High-Dimensional Quantum Key Distribution for Secure Healthcare Communication Systems: Integrating Internet of Medical Things, Electronic Health Records, and Smart Medical Gate
DOI:
https://doi.org/10.59796/jcst.V16N1.2026.153Keywords:
IoMT, EHR, encryption, decryption, security, quantum key distribution, high-dimensional quantum key distribution, cybersecurityAbstract
The emergence and advancement of technologies such as the Internet of Medical Things (IoMT), Electronic Health Records (EHR), and Smart Medical Gate (SMG) have remarkably changed patient care practices. With the digitization of healthcare services, concerns regarding data security have increased. These systems face increasing risks due to cyber threats and the advances of quantum computing technology. For instance, Peter Shor’s quantum algorithms are predicted to affect the integrity and confidentiality of sensitive medical data. This puts classical (non-quantum) cryptographic systems such as RSA (Ron Rivest, Adi Shamir, and Leonard Adleman) and ECC (Elliptic Curve Cryptography) at risk. This work proposes an integrated high-dimensional quantum key distribution (HD-QKD) infrastructure for secure medical data transmission across IoMT, EHR, and SMG ecosystems. It introduces a cloud-based Central EHR/Cloud Server for key management, along with edge Quantum Security Gateways. The system employs qudit encoding (d > 2) over a 50 km optical fiber link with 12-dB attenuation. Its edge-centric design ensures noise resilience and delivers a high information rate per photon. It also provides low-latency security against quantum threats while maintaining compatibility with existing fiber networks through wavelength division multiplexing. Simulations validate the system's potential, achieving secure key rates of 2.5 megabits per second between medical structures-double the rate of prior qubit-based Quantum Key Distribution (QKD) protocols-demonstrating superior scalability and performance for real-time healthcare applications.
References
Ahmed, S. F., Sharmin, S., Kuldeep, S. A., Lameesa, A., Alam, M. S. B., Liu, G., & Gandomi, A. H. (2025). Transformative impacts of the internet of medical things on modern healthcare. Results in Engineering, 25, Article 103787. https://doi.org/10.1016/j.rineng.2024.103787
Ajala, O. A., Arinze, C. A., Ofodile, O. C., Okoye, C. C., & Daraojimba, A. I. (2024). Exploring and reviewing the potential of quantum computing in enhancing cybersecurity encryption methods. Magna Scientia Advanced Research and Reviews, 10(01), 321-329. https://doi.org/10.30574/msarr.2024.10.1.0038
Amer, O., Garg, V., & Krawec, W. O. (2021). An introduction to practical quantum key distribution. IEEE Aerospace and Electronic Systems Magazine, 36(3), 30-55. https://doi.org/10.1109/MAES.2020.3015571
Anaya-Contreras, J. A., Moya-Cessa, H. M., & Zúñiga-Segundo, A. (2019). The von Neumann entropy for mixed states. Entropy, 21(1), Article 49. https://doi.org/10.3390/e21010049
Bahrami, A., Lord, A., & Spiller, T. (2020). Quantum key distribution integration with optical dense wavelength division multiplexing: A review. IET Quantum Communication, 1(1), 9-15. https://doi.org/10.1049/iet-qtc.2019.0005
Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 560(Part 1), 7–11. https://doi.org/10.1016/j.tcs.2014.05.025
Basha, C. B., Murugan, K., Suresh, T., SrirengaNachiyar, V., Athimoolam, S., & Pappa, C. K. (2024). Enhancing healthcare data security using quantum cryptography for efficient and robust encryption. Journal of Electrical Systems, 20(5s), 2070-2077. https://doi.org/10.52783/jes.2535
Busch, P., Heinonen, T., & Lahti, P. (2007). Heisenberg's uncertainty principle. Physics Reports, 452(6), 155-176. https://doi.org/10.1016/j.physrep.2007.05.006
Cao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S. X., & Hanzo, L. (2022). The evolution of quantum key distribution networks: On the road to the qinternet. IEEE Communications Surveys & Tutorials, 24(2), 839–894. https://doi.org/10.1109/COMST.2022.3144219
Chen, J. (2025). A review of quantum key distribution technology and its applications. Theoretical and Natural Science, 92, 101-107. https://doi.org/10.54254/2753-8818/2025.21793
Chen, X., Chen, L., & Yan, Y. (2022). Detecting a photon-number splitting attack in decoy-state measurement-device-independent quantum key distribution via statistical hypothesis testing. Entropy, 24(9), Article 1232. https://doi.org/10.3390/e24091232
de Andrade, J. S., Nobrega, K. Z., Silva, J. B. R., & Ramos, R. V. (2023). Eavesdropping detection without using error rate: The disentropy-based quantum key distribution. Retrieved from https://www.researchgate.net/profile/Rubens-Ramos-3/publication/375520109_Eavesdropping_detection_without_using_error_rate_The_disentropy-based_quantum_key_distribution/links/654d5c52ce88b87031d8bf09/Eavesdropping-detection-without-using-error-rate-The-disentropy-based-quantum-key-distribution.pdf
