Quantum Cryptography & Cybersecurity: Post-Quantum Security & QKD
Post-quantum cryptography news: NIST PQC standards, quantum-safe security, quantum key distribution. Quantum threats & encryption updates.
Quantum computing poses an existential threat to current encryption infrastructure while simultaneously offering unprecedented security through quantum cryptographic protocols. The cybersecurity community faces a dual imperative: migrating to post-quantum cryptographic standards resistant to quantum attacks while deploying quantum key distribution (QKD) for long-term information security.
Post-Quantum Cryptography (PQC) standards from NIST include CRYSTALS-Kyber (lattice-based key encapsulation), CRYSTALS-Dilithium (lattice-based digital signatures), SPHINCS+ (hash-based signatures), and FALCON. These algorithms rely on mathematically hard problems believed resistant to quantum attacks.
India's Quantum Cryptography and Cybersecurity Initiatives
India's National Quantum Mission includes quantum communication as one of four verticals with substantial allocation. The Thematic Hub on Quantum Communication at IIT Madras, established as the IITM C-DOT Samgnya Technologies Foundation, focuses on quantum cryptography, post-quantum security, quantum key distribution networks, quantum memory, quantum repeaters, and satellite-enabled quantum communication.
The Department of Telecommunications (DoT) and Ministry of Electronics and Information Technology (MeitY) coordinate quantum-safe migration for critical infrastructure. The Defence Research and Development Organisation (DRDO) leads quantum-safe security scheme design and testing according to NQM documentation.
Bengaluru-based QNu Labs, selected under NQM startup support in November 2024, develops quantum-safe cryptography and secure communication systems including QKD systems and quantum random number generators for defense, telecom, and data security applications.
The NQM targets developing quantum-resilient encryption and post-quantum cryptographic frameworks for India's critical infrastructure, with satellite-based secure quantum communications over 2000km and inter-city quantum key distribution as specific deliverables.
quantum-computingQuantum Communication Secured by Choosing Measurement Basis Offers Ultimate Privacy
Scientists have developed a novel protocol for one-way quantum secure direct communication, utilising the choice of measurement basis as the secret key. Santiago Bustamante and Boris A. Rodríguez, both from Universidad de Antioquia, alongside Elizabeth Agudelo of TU Wien, demonstrate a system where information is encoded and decoded through measurements performed in either the computational or Hadamard basis. This research is significant because it establishes information-theoretic security against BB84-symmetric attacks using finite ensembles of entangled pairs and a public channel. Importantly, the protocol requires no local unitary operations by the receiver, making it particularly suitable for practical implementation in network configurations such as star networks. This research addresses the fundamental question of distinguishing ensembles described by identical compressed density operators and introduces a method for encoding and decoding classical information through measurements in either the computational or Hadamard basis. Employing quantum wiretap channel theory, the study rigorously assesses the secure net bit rates and certifies the information-theoretic security of various implementations against BB84-symmetric attacks. A key advantage of this model is the elimination of local unitary operations required by the receiver, making it particularly suitable for practical implementation in star network configurations. The work builds upon the concept of finite ensembles of entangled EPR pairs, each shared between two parties, Alice and Bob, and explores how local measurements influence the transmission of a single bit of information. Researchers define a compressed density operator as the state of an average entity within an ensemble, acknowledging that this operator may not fully capture all information about the ensemble’s preparation. By measuring qubits in either the computational or Hadamard basis, Alice and Bob induce correlated collapses in their res
Quantum ZeitgeistLoading...0
quantum-computingDST Task Force Report: India Prepares for Post-Quantum Security by 2028
