Interesting approach alert! QUBO-based SVM tested on QPU (Neutral Atoms). A recent study, "QUBO-based SVM for credit card fraud detection on a real QPU," explores the application of a novel quantum approach to a critical cybersecurity challenge: credit card fraud detection. Here are some of the key findings: * QUBO-based SVM model: The study successfully implemented a Support Vector Machine (SVM) model whose training is reformulated as a Quadratic Unconstrained Binary Optimization (QUBO) problem. This approach could leverage the capabilities of quantum processors. * Performance: The results demonstrate that a version of the QUBO SVM model, particularly when used in a stacked ensemble configuration, achieves high performance with low error rates. The stacked configuration uses the QUBO SVM as a meta-model, trained on the outputs of other models. * Noise robustness: Surprisingly, the study observed that a certain amount of noise can lead to enhanced results. This is a new phenomenon in quantum machine learning, but it has been seen in other contexts. The models were robust to noise both in simulations and on the real QPU. * Scalability: Experiments were extended up to 24 atoms on the real QPU, and the study showed that performance increases as the size of the training set increases. This suggests that even better results are possible with larger QPUs. Practical implications: This research highlights the potential of quantum machine learning for real-world applications, using a hybrid approach where the training is performed on a QPU and the testing on classical hardware. This approach makes the model applicable on current NISQ devices. The model is also advantageous because it uses the QPU only for training, reducing costs and allowing the trained model to be reused. * Ideal for cybersecurity and regulatory issues: The study also observed that the model preserves data privacy because only the atomic coordinates and laser parameters reach the QPU, and the model test is done locally. Here the article: https://lnkd.in/d5Vfhq2G #quantumcomputing #machinelearning #cybersecurity #frauddetection #neutralatoms #QPU #NISQ #quantumml #fintech #datascience
Safe Applications of Quantum Computing
Explore top LinkedIn content from expert professionals.
Summary
Safe applications of quantum computing focus on harnessing quantum technology to improve data security, privacy, and cryptography while preparing systems against emerging quantum threats. These solutions prioritize protecting sensitive information and ensuring trustworthy digital operations as quantum computing becomes more powerful and accessible.
- Upgrade encryption: Transition to quantum-resistant cryptographic methods and adopt hybrid solutions that combine classical and post-quantum algorithms for greater security.
- Adopt agile strategies: Build flexible systems that allow for seamless updates to cryptographic protocols and key management as new quantum-safe standards evolve.
- Prioritize data privacy: Implement advanced authentication techniques, such as quantum zero-knowledge protocols, to secure identity verification and prevent information leaks during digital transactions.
-
-
Is this the first real-world use case for quantum computers? True randomness is hard to come by. And in a world where cryptography and fairness rely on it, “close enough” just doesn’t cut it. A new paper in Nature claims to present a demonstrated, certified application of quantum computing, not in theory or simulation, but in the real world. Led by Quantinuum, JPMorganChase, Argonne National Laboratory, Oak Ridge National Laboratory, and The University of Texas at Austin, the team successfully ran a certified randomness expansion protocol on Quantinuum’s 56-qubit H2 quantum computer, and validated the results using over 1.1 exaflops of classical computing power. TL;DR is certified randomness--the kind of true, verifiable unpredictability that’s essential to cryptography and security--was generated by a quantum computer and validated by the world’s fastest supercomputers. Here’s why that matters: True randomness is anything but trivial. Classical systems can simulate randomness, but they’re still deterministic at the core. And for high-stakes environments such as finance, national security, or fairness in elections, you don’t want pseudo-anything. You want