High-Dimensional Quantum Key Distribution for Secure Healthcare Communication Systems: Integrating Internet of Medical Things, Electronic Health Records, and Smart Medical Gate

Authors

  • Dior Masrane Reoukadji Advanced Systems Engineering Laboratory, Ibn Tofail University Kenitra, Morocco
  • Mekila Mbayam Olivier Euromed University of Fes, Morocco
  • Patrick Loola Bokonda Management Information Systems, The Haute Ecole de Commerce de Kinshasa (HEC-Kin), Kinshasa, Congo DR
  • Abdessalam Ait Madi Advanced Systems Engineering Laboratory, Ibn Tofail University Kenitra, Morocco

DOI:

https://doi.org/10.59796/jcst.V16N1.2026.153

Keywords:

IoMT, EHR, encryption, decryption, security, quantum key distribution, high-dimensional quantum key distribution, cybersecurity

Abstract

The emergence and advancement of technologies such as the Internet of Medical Things (IoMT), Electronic Health Records (EHR), and Smart Medical Gate (SMG) have remarkably changed patient care practices. With the digitization of healthcare services, concerns regarding data security have increased. These systems face increasing risks due to cyber threats and the advances of quantum computing technology. For instance, Peter Shor’s quantum algorithms are predicted to affect the integrity and confidentiality of sensitive medical data. This puts classical (non-quantum) cryptographic systems such as RSA (Ron Rivest, Adi Shamir, and Leonard Adleman) and ECC (Elliptic Curve Cryptography) at risk. This work proposes an integrated high-dimensional quantum key distribution (HD-QKD) infrastructure for secure medical data transmission across IoMT, EHR, and SMG ecosystems. It introduces a cloud-based Central EHR/Cloud Server for key management, along with edge Quantum Security Gateways. The system employs qudit encoding (d > 2) over a 50 km optical fiber link with 12-dB attenuation. Its edge-centric design ensures noise resilience and delivers a high information rate per photon. It also provides low-latency security against quantum threats while maintaining compatibility with existing fiber networks through wavelength division multiplexing. Simulations validate the system's potential, achieving secure key rates of 2.5 megabits per second between medical structures-double the rate of prior qubit-based Quantum Key Distribution (QKD) protocols-demonstrating superior scalability and performance for real-time healthcare applications.

References

Ahmed, S. F., Sharmin, S., Kuldeep, S. A., Lameesa, A., Alam, M. S. B., Liu, G., & Gandomi, A. H. (2025). Transformative impacts of the internet of medical things on modern healthcare. Results in Engineering, 25, Article 103787. https://doi.org/10.1016/j.rineng.2024.103787

Ajala, O. A., Arinze, C. A., Ofodile, O. C., Okoye, C. C., & Daraojimba, A. I. (2024). Exploring and reviewing the potential of quantum computing in enhancing cybersecurity encryption methods. Magna Scientia Advanced Research and Reviews, 10(01), 321-329. https://doi.org/10.30574/msarr.2024.10.1.0038

Amer, O., Garg, V., & Krawec, W. O. (2021). An introduction to practical quantum key distribution. IEEE Aerospace and Electronic Systems Magazine, 36(3), 30-55. https://doi.org/10.1109/MAES.2020.3015571

Anaya-Contreras, J. A., Moya-Cessa, H. M., & Zúñiga-Segundo, A. (2019). The von Neumann entropy for mixed states. Entropy, 21(1), Article 49. https://doi.org/10.3390/e21010049

Bahrami, A., Lord, A., & Spiller, T. (2020). Quantum key distribution integration with optical dense wavelength division multiplexing: A review. IET Quantum Communication, 1(1), 9-15. https://doi.org/10.1049/iet-qtc.2019.0005

Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 560(Part 1), 7–11. https://doi.org/10.1016/j.tcs.2014.05.025