Dhinakaran, D., Srinivasan, L., Sankar, S. U., & Selvaraj, D. (2024). Quantum-based privacy-preserving techniques for secure and trustworthy internet of medical things an extensive analysis. Quantum Information and Computation, 24(3&4), 227-266. https://doi.org/10.26421/QIC24.3-4-3
Dior, M. R., Bokonda, P. L., Alihamidi, I., Sidibé, M., & Ait Madi, A. (2022). Smart medical devices to help patients and health workers: A survey [Conference presentation]. 2022 IEEE 3rd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), Fez, Morocco. https://doi.org/10.1109/ICECOCS55148.2022.9982963
Elmabrok, O., Razavi, M., Eltaif, T., & Alaghbari, K. A. (2024). High-dimensional quantum key distribution in quantum access networks. IEEE Photonics Journal, 16(3), 1-7. https://doi.org/10.1109/JPHOT.2024.3383780
Emmanni, P. S. (2023). The Impact of Quantum Computing on Cybersecurity. Journal of Mathematical & Computer Applications, 2(2), 1–4. https://doi.org/10.47363/JMCA/2023(2)140
Gaidash, A. A., Egorov, V. I., & Gleim, A. V. (2016). Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices. Journal of Physics: Conference Series, 735, Article 012072. https://doi.org/10.1088/1742-6596/735/1/012072
Girolami, D., & Anzà, F. (2021). Quantifying the difference between many-body quantum states. Physical Review Letters, 126(17), Article 170502. https://doi.org/10.1103/PhysRevLett.126.170502
Gitonga, C. K. (2025). The impact of quantum computing on cryptographic systems: Urgency of quantum-resistant algorithms and practical applications in cryptography. European Journal of Information Technologies and Computer Science, 5(1), 1-10. https://doi.org/10.24018/compute.2025.5.1.146
Huang, C., Wang, J., Wang, S., & Zhang, Y. (2023). Internet of medical things: A systematic review. Neurocomputing, 557, Article 126719. https://doi.org/10.1016/j.neucom.2023.126719
Jirakitpuwapat, W., Kumam, P., Deesuwan, T., & Dhompongsa, S. (2023). A quantum key distribution on qudits using quantum operators. Mathematical Methods in the Applied Sciences, 46(15), 15924-15939. https://doi.org/10.1002/mma.6988
Jowarder, R. A., & Jahan, S. (2024). Quantum computing in cyber security: Emerging threats, mitigation strategies, and future implications for data protection. World Journal of Advanced Engineering Technology and Sciences, 13(1), 330–339. https://doi.org/10.30574/wjaets.2024.13.1.0421
Kamran, M., Malik, T., & Khan, M. M. (2021). Evaluation of eavesdropping error-rates in higher-dimensional QKD system implemented using dynamic spatial modes. International Journal of Quantum Information, 19(06), Article 2150030. https://doi.org/10.1142/S0219749921500301
Kanitschar, F., & Huber, M. (2025). Practical framework for analyzing high-dimensional quantum key distribution setups. Physical Review Letters, 135(1), Article 010802. https://doi.org/10.1103/PhysRevLett.135.010802
Khan, M. M., Murphy, M., & Beige, A. (2009). High error-rate quantum key distribution for long-distance communication. New Journal of Physics, 11(6), Article 063043. https://doi.org/10.1088/1367-2630/11/6/063043
Khanal, A., & Kaur, N. (2025). The role of quantum computing in enhancing encryption security: A review. Cryptology ePrint Archive. Retrieved form https://eprint.iacr.org/2025/706
Kirwan Jr, A. D. (2004). Intrinsic photon entropy? The darkside of light. International Journal of Engineering Science, 42(7), 725-734. https://doi.org/10.1016/j.ijengsci.2003.09.005
Lambert, N., Giguère, E., Menczel, P., Li, B., Hopf, P., Suárez, G., ... & Nori, F. (2026). QuTiP 5: The quantum toolbox in Python. Physics Reports, 1153, 1–62. https://doi.org/10.1016/j.physrep.2025.10.001
Lee, C., Sohn, I., & Lee, W. (2022). Eavesdropping detection in BB84 quantum key distribution protocols. IEEE Transactions on Network and Service Management, 19(3), 2689-2701. https://doi.org/10.1109/TNSM.2022.3165202
Lizama-Perez, L. A., & López-Romero, J. M. (2025). Loop-back Quantum Key Distribution (QKD) for secure and scalable multi-node quantum networks. Symmetry, 17(4), Article 521. https://doi.org/10.3390/sym17040521
Miyadera, T., & Imai, H. (2009). No-cloning theorem on quantum logics. Journal of Mathematical Physics, 50(10), Article 102107. https://doi.org/10.1063/1.3245811
Moudgalya, S., Bernevig, B. A., & Regnault, N. (2022). Quantum many-body scars and Hilbert space fragmentation: A review of exact results. Reports on Progress in Physics, 85(8), Article 086501. https://doi.org/10.1088/1361-6633/ac73a0
Nielsen, M. A., & Chuang, I. L. (2010). Quantum computation and quantum information (10th anniversary ed.). Cambridge University Press.