India is preparing to defend its digital infrastructure against the looming threat of quantum computing, with a national task force outlining a roadmap to achieve post-quantum security by 2028. The February 2026 report, “Implementation of Quantum Safe Ecosystem in India,” details a phased approach, beginning with pilot programs in critical sectors like banking and finance. Recognizing the risk of “Harvest Now, Decrypt Later” (HNDL) attacks, the Task Force emphasizes proactive measures, stating that all cryptographic transition planning shall proceed under an “assume breach” principle. This ambitious plan includes establishing a National PQC Testing & Certification Program by December 2026 and mandating the adoption of quantum-safe products in government procurement, signaling a significant investment in future-proof cybersecurity. Quantum Computing Threat & India’s National Quantum Mission This isn’t a distant concern; the report outlines phased actions, beginning with pilots in high-priority systems like banking and finance, to be implemented by 2028, with Critical Information Infrastructure (CII) targeted by 2027. Procurement requirements will prioritize “crypto-agile and PQC-compliant assets,” including a detailed “Bill of Materials (BOM)” encompassing software, hardware, and cryptographic configurations. Furthermore, the report emphasizes the need to “promote the adoption of existing indigenous quantum-safe solutions” developed by Indian R&D labs, industries, and startups, while simultaneously initiating new product development where gaps exist. This strategic roadmap positions India alongside nations formally defining PQC migration timelines, aiming for a secure and resilient digital future. Report of the Task Force: Sub-Group Summaries The current landscape of cryptographic security is bracing for a paradigm shift, driven by the rapidly approaching threat of quantum computing. Short-term actions, targeted for completion by 2028 – and 2027 for Criti
Quantum ZeitgeistLoading...0
quantum-computingOrange Business And Cisco Team on Crypto-agile PQC
Insider Brief Orange Business and Cisco are deploying post-quantum cryptography across Orange’s global network to protect enterprise and public-sector data from future quantum-enabled attacks. PQC-secured WAN services are available now, with managed Cisco SD-WAN services planned for commercial launch in the third quarter of 2026. The approach embeds quantum-resistant encryption into SD-WAN infrastructure, enabling centrally managed, crypto-agile networks that can evolve as security standards change. Photo by Chris Yang on Unsplash Orange Business said it is rolling out post-quantum cryptography across its global network through a new collaboration with Cisco, aiming to protect enterprise and public-sector data against future attacks enabled by quantum computing. According to a blog post by Jean-Noël Michel, vice president of Communication Services Business Line at Orange Business, the company is the first European service provider to announce globally available network services secured with post-quantum cryptography, or PQC, built on Cisco’s 8000 Series Secure Routers. The services are designed to safeguard data traffic over wide-area networks as advances in quantum computing threaten today’s encryption methods. Orange Business said PQC-secured WAN services are available immediately, while managed Cisco SD-WAN services with post-quantum protection are targeted for commercial availability in the third quarter of calendar year 2026. The offering is intended to ensure that sensitive data moving between corporate sites, cloud platforms, and data centers remains protected even as new computing capabilities emerge. Quantum computing poses a long-term risk to widely used encryption algorithms that secure internet traffic today. As Michel writes, attackers could capture encrypted data now and decrypt it later once sufficiently powerful quantum computers become available, a scenario often described as “harvest now, decrypt later.” That risk is prompting network operators and
Quantum DailyLoading...0
quantum-computingOrange Business and Cisco Launch PQC-Secured Network Services
Insider Brief Orange Business and Cisco have launched post-quantum cryptography (PQC)–secured network services on Orange’s global infrastructure to protect enterprise and public-sector data from future quantum threats. Orange Business is the first European service provider to offer PQC-secured global WAN services using Cisco 8000 Series Secure Routers, with managed Cisco SD-WAN PQC services planned for commercial availability in Q3 2026. The collaboration focuses on crypto-agile, centrally managed SD-WAN architectures designed to mitigate “harvest now, decrypt later” risks as quantum computing advances. PRESS RELEASE — Orange Business and Cisco are announcing today their collaboration on Post-Quantum Cryptography- (PQC) secured solutions over the Orange Business global network infrastructure. This provides customers, from enterprises to public sector, with long-term protection against future quantum attacks for their network traffic. Orange