cold, hard entropy that no adversary can predict or reproduce. Quantum mechanics is probabilistic by nature. But just generating randomness with a quantum system isn’t enough; you need to certify that it’s truly random and not spoofed. That’s where this experiment comes in. Using a method called random circuit sampling, the team: ⚇ sent quantum circuits to Quantinuum’s 56-qubit H2 processor, ⚇ had it return outputs fast enough to make classical simulation infeasible, ⚇ verified the randomness mathematically using the Frontier supercomputer ⚇ while the quantum device accessed remotely, proving a future where secure, certifiable entropy doesn’t require trusting the hardware in front of you The result? Over 71,000 certifiably random bits generated in a way that proves they couldn’t have come from a classical machine. And it’s commercially viable. Certified randomness may sound niche—but it’s highly relevant to modern cryptography. This could be the start of the earliest true “quantum advantage” that actually matters in practice. And later this year, Quantinuum plans to make it a product. It’s a shift— from demos to deployment from supremacy claims to measurable utility from the theoretical to the trustworthy read more from Matt Swayne at The Quantum Insider here --> https://lnkd.in/gdkGMVRb peer-reviewed paper --> https://lnkd.in/g96FK7ip #QuantumComputing #CertifiedRandomness #Cryptography
-
𝗗𝗮𝘆 𝟴: 𝗗𝗮𝘁𝗮 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗻𝗱 𝗣𝗼𝘀𝘁 𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗥𝗲𝗮𝗱𝗶𝗻𝗲𝘀𝘀 In today’s hyper-connected world, data is the new currency and the perimeter, and it is essential to safeguard them from Cyber criminals. The average cost of a data breach reached an all-time high of $4.88 million in 2024, a 10% increase from 2023. Advances in 𝗾𝘂𝗮𝗻𝘁𝘂𝗺 𝗰𝗼𝗺𝗽𝘂𝘁𝗶𝗻𝗴 further threaten traditional cryptographic systems by potentially rendering widely used algorithms like public key cryptography insecure. Even before large-scale quantum computers become practical, adversaries can harvest encrypted data today and store it for future decryption. Sensitive data encrypted with traditional algorithms may be vulnerable to retrospective attacks once quantum computers are available. As quantum technology evolves, the need for stronger data protection grows. Google Quantum AI recently demonstrated advancements with its Willow processors, which 𝗲𝗻𝗵𝗮𝗻𝗰𝗲𝘀 𝗲𝗿𝗿𝗼𝗿 𝗰𝗼𝗿𝗿𝗲𝗰𝘁𝗶𝗼𝗻 𝘂𝘀𝗶𝗻𝗴 𝘁𝗵𝗲 𝘀𝘂𝗿𝗳𝗮𝗰𝗲 𝗰𝗼𝗱𝗲. These breakthroughs underscore the growing efficiency and scalability of quantum computers. To address these threats, Enterprises are turning to 𝗮𝗴𝗶𝗹𝗲 𝗰𝗿𝘆𝗽𝘁𝗼𝗴𝗿𝗮𝗽𝗵𝘆 to prepare for Post Quantum era. Proactive Measures for Agile Cryptography and Quantum Resistance: 1. 𝗔𝗱𝗼𝗽𝘁 𝗣𝗼𝘀𝘁-𝗤𝘂𝗮𝗻𝘁𝘂𝗺 𝗔𝗹𝗴𝗼𝗿𝗶𝘁𝗵𝗺𝘀 Transition to NIST-approved PQC standards like CRYSTALS-Kyber, CRYSTALS-Dilithium, Sphincs+. Use hybrid cryptography that combines classical and quantum-resistant methods for a smoother transition. 2. 𝗗𝗲𝘀𝗶𝗴𝗻 𝗳𝗼𝗿 𝗔𝗴𝗶𝗹𝗶𝘁𝘆 Avoid hardcoding cryptographic algorithms. Implement abstraction layers and modular cryptographic libraries to enable easy updates, algorithm swaps, and seamless key rotation. 3. 𝗔𝘂𝘁𝗼𝗺𝗮𝘁𝗲 𝗞𝗲𝘆 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 Use Hardware Security Modules (HSMs) and Key Management Systems (KMS) to automate secure key lifecycle management, including zero-downtime rotation. 4. 𝗣𝗿𝗼𝘁𝗲𝗰𝘁 𝗗𝗮𝘁𝗮 𝗘𝘃𝗲𝗿𝘆𝘄𝗵𝗲𝗿𝗲 Encrypt data at rest, in transit, and in use with quantum resistant standards and protocols. For unstructured data, use format-preserving encryption and deploy data-loss prevention (DLP) tools to detect and secure unprotected files. Replace sensitive information with unique tokens that have no exploitable value outside a secure tokenization system. 5. 𝗣𝗹𝗮𝗻 𝗔𝗵𝗲𝗮𝗱 Develop a quantum-readiness strategy, audit systems, prioritize sensitive data, and train teams on agile cryptography and PQC best practices. Agile cryptography and advanced data devaluation techniques are essential for protecting sensitive data as cyber threats evolve. Planning ahead for the post-quantum era can reduce migration costs to PQC algorithms and strengthen cryptographic resilience. Embrace agile cryptography. Devalue sensitive data. Secure your future. #VISA #PaymentSecurity #Cybersecurity #12DaysofCyberSecurityChristmas #PostQuantumCrypto
-
