Irrelevant carrots and non-existent sticks: trust, governance, and security in the transition to quantum-safe systems
- URL: http://arxiv.org/abs/2512.16974v1
- Date: Thu, 18 Dec 2025 15:23:58 GMT
- Title: Irrelevant carrots and non-existent sticks: trust, governance, and security in the transition to quantum-safe systems
- Authors: Ailsa Robertson, Siân Brooke, Sebastian De Haro, Christian Schaffner,
- Abstract summary: Quantum computing poses an urgent and widely recognised threat to global cybersecurity.<n>This study develops a socially informed vision for a quantum-safe future and analyses the current innovation landscape.
- Score: 4.1823451201647055
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum computing poses an urgent and widely recognised threat to global cybersecurity, enabling encrypted government, financial, and healthcare data harvested today to be decrypted in the near future. Transitioning to quantum-safe cryptography is therefore essential, demanding coordinated action across a complex, multi-actor innovation system. Drawing on insights from an expert workshop in Amsterdam, this study develops a socially informed vision for a quantum-safe future and analyses the current innovation landscape to identify critical gaps and the actions needed to address them. We map twelve key actor groups involved in the migration process, finding that regulators exert the strongest direct influence, while standardisation bodies play a crucial indirect role. This research provides one of the first system-level mappings of actors, influence pathways and governance responsibilities shaping the quantum-safe transition, revealing several responsibilities with unclear ownership. Although centred on the Netherlands, our findings are applicable to other national contexts navigating quantum-safe transitions.
Related papers
- Quantum Attacks Targeting Nuclear Power Plants: Threat Analysis, Defense and Mitigation Strategies [1.2891210250935148]
This paper introduces a forensics-first framework for achieving quantum resilience in high-consequence environments.<n>We show how Harvest-Now, Decrypt-Later (HNDL) campaigns can retroactively compromise cryptographic foundations, undermine evidence admissibility, and facilitate sophisticated sabotage.<n>We propose and validate a phased, defense-in-depth migration path to Post-Quantum Cryptography (PQC)<n>The paper concludes that without urgent adoption of quantum-resilient controls, the integrity of both physical safety systems and digital forensic evidence remains at severe and irreversible risk.
arXiv Detail & Related papers (2026-02-25T03:26:09Z) - Are Enterprises Ready for Quantum-Safe Cybersecurity? [0.0]
Quantum computing threatens to undermine classical cryptography by breaking encryption and signature schemes.<n>This paper examines enterprise readiness for quantum-safe cybersecurity through three perspectives.
arXiv Detail & Related papers (2025-09-01T19:27:06Z) - Quantum-Accelerated Wireless Communications: Concepts, Connections, and Implications [59.0413662882849]
Quantum computing is poised to redefine the algorithmic foundations of communication systems.<n>This article outlines the fundamentals of quantum computing in a style familiar to the communications society.<n>We highlight a mathematical harmony between quantum and wireless systems, which makes the topic more enticing to wireless researchers.
arXiv Detail & Related papers (2025-06-25T22:25:47Z) - Quantum Information Processing, Sensing and Communications: Their Myths, Realities and Futures [61.25494706587422]
The state-of-the-art, knowledge gaps and future evolution of quantum machine learning are discussed.<n>We conclude with a set of promising future research ideas in the field of ultimately secure quantum communications.
arXiv Detail & Related papers (2024-12-01T22:28:02Z) - Evaluation Framework for Quantum Security Risk Assessment: A Comprehensive Strategy for Quantum-Safe Transition [0.03749861135832072]
The rise of large-scale quantum computing poses a significant threat to traditional cryptographic security measures.
Quantum attacks undermine current asymmetric cryptographic algorithms, rendering them ineffective.
This study explores the challenges of migrating to quantum-safe cryptographic states.
arXiv Detail & Related papers (2024-04-12T04:18:58Z) - Assessing the Benefits and Risks of Quantum Computers [0.7224497621488283]
We review what is currently known on the potential uses and risks of quantum computers.
We identify 2 large-scale trends -- new approximate methods and the commercial exploration of business-relevant quantum applications.
We conclude there is a credible expectation that quantum computers will be capable of performing computations which are economically-impactful.
arXiv Detail & Related papers (2024-01-29T17:21:31Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Quantum Computing Standards & Accounting Information Systems [0.0]
This paper critically analyzes quantum standards and their transformative effects on the efficiency, expediency, and security of commerce.
The study provides a guide to understanding and navigating the interplay between quantum technology and standard-setting organizations.
arXiv Detail & Related papers (2023-11-15T20:32:27Z) - Entanglement-Assisted Quantum Networks: Mechanics, Enabling
Technologies, Challenges, and Research Directions [66.27337498864556]
This paper presents a comprehensive survey of entanglement-assisted quantum networks.
It provides a detailed overview of the network structure, working principles, and development stages.
It also emphasizes open research directions, including architecture design, entanglement-based network issues, and standardization.
arXiv Detail & Related papers (2023-07-24T02:48:22Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Entanglement transfer, accumulation and retrieval via quantum-walk-based
qubit-qudit dynamics [50.591267188664666]
Generation and control of quantum correlations in high-dimensional systems is a major challenge in the present landscape of quantum technologies.
We propose a protocol that is able to attain entangled states of $d$-dimensional systems through a quantum-walk-based it transfer & accumulate mechanism.
In particular, we illustrate a possible photonic implementation where the information is encoded in the orbital angular momentum and polarization degrees of freedom of single photons.
arXiv Detail & Related papers (2020-10-14T14:33:34Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.