Business is the first European service provider to announce PQC-secured global network services based on Cisco 8000 Series Secure Routers. These are specifically designed for the quantum era, providing robust, quantum-safe network connectivity. As of today, PQC-secured WAN services are available. PQC-secured Orange Business managed Cisco SD-WAN services are targeted for commercial availability in CY Q3 2026. Customers can trust that sensitive data moving across organizations, the cloud, and data centers remains secure, even against the threat of quantum computing. As quantum computing advances, many widely used classical cryptographic algorithms will become increasingly vulnerable. This creates the risk that data intercepted today could be decrypted in the future, known as the “Harvest now, Decrypt Later” threat. Customers need to act now to avoid such exposure. PQC integrated into Cisco SD-WAN infrastructures is easy for customers to implement as a software feature – particularly as a managed service. It will help customer
Quantum DailyLoading...0
quantum-computingEurope Quantum Cryptography Market Size, Share & Trends, 2034 - Market Data Forecast
Europe Quantum Cryptography Market Size, Share & Trends, 2034 Market Data Forecast
Google News – Quantum ComputingLoading...0
quantum-computingTheory of quantum error mitigation for non-Clifford gates
AbstractQuantum error mitigation techniques mimic noiseless quantum circuits by running several related noisy circuits and combining their outputs in particular ways. How well such techniques work is thought to depend strongly on how noisy the underlying gates are. Weakly-entangling gates, like $R_{ZZ}(\theta)$ for small angles $\theta$, can be much less noisy than entangling Clifford gates, like CNOT and CZ, and they arise naturally in circuits used to simulate quantum dynamics. However, such weakly-entangling gates are non-Clifford, and are therefore incompatible with two of the most prominent error mitigation techniques to date: probabilistic error cancellation (PEC) and the related form of zero-noise extrapolation (ZNE). This paper generalizes these techniques to non-Clifford gates, and comprises two complementary parts. The first part shows how to effectively transform any given quantum channel into (almost) any desired channel, at the cost of a sampling overhead, by adding random Pauli gates and processing the measurement outcomes. This enables us to cancel or properly amplify noise in non-Clifford gates, provided we can first characterize such gates in detail. The second part therefore introduces techniques to do so for noisy $R_{ZZ}(\theta)$ gates. These techniques are robust to state preparation and measurement (SPAM) errors, and exhibit concentration and sensitivity—crucial statistical properties for many experiments. They are related to randomized benchmarking, and may also be of interest beyond the context of error mitigation. We find that while non-Clifford gates can be less noisy than related Cliffords, their noise is fundamentally more complex, which can lead to surprising and sometimes unwanted effects in error mitigation. Whether this trade-off can be broadly advantageous remains to be seen.Featured image: An illustration of probabilistic error cancellation (PEC) generalized to $R_{ZZ}$ gates with a non-Clifford angle. The gate noise can be accurate
Quantum JournalLoading...0
quantum-computingInternational Conference on Quantum Communication and Security
International Conference on Quantum Communication and Security Acronym: ICQCSDates: Monday, March 16, 2026 to Friday, March 20, 2026Web page: https://icqcs.sciencesconf.org/Registration deadline: Sunday, March 1, 2026Submission deadline: Sunday, March 1, 2026Tags: quantum cryptographyQKDquantum networkspost-quantum cryptographyICQCS 2026 is a five-day conference organized by MSCA QSI and DIM QuanTiP dedicated to quantum-safe communications, explicitly bringing together communities that are too often split across venues: 🔹 Post-quantum cryptography (PQC) 🔹 QKD theory & protocols 🔹 Experimental QKD + network integration …plus beyond-QKD quantum cryptography and quantum networks, with a program mixing keynote-tutorials, invited talks, posters, and an industry session. 📍 Paris (Campus des Cordeliers) 📅 March 16–20, 2026 📝 Free participation (registration mandatory) 🖼️ Posters: everyone is welcome to present! 🎙️ Speakers listed on the conference website include Rotem Arnon, Hugues de Riedmatten, Martin Albrecht, Giulio Malavolta, Boris Korzh, Qiang Zhang, and others. If you’re working anywhere near PQC, QKD, quantum networks, or quantum security, ICQCS is a unique chance to learn directly from leading researchers across these closely connected areas—and to connect with people bridging theory, protocols, and real-world implementations! Log in or register to post comments