Basha, C. B., Murugan, K., Suresh, T., SrirengaNachiyar, V., Athimoolam, S., & Pappa, C. K. (2024). Enhancing healthcare data security using quantum cryptography for efficient and robust encryption. Journal of Electrical Systems, 20(5s), 2070-2077. https://doi.org/10.52783/jes.2535

Busch, P., Heinonen, T., & Lahti, P. (2007). Heisenberg's uncertainty principle. Physics Reports, 452(6), 155-176. https://doi.org/10.1016/j.physrep.2007.05.006

Cao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S. X., & Hanzo, L. (2022). The evolution of quantum key distribution networks: On the road to the qinternet. IEEE Communications Surveys & Tutorials, 24(2), 839–894. https://doi.org/10.1109/COMST.2022.3144219

Chen, J. (2025). A review of quantum key distribution technology and its applications. Theoretical and Natural Science, 92, 101-107. https://doi.org/10.54254/2753-8818/2025.21793

Chen, X., Chen, L., & Yan, Y. (2022). Detecting a photon-number splitting attack in decoy-state measurement-device-independent quantum key distribution via statistical hypothesis testing. Entropy, 24(9), Article 1232. https://doi.org/10.3390/e24091232

de Andrade, J. S., Nobrega, K. Z., Silva, J. B. R., & Ramos, R. V. (2023). Eavesdropping detection without using error rate: The disentropy-based quantum key distribution. Retrieved from https://www.researchgate.net/profile/Rubens-Ramos-3/publication/375520109_Eavesdropping_detection_without_using_error_rate_The_disentropy-based_quantum_key_distribution/links/654d5c52ce88b87031d8bf09/Eavesdropping-detection-without-using-error-rate-The-disentropy-based-quantum-key-distribution.pdf

Dhinakaran, D., Srinivasan, L., Sankar, S. U., & Selvaraj, D. (2024). Quantum-based privacy-preserving techniques for secure and trustworthy internet of medical things an extensive analysis. Quantum Information and Computation, 24(3&4), 227-266. https://doi.org/10.26421/QIC24.3-4-3

Dior, M. R., Bokonda, P. L., Alihamidi, I., Sidibé, M., & Ait Madi, A. (2022). Smart medical devices to help patients and health workers: A survey [Conference presentation]. 2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), Fez, Morocco. https://doi.org/10.1109/ICECOCS55148.2022.9982963

Elmabrok, O., Razavi, M., Eltaif, T., & Alaghbari, K. A. (2024). High-dimensional quantum key distribution in quantum access networks. IEEE Photonics Journal, 16(3), 1-7. https://doi.org/10.1109/JPHOT.2024.3383780

Emmanni, P. S. (2023). The Impact of Quantum Computing on Cybersecurity. Journal of Mathematical & Computer Applications, 2(2), 1–4. https://doi.org/10.47363/JMCA/2023(2)140

Gaidash, A. A., Egorov, V. I., & Gleim, A. V. (2016). Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices. Journal of Physics: Conference Series, 735, Article 012072. https://doi.org/10.1088/1742-6596/735/1/012072

Girolami, D., & Anzà, F. (2021). Quantifying the difference between many-body quantum states. Physical Review Letters, 126(17), Article 170502. https://doi.org/10.1103/PhysRevLett.126.170502

Gitonga, C. K. (2025). The impact of quantum computing on cryptographic systems: Urgency of quantum-resistant algorithms and practical applications in cryptography. European Journal of Information Technologies and Computer Science, 5(1), 1-10. https://doi.org/10.24018/compute.2025.5.1.146

Huang, C., Wang, J., Wang, S., & Zhang, Y. (2023). Internet of medical things: A systematic review. Neurocomputing, 557, Article 126719. https://doi.org/10.1016/j.neucom.2023.126719

Jirakitpuwapat, W., Kumam, P., Deesuwan, T., & Dhompongsa, S. (2023). A quantum key distribution on qudits using quantum operators. Mathematical Methods in the Applied Sciences, 46(15), 15924-15939. https://doi.org/10.1002/mma.6988

