views of quantum entanglement,\" EPJ Quantum Technology, vol. 11, (1), pp. 33, 2024. Available: https://www.proquest.com/scholarly-journals/spooky-action-at-distance-two-phase-study-into/docview/3052935687/se-2. DOI: https://doi.org/10.1140/epjqt/s40507-024-00244-y. [4] E. Chae, J. Choi and J. Kim, \"An elementary review on basic principles and developments of qubits for quantum computing,\" Nano Convergence, vol. 11, (1), pp. 11, 2024. Available: https://www.proquest.com/scholarly-journals/elementary-review-on-basic-principles/docview/2964114321/se-2. DOI: https://doi.org/10.1186/s40580-024-00418-5. [5] H. Oh and D. K. Park, \"Quantum support vector data description for anomaly detection,\" Machine Learning : Science and Technology, vol. 5, (3), pp. 035052, 2024. Available: https://www.proquest.com/scholarly-journals/quantum-support-vector-data-description-anomaly/docview/3095636210/se-2. DOI: https://doi.org/10.1088/2632-2153/ad6be8. [6] L. Bunescu and A. M. Vârtei, \"Modern finance through quantum computing—A systematic literature review,\" PLoS One, vol. 19, (7), 2024. Available: https://www.proquest.com/scholarly-journals/modern-finance-through-quantum-computing/docview/3082557949/se-2. DOI: https://doi.org/10.1371/journal.pone.0304317. [7] E. D. Spyrou, V. Kappatos and C. Stylios, \"Quantum Congestion Game for Overcrowding Prevention Within Airport Common Areas,\" Computers, vol. 13, (11), pp. 298, 2024. Available: https://www.proquest.com/scholarly-journals/quantum-congestion-game-overcrowding-prevention/docview/3132921402/se-2. DOI: https://doi.org/10.3390/computers13110298. [8] Y. Wang et al, \"A Comprehensive Review of MI-HFE and IPHFE Cryptosystems: Advances in Internal Perturbations for Post-Quantum Security,\" Axioms, vol. 13, (11), pp. 741, 2024. Available: https://www.proquest.com/scholarly-journals/comprehensive-review-mi-hfe-iphfe-cryptosystems/docview/3132862091/se-2. DOI: https://doi.org/10.3390/axioms13110741. [9] Z. Xu et al, \"Quantum-inspired genetic algorithm for designing planar multilayer photonic structure,\" NPJ Computational Materials, vol. 10, (1), pp. 257, 2024. Available: https://www.proquest.com/scholarly-journals/quantum-inspired-genetic-algorithm-designing/docview/3128034960/se-2. DOI: https://doi.org/10.1038/s41524-024-01438-9. [10] T. Pecyna and R. Ró?ycki, \"Improving Quantum Optimization Algorithms by Constraint Relaxation,\" Applied Sciences, vol. 14, (18), pp. 8099, 2024. Available: https://www.proquest.com/scholarly-journals/improving-quantum-optimization-algorithms/docview/3110329797/se-2. DOI: https://doi.org/10.3390/app14188099. [11] PDF, \"Quantum Cryptology in the Big Data Security Era,\" International Journal of Advanced Computer Science and Applications, vol. 15, (7), 2024. Available: https://www.proquest.com/scholarly-journals/quantum-cryptology-big-data-security-era/docview/3096559205/se-2. DOI: https://doi.org/10.14569/IJACSA.2024.0150761. [12] L. B. Nguyen et al, \"Empowering a qudit-based quantum processor by traversing the dual bosonic ladder,\" Nature Communications, vol. 15, (1), pp. 7117, 2024. Available: https://www.proquest.com/scholarly-journals/empowering-qudit-based-quantum-processor/docview/3094595804/se-2. DOI: https://doi.org/10.1038/s41467-024-51434-2. [13] D. Alfonso et al, \"How Well Can Quantum Embedding Method Predict the Reaction Profiles for Hydrogenation of Small Li Clusters?