QuantikiLoading...0
quantum-computingInternational Conference on Quantum Communication and Security ICQCS 2026
International Conference on Quantum Communication and Security ICQCS 2026 Acronym: ICQCSDates: Monday, March 16, 2026 to Friday, March 20, 2026Web page: https://icqcs.sciencesconf.org/Registration deadline: Sunday, March 1, 2026Submission deadline: Sunday, March 1, 2026Tags: quantum cryptographyQKDquantum networkspost-quantum cryptographyICQCS 2026 is a five-day conference organized by MSCA QSI and DIM QuanTiP dedicated to quantum-safe communications, explicitly bringing together communities that are too often split across venues: 🔹 Post-quantum cryptography (PQC) 🔹 QKD theory & protocols 🔹 Experimental QKD + network integration …plus beyond-QKD quantum cryptography and quantum networks, with a program mixing keynote-tutorials, invited talks, posters, and an industry session. 📍 Paris (Campus des Cordeliers) 📅 March 16–20, 2026 📝 Free participation (registration mandatory) 🖼️ Posters: everyone is welcome to present! 🎙️ Speakers listed on the conference website include Rotem Arnon, Hugues de Riedmatten, Martin Albrecht, Giulio Malavolta, Boris Korzh, Qiang Zhang, and others. If you’re working anywhere near PQC, QKD, quantum networks, or quantum security, ICQCS is a unique chance to learn directly from leading researchers across these closely connected areas—and to connect with people bridging theory, protocols, and real-world implementations! Log in or register to post comments
QuantikiLoading...0
quantum-computingPhD Projects in Theoretical Quantum Optics and Quantum Information at he Niels Bohr Institute
PhD Projects in Theoretical Quantum Optics and Quantum Information at he Niels Bohr Institute Application deadline: Sunday, March 15, 2026Research group: Theoretical quantum optics group at the Niels Bohr InstituteTheoretical quantum optics group at the Niels Bohr InstituteEmployer web page: Theoretical Quantum Optics GroupJob type: PhDTags: quantum opticsQuantum theoryquantum informationThe Niels Bohr Institute invites applicants for two PhD fellowships in Theoretical Quantum Optics and Quantum Information. The projects will be part of the theoretical quantum optics group and the Center for Hybrid quantum Networks (Hy-Q). The starting date is (expected to be) 1 September 2026 or as soon as possible thereafter. An earlier starting date may also be a possibility. The projects Two different projects are available Quantum Internet technology. This project will be part of the Quantum Internet Alliance (QIA), a joint European network aiming at bulding the world’s first quantum internet protype within the duration of the Ph.D. project. The successful candidate will develop physical models of the system being built with the aim of predicting and optimizing its performance. In addition the project will develop general theories for quantum internet technologies and methods for describing them. Scalable quantum information processing based on quantum dots. The projects aims at developing theories for how to implement quantum information processing with quantum dots strongly coupled to light and will be a collaboration with experimentalists at the Niels Bohr Institute, Ruhr-Universität Bochum and the University of Basel. The goal is to both develop concrete proposals for experiments which can be implemented in the near future and long term architectures for quantum information processors. Who are we looking for? We are looking for candidates within the field of Physics, Quantum Information Processing or related areas. Applicants can have a background f
QuantikiLoading...0
quantum-computingBeyond Wigner: Non-Invertible Symmetries Preserve Probabilities
--> Quantum Physics arXiv:2602.07110 (quant-ph) [Submitted on 6 Feb 2026] Title:Beyond Wigner: Non-Invertible Symmetries Preserve Probabilities Authors:Thomas Bartsch, Yuhan Gai, Sakura Schafer-Nameki View a PDF of the paper titled Beyond Wigner: Non-Invertible Symmetries Preserve Probabilities, by Thomas Bartsch and 2 other authors View PDF Abstract:In recent years, the traditional notion of symmetry in quantum theory was expanded to so-called generalised or categorical symmetries, which, unlike ordinary group symmetries, may be non-invertible. This appears to be at odds with Wigner's theorem, which requires quantum symmetries to be implemented by (anti)unitary -- and hence invertible -- operators in order to preserve probabilities. We resolve this puzzle for (higher) fusion category symmetries $\mathcal{C}$ by proposing that, instead of acting by unitary operators on a fixed Hilbert space, symmetry defects in $\mathcal{C}$ act as isometries between distinct Hilbert spaces constructed