Jowarder, R. A., & Jahan, S. (2024). Quantum computing in cyber security: Emerging threats, mitigation strategies, and future implications for data protection. World Journal of Advanced Engineering Technology and Sciences, 13(1), 330–339. https://doi.org/10.30574/wjaets.2024.13.1.0421

Kamran, M., Malik, T., & Khan, M. M. (2021). Evaluation of eavesdropping error-rates in higher-dimensional QKD system implemented using dynamic spatial modes. International Journal of Quantum Information, 19(06), Article 2150030. https://doi.org/10.1142/S0219749921500301

Kanitschar, F., & Huber, M. (2025). Practical framework for analyzing high-dimensional quantum key distribution setups. Physical Review Letters, 135(1), Article 010802. https://doi.org/10.1103/PhysRevLett.135.010802

Khan, M. M., Murphy, M., & Beige, A. (2009). High error-rate quantum key distribution for long-distance communication. New Journal of Physics, 11(6), Article 063043. https://doi.org/10.1088/1367-2630/11/6/063043

Khanal, A., & Kaur, N. (2025). The role of quantum computing in enhancing encryption security: A review. Cryptology ePrint Archive. Retrieved form https://eprint.iacr.org/2025/706

Kirwan Jr, A. D. (2004). Intrinsic photon entropy? The darkside of light. International Journal of Engineering Science, 42(7), 725-734. https://doi.org/10.1016/j.ijengsci.2003.09.005

Lambert, N., Giguère, E., Menczel, P., Li, B., Hopf, P., Suárez, G., ... & Nori, F. (2026). QuTiP 5: The quantum toolbox in Python. Physics Reports, 1153, 1–62. https://doi.org/10.1016/j.physrep.2025.10.001

Lee, C., Sohn, I., & Lee, W. (2022). Eavesdropping detection in BB84 quantum key distribution protocols. IEEE Transactions on Network and Service Management, 19(3), 2689-2701. https://doi.org/10.1109/TNSM.2022.3165202

Lizama-Perez, L. A., & López-Romero, J. M. (2025). Loop-back Quantum Key Distribution (QKD) for secure and scalable multi-node quantum networks. Symmetry, 17(4), Article 521. https://doi.org/10.3390/sym17040521

Miyadera, T., & Imai, H. (2009). No-cloning theorem on quantum logics. Journal of Mathematical Physics, 50(10), Article 102107. https://doi.org/10.1063/1.3245811

Moudgalya, S., Bernevig, B. A., & Regnault, N. (2022). Quantum many-body scars and Hilbert space fragmentation: A review of exact results. Reports on Progress in Physics, 85(8), Article 086501. https://doi.org/10.1088/1361-6633/ac73a0

Nielsen, M. A., & Chuang, I. L. (2010). Quantum computation and quantum information (10th anniversary ed.). Cambridge University Press.

NIST (2024). NIST Releases First 3 Finalized Post-Quantum Encryption Standards. Retrieved form https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards

Peelam, M. S., Sai, S., & Chamola, V. (2024). Explorative implementation of quantum key distribution algorithms for secure consumer electronics networks. IEEE Transactions on Consumer Electronics, 70(3), 5576-5584. https://doi.org/10.1109/TCE.2024.3413768

Potharaju, S., Tambe, S. N., Srikanth, N., Tirandasu, R. K., Amiripalli, S. S., & Mulla, R. (2025). Smartphone based real-time detection of postural and leg abnormalities using deep learning techniques. Journal of Current Science and Technology, 15(3), Article 112. https://doi.org/10.59796/jcst.V15N3.2025.112

Raheman, F. (2022). The future of cybersecurity in the age of quantum computers. Future Internet, 14(11), Article 335. https://doi.org/10.3390/fi14110335

Rahim, M. J., Rahim, M. I. I., Afroz, A., & Akinola, O. (2024). Cybersecurity threats in healthcare it: Challenges, risks, and mitigation strategies. Journal of Artificial Intelligence General science, 6(1), 438-462. https://doi.org/10.60087/jaigs.v6i1.268