NIST (2024). NIST Releases First 3 Finalized Post-Quantum Encryption Standards. Retrieved form https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards
Peelam, M. S., Sai, S., & Chamola, V. (2024). Explorative implementation of quantum key distribution algorithms for secure consumer electronics networks. IEEE Transactions on Consumer Electronics, 70(3), 5576-5584. https://doi.org/10.1109/TCE.2024.3413768
Potharaju, S., Tambe, S. N., Srikanth, N., Tirandasu, R. K., Amiripalli, S. S., & Mulla, R. (2025). Smartphone based real-time detection of postural and leg abnormalities using deep learning techniques. Journal of Current Science and Technology, 15(3), Article 112. https://doi.org/10.59796/jcst.V15N3.2025.112
Raheman, F. (2022). The future of cybersecurity in the age of quantum computers. Future Internet, 14(11), Article 335. https://doi.org/10.3390/fi14110335
Rahim, M. J., Rahim, M. I. I., Afroz, A., & Akinola, O. (2024). Cybersecurity threats in healthcare it: Challenges, risks, and mitigation strategies. Journal of Artificial Intelligence General science, 6(1), 438-462. https://doi.org/10.60087/jaigs.v6i1.268
Reoukadji, D. M., Bokonda, P. L., Ait Madi, A., & Alihamidi, I. (2024). Automatic Collection System for Medical Consultation [Conference presentation]. 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET). IEEE, FEZ, Morocco. https://doi.org/10.1109/IRASET60544.2024.10549351
Reoukadji, D. M., Bokonda, P. L., Ait Madi, A., & Alihamidi, I. (2024, May). Protecting patient privacy and data integrity with DAG technology for IoMT and EHR: A systematic review [Conference presentation]. 2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET), FEZ, Morocco. IEEE. https://doi.org/10.1109/IRASET60544.2024.10549660
Shobha, P., & Nalini, N. (2024). Genomic data fusion using Paillier cryptosystem. Journal of Current Science and Technology, 14(3), Article 57. https://doi.org/10.59796/jcst.V14N3.2024.57
Solaiman, S. (2025). Enhancing quantum key distribution security through hybrid protocol integration. Symmetry, 17(3), Article 458. https://doi.org/10.3390/sym17030458
Sykot, A., Azad, M. S., Tanha, W. R., Morshed, B. M., Shubha, S. E. U., & Mahdy, M. R. C. (2025). Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security. Alexandria Engineering Journal, 121, 167–182. https://doi.org/10.1016/j.aej.2025.02.056
Tambe-Jagtap, S. N. (2023). A survey of cryptographic algorithms in cybersecurity: From classical methods to quantum-resistant solutions. SHIFRA, 2023, 43–52. https://doi.org/10.70470/SHIFRA/2023/006
Tulyanitikul, B., & Panichkitkosolkul, W. (2025). Confidence intervals for the Zeghdoudi distribution parameter: Applications in precipitation and COVID-19 data analysis. Journal of Current Science and Technology, 15(1), Article 87. https://doi.org/10.59796/jcst.V15N1.2025.87
Ur Rasool, R., Ahmad, H. F., Rafique, W., Qayyum, A., Qadir, J., & Anwar, Z. (2023). Quantum computing for healthcare: A review. Future Internet, 15(3), Article 94. https://doi.org/10.3390/fi15030094
Wang, J., Wang, Q., Liu, J., & Lyu, D. (2022). Quantum orbital angular momentum in fibers: A review. AVS Quantum Science, 4(3), Article 031701. https://doi.org/10.1116/5.0101179
Wang, Y., Hu, Z., Sanders, B. C., & Kais, S. (2020). Qudits and high-dimensional quantum computing. Frontiers in Physics, 8, Article 589504. https://doi.org/10.3389/fphy.2020.589504
Xiao, F. (2023). Quantum X-entropy in generalized quantum evidence theory. Information Sciences, 643, Article 119177.
Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2), Article 025002. https://doi.org/10.1103/RevModPhys.92.025002
Yamagata, K. (2021). Maximum logarithmic derivative bound on quantum state estimation as a dual of the Holevo bound. Journal of Mathematical Physics, 62(6), Article 062203. https://doi.org/10.1063/5.0047496
Zhu, C. X., Chen, Z. Y., Li, Y., Wang, X. Z., Wang, C. Z., Zhu, Y. L., ... & Peng, C. Z. (2022). Experimental quantum key distribution with integrated silicon photonics and electronics. Physical Review Applied, 17(6), Article 064034. https://doi.org/10.1103/PhysRevApplied.17.064034
Downloads
Published
How to Cite
Issue
Section
Categories
- Engineering and Technology
- Public health
- Computing (Computer Science; Computer Engineering) > Embeded Systems
- Computing (Computer Science; Computer Engineering) > Internet of Things (IOT)
- Computing (Computer Science; Computer Engineering) > IT Security and Privacy
- Computing (Computer Science; Computer Engineering) > Quantum Computing
- Computing (Computer Science; Computer Engineering) > Wireless and Mobile Computing
License
Copyright (c) 2025 Journal of Current Science and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.