from twisted sectors. As a result, we find that non-invertible symmetries naturally act as trace-preserving quantum channels. Crucially, our construction relies on the symmetry category $\mathcal{C}$ being unitary. We illustrate our proposal through several examples that include Tambara-Yamagami, Fibonacci, and Yang-Lee as well as higher categorical symmetries. Comments: Subjects: Quantum Physics (quant-ph); Strongly Correlated Electrons (cond-mat.str-el); High Energy Physics - Phenomenology (hep-ph); High Energy Physics - Theory (hep-th); Quantum Algebra (math.QA) Cite as: arXiv:2602.07110 [quant-ph] (or arXiv:2602.07110v1 [quant-ph] for this version) https://doi.org/10.48550/arXiv.2602.07110 Focus to learn more arXiv-issued DOI via DataCite (pending registration) Submission history From: Sakura Schafer-Nameki [view email] [v1] Fri, 6 Feb 2026 19:00:00 UTC (488 KB) Full-text links: Access Paper: View a PDF of the paper titled Beyond Wigner: Non-Invertible Symmetries Pre
arXiv Quantum PhysicsLoading...0
quantum-computingQuantum-Proof Software Tools Tackle Looming Cyber Threats with Novel Adaptation Framework
Scientists are increasingly focused on the impending threat to current cybersecurity infrastructure posed by the development of quantum computers. Lei Zhang from the University of Maryland, Baltimore County, and colleagues demonstrate that transitioning to post-quantum cryptographic (PQC) algorithms requires more than simply updating software libraries. This research highlights a significant challenge, as existing software engineering tools struggle with the unique characteristics of PQC, including probabilistic behaviour and performance complexities. The authors outline a vision for a new field, Quantum-Safe Software Engineering (QSSE) , and introduce the Automated Quantum-Safe Adaptation (AQuA) framework, proposing a three-pillar approach to PQC-aware detection, refactoring, and verification, thereby establishing a crucial research direction for future cybersecurity development. Migrating existing software to these new, quantum-resistant algorithms is proving far more complex than a simple library update. The research centres on a vision for a new generation of tools capable of intelligently adapting legacy software for a post-quantum world. The AQuA framework is built around a three-pillar agenda focusing on PQC-aware detection, semantic refactoring, and hybrid verification. This integrated pipeline aims to automate the process of identifying cryptographic components within existing codebases, restructuring them to accommodate post-quantum algorithms, and rigorously verifying the security and performance of the resulting system. The framework directly addresses the limitations of current cryptographic inventories, which lack the code-level semantics needed for safe and efficient transformation. Specifically, the study highlights three key gaps in current PQC migration strategies. Existing approaches fail to capture how cryptographic operations are embedded within a system’s control and data flow, lack systematic refactoring patterns for PQC algorithms, and lack c
Quantum ZeitgeistLoading...0
quantum-computingQuantum Cryptography’s Arithmetic Boost Promises More Secure Communications Networks
Researchers investigating continuous variable quantum key distribution (CVQKD) reconciliation protocols have focused on optimising the sharing of secure keys between parties. Rávilla R. S. Leite, Juliana M. de Assis, and Micael A. Dias, alongside Francisco M. de Assis and colleagues, present a detailed analysis of Arithmetic Reconciliation, a protocol notable for its reduced complexity and improved performance at low signal-to-noise ratios. Their work, detailed in this paper, establishes realistic reconciliation efficiencies through mutual information estimation and key sequence matching rates of 0.83 and 0.92. These findings demonstrate the feasibility and potential of Arithmetic Reconciliation for practical CVQKD systems, offering a promising pathway towards enhanced secure communication. Quantization efficiency is estimated for binary-input-continuous-output channels retaining soft information for decoding, achieving efficiencies exceeding 0.95 at low signal-to-noise ratios. Simulation results further validate the entire reconciliation procedure, utilising a Low Density Parity Check (LDPC) code across a signal-to-noise ratio range of 2 to 7 dB, dependent on the code rate employed. Unlike discrete variable QKD, continuous variable QKD benefits from easier implementation with existing telecommunications equipment and the potential for room temperature operation, making it a more practical solution for secure communication networks. The core innovation lies in the mapping of continuous random variables to their Cumulative Distribution Function, projecting them onto the unit interval and simplifying the quantization process. This approach leverages the intrinsic randomness of quantum measurements, eliminating the need for sophisticated decoding procedures or external random number generators, and resulting in statistically well-behaved bit strings for key extraction. This mapping facilitated quantization and enabled a binary representation of the variable through its