Reoukadji, D. M., Bokonda, P. L., Ait Madi, A., & Alihamidi, I. (2024). Automatic Collection System for Medical Consultation [Conference presentation]. 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET). IEEE, FEZ, Morocco. https://doi.org/10.1109/IRASET60544.2024.10549351

Reoukadji, D. M., Bokonda, P. L., Ait Madi, A., & Alihamidi, I. (2024, May). Protecting patient privacy and data integrity with DAG technology for IoMT and EHR: A systematic review [Conference presentation]. 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), FEZ, Morocco. IEEE. https://doi.org/10.1109/IRASET60544.2024.10549660

Shobha, P., & Nalini, N. (2024). Genomic data fusion using Paillier cryptosystem. Journal of Current Science and Technology, 14(3), Article 57. https://doi.org/10.59796/jcst.V14N3.2024.57

Solaiman, S. (2025). Enhancing quantum key distribution security through hybrid protocol integration. Symmetry, 17(3), Article 458. https://doi.org/10.3390/sym17030458

Sykot, A., Azad, M. S., Tanha, W. R., Morshed, B. M., Shubha, S. E. U., & Mahdy, M. R. C. (2025). Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security. Alexandria Engineering Journal, 121, 167–182. https://doi.org/10.1016/j.aej.2025.02.056

Tambe-Jagtap, S. N. (2023). A survey of cryptographic algorithms in cybersecurity: From classical methods to quantum-resistant solutions. SHIFRA, 2023, 43–52. https://doi.org/10.70470/SHIFRA/2023/006

Tulyanitikul, B., & Panichkitkosolkul, W. (2025). Confidence intervals for the Zeghdoudi distribution parameter: Applications in precipitation and COVID-19 data analysis. Journal of Current Science and Technology, 15(1), Article 87. https://doi.org/10.59796/jcst.V15N1.2025.87

Ur Rasool, R., Ahmad, H. F., Rafique, W., Qayyum, A., Qadir, J., & Anwar, Z. (2023). Quantum computing for healthcare: A review. Future Internet, 15(3), Article 94. https://doi.org/10.3390/fi15030094

Wang, J., Wang, Q., Liu, J., & Lyu, D. (2022). Quantum orbital angular momentum in fibers: A review. AVS Quantum Science, 4(3), Article 031701. https://doi.org/10.1116/5.0101179

Wang, Y., Hu, Z., Sanders, B. C., & Kais, S. (2020). Qudits and high-dimensional quantum computing. Frontiers in Physics, 8, Article 589504. https://doi.org/10.3389/fphy.2020.589504

Xiao, F. (2023). Quantum X-entropy in generalized quantum evidence theory. Information Sciences, 643, Article 119177.

Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2), Article 025002. https://doi.org/10.1103/RevModPhys.92.025002

Yamagata, K. (2021). Maximum logarithmic derivative bound on quantum state estimation as a dual of the Holevo bound. Journal of Mathematical Physics, 62(6), Article 062203. https://doi.org/10.1063/5.0047496

Zhu, C. X., Chen, Z. Y., Li, Y., Wang, X. Z., Wang, C. Z., Zhu, Y. L., ... & Peng, C. Z. (2022). Experimental quantum key distribution with integrated silicon photonics and electronics. Physical Review Applied, 17(6), Article 064034. https://doi.org/10.1103/PhysRevApplied.17.064034

Downloads

Published

2025-12-20

How to Cite

Masrane Reoukadji, D., Mbayam Olivier, M., Loola Bokonda, P., & Ait Madi, A. (2025). High-Dimensional Quantum Key Distribution for Secure Healthcare Communication Systems: Integrating Internet of Medical Things, Electronic Health Records, and Smart Medical Gate. Journal of Current Science and Technology, 16(1), 153. https://doi.org/10.59796/jcst.V16N1.2026.153