Quantum computing is advancing rapidly, bringing unprecedented processing power that threatens traditional encryption methods. The "collect now, decrypt later" strategy underscores the urgency of preparation, adversaries are already harvesting encrypted data with the intent to decrypt it once large-scale quantum computers become viable. Fortinet is leading the way in quantum-safe security, integrating NIST PQC algorithms, including CRYSTALS-KYBER, into FortiOS to safeguard data from future quantum-based attacks. "A recent real-world demonstration by JPMorgan Chase (JPMC) showcased quantum-safe high-speed 100 Gbps site-to-site IPsec tunnels secured using QKD. The test was conducted between two JPMC data centers in Singapore, covering over 46 km of telecom fiber, and achieved 45 days of continuous operation." "The network leveraged QKD vendor ID Quantique for the quantum key exchange, Fortinet’s FortiGate 4201F for network encryption, and FortiTester for performance measurement." This is not just a theoretical concern, organizations are already deploying quantum-safe encryption solutions. As quantum computing capabilities advance, organizations must adopt quantum-resistant security architectures and take proactive steps now to safeguard their sensitive information against future quantum-enabled attacks. These proactive methods include: -adopting hybrid cryptographic approaches, combining classical and PQC algorithms, ensuring interoperability and a phased transition -implementing crypto-agile architectures, for seamless updates to encryption mechanisms as new quantum-resistant standards emerge -leveraging PQC capable HSMs and TPMs -evaluating network security architectures, such as ZTNA models -ensuring authentication and access controls are resistant to quantum threats. -identifying mission-critical and long-lived data, that must remain secure for decades. -implementing sensitivity-based classification, determine which datasets require the highest level of post-quantum protection. -conducting risk assessments to evaluate data exposure, storage locations, and current encryption standards. -transitioning to quantum-resistant encryption algorithms recommended by NIST’s PQC standardization efforts. -establishing data-at-rest and data-in-transit encryption policies, mandate use of PQC algorithms as they become available. -strengthening key management practices -developing GRC frameworks ensuring adherence to post-quantum security. -implementing continuous cryptographic monitoring to detect and phase out vulnerable encryption methods. -enforcing regulatory compliance by aligning with emerging PQC standards. -establishing incident response plans to handle quantum-driven cryptographic threats proactively. Fortinet remains committed to pioneering quantum-safe encryption solutions, enabling organizations to stay ahead of emerging cryptographic threats. Read more from Dr. Carl Windsor, Fortinet’s CISO!
-
⛳️ Merging Quantum with Zero Knowledge: Privacy & Security centric How to Revolutionizing Digital Security? 🔒💻 🚀 The future of digital security is here, and quantum computing is leading the charge! In my recent study on Quantum Security of Zero-Knowledge Protocols at Universitat Politècnica de Catalunya, I explored how quantum zero-knowledge protocols (QZKPs) are transforming privacy and authentication in the quantum era. 🔐 Why does this matter? Resistance to quantum attacks: Quantum algorithms like Shor's threaten traditional cryptographic systems. QZKPs, built on quantum-resistant problems like lattices, ensure protection against these threats. Absolute privacy: Thanks to quantum properties like entanglement and the no-cloning theorem, QZKPs guarantee that no sensitive information is revealed during authentication. Robust authentication: Experiments show QZKPs can authenticate identities over 60 km with quantum bit error rates (QBER) below 11%, instantly detecting malicious attempts. 🌟 From blockchain to electronic voting, QZKPs are opening new frontiers for digital security. Yet, the challenge remains to bridge the gap between quantum theory and practical applications. 💡 What do you think about the impact of quantum computing on cybersecurity? Share your thoughts in the comments! ⬇️ #Cybersecurity #QuantumComputing #ZeroKnowledgeProofs #Innovation #Technology
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development