The thesis behind my research was that research behind quantum computing has led to fear in the general population, but with the introduction of quantum encryption, their data would be more secure with quantum computers than without it. I wanted to research how the development behind quantum cryptography is being used to address the fear of quantum computers.
Some questions I wanted to (and successfully did) address:
Encyclopædia Britannica. (n.d.). Quantum computer. Britannica Academic. Retrieved February 16, 2022, from
This resource goes over the evolution of quantum computing, along with some recent advancements and future theoretical advancements. This is a good source to start with if you're unfamiliar with quantum computing terminology.
Bruss, D., Erdeélyi, G., Meyer, T., Riege, T., & Rothe, J. (2007). Quantum Cryptography: A Survey. ACM Computing Surveys, 39(2), 1–27. http://doi.acm.org/10.1145/1242471.1242474
This article includes fundamental ideas in the field of quantum computing (quantum key distribution, Hilbert spaces, qubits, etc..). It’s a good resource to expand on the knowledge given by the previous entry. It explains quantum cryptography mathematically and through computer science terminology.
Chang, Y., Zhang, S.-B., Yan, L.-L., & Wan, G. (2020). A Quantum secure sharing protocol for Cloud data based on proxy re-encryption. Scientific Reports, 10(1), 1–8. https://doi.org/10.1038/s41598-020-65738-y
This article goes over a way of encrypting classical computer data through the cloud quantum encryption proxies. This article is important because cloud encryption is one of the most important factors when it comes to whether classical computers will become obsolete after quantum computers are introduced to the general population. It also shows one of the more interesting ways of utilizing quantum encryption.
Date, P., & Potok, T. (2021). Adiabatic quantum linear regression. Scientific Reports, 11(1), 1-10. https://doi.org/10.1038/s41598-021-01445-6
This article goes over adiabatic quantum computers which are one of the most commonly researched types of quantum computers. I included this article because it includes details about how quantum computers can bypass common encryption methods.