Quantum ZeitgeistLoading...0
quantum-computingLaser‑written glass chip pushes quantum communication toward practical deployment
As quantum computers continue to advance, many of today's encryption systems face the risk of becoming obsolete. A powerful alternative—quantum cryptography—offers security based on the laws of physics instead of computational difficulty. But to turn quantum communication into a practical technology, researchers need compact and reliable devices that can decode fragile quantum states carried by light.
Phys.org Quantum SectionLoading...0
quantum-computingQuantum Teleportation Between Cities Moves Closer with New Hardware Blueprint
Scientists at Delft University of Technology, including Soubhadra Maiti, Guus Avis and Sounak Kar, have delved into the intricate requirements for teleportation within an intercity quantum network. Their research, co-led by Stephanie Wehner, addresses the hardware prerequisites needed to achieve a fidelity level that matches classical limits in such networks. By formulating optimisation problems and deriving analytical expressions based on simplified noise models, they explore how different hardware configurations can impact teleportation fidelity and rates. The study highlights the potential for current technology to support metropolitan-scale teleportation but identifies necessary enhancements for intercity applications. Their work not only advances our understanding of quantum communication networks but also provides a roadmap for future technological developments in this field. Analytical modelling of fidelity and rate for intercity quantum teleportation reveals significant challenges to practical implementation Scientists have identified the minimal hardware improvements needed to achieve quantum teleportation across intercity distances. This work details the requirements for an end-to-end expected teleportation fidelity of 2/3, representing the classical limit for reliable quantum communication. Researchers formulated the problem as an optimisation task, using hardware parameters as variables to determine the necessary device capabilities. Closed-form analytical expressions were derived for teleportation fidelity and rate, accounting for heterogeneous hardware including quantum repeater chains with memory limitations. These derivations are based on the timing of link generation within both metropolitan networks and the long-distance backbone, and were validated using simulations on the NetSquid platform. The resulting analytical expressions allow for efficient exploration of potential hardware configurations without relying on computationally intensive simulat
Quantum ZeitgeistLoading...0
quantum-computingReliance Global Group to Acquire Majority Stake in Post-Quantum Cybersecurity Firm Enquantum for $2.125M
Reliance Global Group is making a $2.125 million bet on the future of cybersecurity, announcing today, February 9, 2026, a definitive agreement to acquire a controlling interest in post-quantum cryptography firm Enquantum Ltd. This move comes as the threat from quantum computing intensifies scrutiny of current encryption methods, potentially compromising vital digital infrastructure. Reliance will gain 51% ownership of Enquantum through its EZRA International Group subsidiary, payable in tranches over 10 months, with an initial 8% stake expected within 30 days. “The transition to post-quantum security is shifting from theoretical planning to near-term deployment decisions,” highlighting the urgency driving this strategic acquisition as part of Reliance’s Scale51 strategy. Reliance to Acquire 51% Controlling Interest in Enquantum Ltd. The acquisition, executed through Reliance’s EZRA International Group, signals a strategic move into a rapidly evolving cybersecurity landscape increasingly threatened by the advent of quantum computing. Reliance anticipates completing the transaction within 30 days, following a due diligence review that “reinforced our belief in this acquisition.” This isn’t simply an investment; it’s a calculated step within Reliance’s recently launched Scale51 operating and acquisition strategy. The urgency driving this deal stems from the escalating threat quantum computers pose to current encryption standards. Existing methods, foundational to modern digital infrastructure, are vulnerable to attacks from sufficiently powerful quantum machines. This transition from theoretical concern to imminent risk is pushing governments and businesses to prioritize post-quantum security solutions. Reliance identifies key sectors – financial services, cloud infrastructure, communications networks, and public-sector systems like insurtech – as particularly vulnerable and demanding immediate attention. The total purchase price for the 51% fully diluted ownership is