\" Nanomaterials, vol. 14, (15), pp. 1267, 2024. Available: https://www.proquest.com/scholarly-journals/how-well-can-quantum-embedding-method-predict/docview/3090920835/se-2. DOI: https://doi.org/10.3390/nano14151267. [14] S. Sepúlveda et al, \"Systematic Review on Requirements Engineering in Quantum Computing: Insights and Future Directions,\" Electronics, vol. 13, (15), pp. 2989, 2024. Available: https://www.proquest.com/scholarly-journals/systematic-review-on-requirements-engineering/docview/3090896599/se-2. DOI: https://doi.org/10.3390/electronics13152989. [15] Y. Yao and L. Xiang, \"Superconducting Quantum Simulation for Many-Body Physics beyond Equilibrium,\" Entropy, vol. 26, (7), pp. 592, 2024. Available: https://www.proquest.com/scholarly-journals/superconducting-quantum-simulation-many-body/docview/3084781644/se-2. DOI: https://doi.org/10.3390/e26070592. [16] PDF, \"Comparing AI Algorithms for Optimizing Elliptic Curve Cryptography Parameters in e-Commerce Integrations: A Pre-Quantum Analysis,\" International Journal of Advanced Computer Science and Applications, vol. 15, (6), 2024. Available: https://www.proquest.com/scholarly-journals/comparing-ai-algorithms-optimizing-elliptic-curve/docview/3084409522/se-2. DOI: https://doi.org/10.14569/IJACSA.2024.01506153. [17] S. N. Ajani et al, \"Frontiers of Computing - Evolutionary Trends and Cutting-Edge Technologies in Computer Science and Next Generation Application,\" Journal of Electrical Systems, vol. 20, (1), pp. 28-45, 2024. Available: https://www.proquest.com/scholarly-journals/frontiers-computing-evolutionary-trends-cutting/docview/3073679471/se-2. [18] K. Intonti et al, \"The Second Quantum Revolution: Unexplored Facts and Latest News,\" Encyclopedia, vol. 4, (2), pp. 630, 2024. Available: https://www.proquest.com/scholarly-journals/second-quantum-revolution-unexplored-facts-latest/docview/3072307747/se-2. DOI: https://doi.org/10.3390/encyclopedia4020040. [19] U. U. Shinde and R. Bandaru, \"Quantum error-correction using humming sparrow optimization based self-adaptive deep cnn noise correction module,\" Scientific Reports (Nature Publisher Group), vol. 14, (1), pp. 14289, 2024. Available: https://www.proquest.com/scholarly-journals/quantum-error-correction-using-humming-sparrow/docview/3070880337/se-2. DOI: https://doi.org/10.1038/s41598-024-65182-2. [20] A. Köhler, M. Kahra and M. Breuß, \"A First Approach to Quantum Logical Shape Classification Framework,\" Mathematics, vol. 12, (11), pp. 1646, 2024. Available: https://www.proquest.com/scholarly-journals/first-approach-quantum-logical-shape/docview/3067418716/se-2. DOI: https://doi.org/10.3390/math12111646. [21] B. Khanal and P. Rivas, \"A Modified Depolarization Approach for Efficient Quantum Machine Learning,\" Mathematics, vol. 12, (9), pp. 1385, 2024. Available: https://www.proquest.com/scholarly-journals/modified-depolarization-approach-efficient/docview/3053202725/se-2. DOI: https://doi.org/10.3390/math12091385. [22] A. H. Abbas and I. S. Maksymov, \"Reservoir Computing Using Measurement-Controlled Quantum Dynamics,\" Electronics, vol. 13, (6), pp. 1164, 2024. Available: https://www.proquest.com/scholarly-journals/reservoir-computing-using-measurement-controlled/docview/2998920495/se-2. DOI: https://doi.org/10.3390/electronics13061164. [23] N. Holincheck et al, \"Quantum Science and Technologies in K-12: Supporting Teachers to Integrate Quantum in STEM Classrooms,\" Education Sciences, vol. 14, (3), pp. 219, 2024. Available: https://www.proquest.com/scholarly-journals/quantum-science-technologies-k-12-supporting/docview/2998847446/se-2. DOI: https://doi.org/10.3390/educsci14030219. [24] Meng-Leong How and Sin-Mei Cheah, \"Forging the Future: Strategic Approaches to Quantum AI Integration for Industry Transformation,\" AI, vol. 5, (1), pp. 290, 2024. Available: https://www.proquest.com/scholarly-journals/forging-future-strategic-approaches-quantum-ai/docview/2987103609/se-2. DOI: https://doi.org/10.3390/ai5010015. [25] R. C. Michela and R. C. Lorenzo, \"Quantum Computing as a Game Changer on the Path towards a Net-Zero Economy: A Review of the Main Challenges in the Energy Domain,\" Energies, vol. 17, (5), pp. 1039, 2024. Available: https://www.proquest.com/scholarly-journals/quantum-computing-as-game-changer-on-path-towards/docview/2955528044/se-2. DOI: https://doi.org/10.3390/en17051039. [26] H. Lim et al, \"Fragment molecular orbital-based variational quantum eigensolver for quantum chemistry in the age of quantum computing,\" Scientific Reports (Nature Publisher Group), vol. 14, (1), pp. 2422, 2024. Available: https://www.proquest.com/scholarly-journals/fragment-molecular-orbital-based-variational/docview/2919763469/se-2. DOI: https://doi.org/10.1038/s41598-024-52926-3. [27] L. Clinton et al, \"Towards near-term quantum simulation of materials,\" Nature Communications, vol. 15, (1), pp. 211, 2024. Available: https://www.proquest.com/scholarly-journals/towards-near-term-quantum-simulation-materials/docview/2918141809/se-2. DOI: https://doi.org/10.1038/s41467-023-43479-6. [28] A. Alanezi et al, \"Quantum walks-based simple authenticated quantum cryptography protocols for secure wireless sensor networks,\" New Journal of Physics, vol. 25, (12), pp. 123041, 2023. Available: https://www.proquest.com/scholarly-journals/quantum-walks-based-simple-authenticated/docview/2904980107/se-2. DOI: https://doi.org/10.1088/1367-2630/ad11b7. [29] L. B. Ho, \"A stochastic evaluation of quantum Fisher information matrix with generic Hamiltonians,\" EPJ Quantum Technology, vol. 10, (1), pp. 37, 2023. Available: https://www.proquest.com/scholarly-journals/stochastic-evaluation-quantum-fisher-information/docview/2866251883/se-2. DOI: https://doi.org/10.1140/epjqt/s40507-023-00195-w. [30] W. Chipidza et al, \"Quantum Computing and IS - Harnessing the Opportunities of Emerging Technologies,\" Communications of the Association for Information Systems, vol. 52, pp. 480-499, 2023. Available: https://www.proquest.com/scholarly-journals/quantum-computing-is-harnessing-opportunities/docview/2909646491/se-2. DOI: https://doi.org/10.17705/1CAIS.05219. [31] Meng-Leong How and Sin-Mei Cheah, \"Business Renaissance: Opportunities and Challenges at the Dawn of the Quantum Computing Era,\" Businesses, vol. 3, (4), pp. 585, 2023. Available: https://www.proquest.com/scholarly-journals/business-renaissance-opportunities-challenges-at/docview/2904764460/se-2. DOI: https://doi.org/10.3390/businesses3040036. [32] F. Phillipson, \"Quantum Computing in Telecommunication—A Survey,\" Mathematics, vol. 11, (15), pp. 3423, 2023. Available: https://www.proquest.com/scholarly-journals/quantum-computing-telecommunication-survey/docview/2849016896/se-2. DOI: https://doi.org/10.3390/math11153423. [33] T. Suzuki et al, \"Quantum AI simulator using a hybrid CPU–FPGA approach,\" Scientific Reports (Nature Publisher Group), vol. 13, (1), pp. 7735, 2023. Available: https://www.proquest.com/scholarly-journals/quantum-ai-simulator-using-hybrid-cpu-fpga/docview/2812916158/se-2. DOI: https://doi.org/10.1038/s41598-023-34600-2. [34] R. U. Rasool et al, \"Quantum Computing for Healthcare: A Review,\" Future Internet, vol. 15, (3), pp. 94, 2023. Available: https://www.proquest.com/scholarly-journals/quantum-computing-healthcare-review/docview/2791644348/se-2. DOI: https://doi.org/10.3390/fi15030094.
Copyright © 2024 Prasanna Kumar K, Sathisha K, Rashmi S. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET66104
Publish Date : 2024-12-25
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here