Quantum ZeitgeistLoading...0
quantum-computingLeclercq American Capital Backs SandboxAQ’s Quantum-AI Platform for Cybersecurity & Advanced Simulation
Leclercq American Capital LLC has announced a new equity investment in SandboxAQ, a company pioneering the convergence of artificial intelligence and quantum technologies, on February 9, 2026. This strategic backing signals growing confidence in platforms tackling critical challenges in cybersecurity, advanced simulation, and next-generation sensing. SandboxAQ develops B2B software solutions designed to help large organizations secure infrastructure against future quantum threats and accelerate research in fields like chemistry and finance. As the shift towards quantum-resistant cryptography gains momentum, SandboxAQ is positioning itself as a key player, offering solutions for “cryptographic discovery and inventory,” risk assessment, and migration orchestration. This investment firmly establishes SandboxAQ as a horizontal technology platform with the potential to deliver value across diverse industries. Leclercq Capital Invests in SandboxAQ’s AI & Quantum Platform The firm’s strategy centers on backing impactful platforms in areas like cybersecurity, advanced simulation, and next-generation sensing, indicating a clear vision for future tech investment. Beyond defense, SandboxAQ is applying its technology to diverse sectors, including healthcare and financial services, with applications ranging from improved diagnostics to portfolio optimization. “Crypto-agility” is a key component of their post-quantum cybersecurity offerings, assisting organizations in adapting to evolving regulations and standards. This broad industrial reach, extending to sensing, navigation, and materials science, positions SandboxAQ as a “horizontal technology platform,” capable of delivering value across multiple industries, rather than a narrowly focused quantum specialist, according to the investment announcement. Contact for Leclercq American Capital is LAM at +377 680869708. SandboxAQ Delivers Post-Quantum Cybersecurity Solutions SandboxAQ is addressing the escalating threat to digita
Quantum ZeitgeistLoading...0
quantum-computingQuantum Computing’s Dual Approach Boosts Stability for Complex Calculations
Scientists are developing novel architectures to simulate complex mathematical structures relevant to quantum computation and theoretical physics. Vaidik A Sharma and Sainath Bitragunta, both from the Birla Institute of Technology and Science Pilani, alongside Sharma et al., present a dual-architecture simulation framework modelling morphisms and stability conditions within derived categories. Their research constructs physically executable realisations using both parameterized quantum circuits (PQCs) and topological quantum computation (TQC) based on Fibonacci anyons. This work is significant because it bridges the gap between abstract derived category theory and practical, fault-tolerant quantum hardware, offering a robust pipeline for simulating categorical stability and homological algebra. This work introduces a method for simulating morphisms and stability conditions within the bounded derived category, a concept central to D-brane physics on both Kähler and non-Kähler manifolds. Researchers constructed two physically distinct quantum realisations: Parameterised Quantum Circuits (PQCs) utilising conventional qubit platforms, and a Topological Quantum Computing (TQC) approach leveraging the braiding and fusion of Fibonacci anyons modelled via SU(2)3 tensor categories. In the PQC model, slope functionals and stability constraints are encoded as variational observables, effectively translating derived morphisms into unitaries evolving with parameterised angles. The resulting expectation values simulate quantum-corrected Chern class inequalities, incorporating deformation terms that account for deviations from classical geometric stability. This allows for the modelling of subtle quantum effects influencing the stability of D-branes. Simultaneously, the TQC model employs braid group representations to implement functorial transformations, such as spherical twists and autoequivalences, as sequences of fault-tolerant braid operations. This bifurcated approach establ
Quantum ZeitgeistLoading...0
quantum-computingQuantum Communication Breaks 11km Barrier Using Free Space and Fibre Optics
Researchers are pioneering robust communication methods for emerging space-ground networks, and a new study demonstrates a significant advance in quantum secure direct communication. Ze-Zhou Sun, Yuan-Bin Cheng, and Yu-Chen Liu, all from the Beijing Academy of Quantum Information Sciences at Tsinghua University, alongside Guo et al., have successfully implemented phase-encoded quantum key distribution over a combined 11.4km heterogeneous free-space and fibre link. This work overcomes long-held limitations regarding the suitability of phase encoding for free-space transmission, previously favoured for fibre optics, and establishes its viability for cross-medium integration. By achieving stable operation over 1400m of urban free-space with high interference visibility and low bit error rates, and seamlessly coupling this to a 10km fibre link, the team showcases a pathway towards simplified and compatible quantum networks, potentially extending to satellite-to-ground distances exceeding 30km. Turbulence compensation enables robust free-space to fibre quantum key distribution Scientists have demonstrated phase-encoded quantum communication over a 1.4km urban free-space channel, a feat previously considered impractical due to atmospheric disturbances. This work overcomes long-standing challenges in free-space quantum networking, establishing a viable pathway for integrating quantum signals across different transmission media. The system maintained stable operation for nearly one hour, achieving 99.07% interference visibility and an average quantum bit error rate of 2.38%, showcasing remarkable resilience to environmental factors. Crucially, the free-space quantum states were directly coupled into a 10km optical fiber, confirming seamless interoperability between free-space and fiber networks. This achievement hinges on effective compensation for turbulence-induced phase drifts between successive picosecond pulses, a significant technical hurdle in free-space quantum comm
Quantum ZeitgeistLoading...0
quantum-computingQuantum Channel Transposition Now Possible with Just One Measurement, Research Confirms
Researchers are increasingly focused on understanding how to physically realise transformations of quantum channels, such as transposition and the adjoint, given only access to an unknown channel. Chengkai Zhu, Ziao Tang, and Guocheng Zhen, all from the Thrust of Artificial Intelligence, Information Hub at The Hong Kong University of Science and Technology (Guangzhou), alongside Yinan Li, Ge Bai, and Xin Wang, have established a clear hierarchy of physical realisability for these transformations. Their work is significant because it demonstrates that while the transpose can be implemented exactly with a single query, the complex conjugate and adjoint transformations are fundamentally more difficult to achieve via completely positive supermaps. The team circumvented this impossibility for the complex conjugate by developing an optimal virtual protocol based on quasi-probability decomposition, and importantly, they propose a new protocol for estimating expectation values from the Petz recovery map with improved efficiency. This work establishes a clear hierarchy for physically implementing transformations of unknown quantum channels, specifically addressing the transpose, complex conjugate, and adjoint. Researchers demonstrate a probabilistic method for precisely implementing the transpose transformation with a single query to the unknown channel, a result with implications for quantum information processing. The study rigorously proves that direct physical implementation of the complex conjugate and adjoint transformations is impossible using conventional quantum supermaps, even with probabilistic approaches. To circumvent this fundamental limitation, the team designed a novel “virtual protocol” leveraging quasi-probability decomposition, effectively enabling estimation of these otherwise unrealizable transformations. This virtual protocol is proven optimal in terms of the diamond norm, a measure of map similarity. A key application of this research lies in improved
Quantum ZeitgeistLoading...0
quantum-computingFrom Quantum Threat to AI Exposure: Why Security Is Converging Faster Than Enterprises Expect
Insider Brief: For years, quantum security has been framed as a future problem: a day will come when the current generation of cryptography is broken by a quantum computer. The narrative has centered on cryptographic timelines, standards bodies, and long-term migration plans. At the same time, as artificial intelligence becomes embedded across enterprise workflows, the […]
Quantum DailyLoading...0