Post Quantum Cryptography on Healthcare Security: Safeguarding Patient Data in Medical Systems

Authors

  • Shubham Kumar Sr Associate- Projects , Cognizant Technology Solutions MBP Tech Park, Nagavara, Bengaluru, Karnataka - 560045, Author

DOI:

https://doi.org/10.70454/JRIST.2025.10204

Keywords:

Post Quantum Cryptography, Healthcare Security, Quantum Key Distribution, Genetic Algorithms, Quantum Computing

Abstract

Quantum computers are capable of solving problems that classical computers cannot, particularly in the realm of cryptographic algorithms such as RSA, DSA, and ECC. Post quantum cryptography refers classical cryptographic algorithm that are designed to secure sensitive data. This research explores the application of post-quantum cryptographic techniques in healthcare systems, with a specific focus on integrating Quantum Key Distribution (QKD) with Genetic Algorithms (GA) for enhanced key optimization. As quantum computing advances, traditional cryptographic systems employed in health care are more and more vulnerable to being broken. Security of sensitive patient information—like electronic health records (EHRs), diagnostic data, and personally identifiable information— requires strong solutions that can handle future quantum attacks. Post-quantum cryptography (PQC) provides a hopeful way forward by employing quantum computer-resistant algorithms. This paper investigates the deployment of PQC methods—e.g., lattice-based, hash-based, and multivariate polynomial cryptography—inside healthcare systems to improve data confidentiality, integrity, and availability. It assesses the weaknesses of present encryption technologies and introduces PQC as a necessary update to protect patient information from sophisticated cyberattacks. The study also addresses the interoperability, computational overhead, and infrastructure readiness challenges of implementing PQC in healthcare. By implementing quantum-resilient cryptographic protocols, healthcare facilities are able to future-proof data protection practices and guarantee the safeguarding of patient data in an era governed by quantum computing.

References

[1] Balogun, A. Y. Post-Quantum Cryptography and Encryption Standards: Safeguarding Patient Data against Emerging Cyber Threats in Telemedicine.(2025)

[2] Natarajan, M., Bharathi, A., Varun, C. S., & Selvarajan, S. (2025). Quantum secure patient login credential system using blockchain for electronic health record sharing framework. Scientific Reports, 15(1), 4023.

[3] Meikandan, P. V., Upama, P. B., Rabbani, M., Ahamad, M. M., & Ahamed, S. I. (2025). Quantum computing for smart healthcare. In Sensor Networks for Smart Hospitals (pp. 525 534). Elsevier.

[4] Ovabor, K., Owolabi, O. O., Atkison, T., Iledare, A., & Ijeoma, C. (2025). Quantum-driven predictive cybersecurity framework for safeguarding Electronic Health Records (EHR) and enhancing patient data privacy in healthcare systems.

[5] Prajapat, S., Thakur, G., Kumar, P., Das, A. K., Jamal, S. S., & Susilo, W. (2025). Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications. Computers and Electrical Engineering, 123, 110028.

[6] Jhessim, E., & Anku, V. (2025). Quantum computing for cybersecurity in healthcare systems: A multi-modal approach.

[7] Mansoor, K., Afzal, M., Iqbal, W., & Abbas, Y. (2025). Securing the future: exploring post quantum cryptography for authentication and user privacy in IoT devices. Cluster Computing, 28(2), 93.

[8] Sonavane, A., Jaiswar, S., Mistry, M., Aylani, A., & Hajoary, D. (2025). Quantum machine learning models in healthcare: future trends and challenges in healthcare. Quantum Computing for Healthcare Data, 167-187.

[9] Singla, S., & Sodhi, N. S. (2025). Cryptography in practice. In Next Generation Mechanisms for Data Encryption (pp. 164-183). CRC Press.

[10] SaberiKamarposhti, M., Ng, K. W., Chua, F. F., Abdullah, J., Yadollahi, M., Moradi, M., & Ahmadpour, S. (2024). Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. Heliyon, 10(10).

[11] Soni, L., Chandra, H., & Gupta, D. S. (2024). Post‐quantum attack resilience blockchain assisted data authentication protocol for smart healthcare system. Software: Practice and Experience, 54(11), 2170-2190.

[12] Zhukabayeva, T., Ur Rehman, A., Tariq, N., & Benkhelifa, E. (2024). Hyperledger Fabric Based Post Quantum Cryptography Healthcare Application Using Discrete Event Simulation. IEEE Access.

[13] Alif, A., Hasan, K. F., Laeuchli, J., & Chowdhury, M. J. M. (2024). Quantum Threat in Healthcare IoT: Challenges and Mitigation Strategies. arXiv preprint arXiv:2412.05904.

[14] Ni, L., Gu, B., Liu, X., & Zhou, H. (2024, July). Post-Quantum Attribute-Based Authenticated Key Agreement Protocol for Smart Healthcare. In Proceedings of the 2024 6th International Conference on Big Data Engineering (pp. 33-38).

[15] SaberiKamarposhti, M., Ng, K. W., Chua, F. F., Abdullah, J., Yadollahi, M., Moradi, M., & Ahmadpour, S. (2024). Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data. Heliyon, 10(10).

[16] Boujelben, M., & Abid, M. (2024). Post-quantum security design for hierarchical healthcare systems based on lattices. The Journal of Supercomputing, 80(12), 17292-17313.

[17] Lo, C. K. M., Tan, S. F., & Chung, G. C. (2024, August). Enhanced Authentication Protocol for Securing Internet of Medical Things with Lightweight Post-Quantum Cryptography. In 2024 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (pp. 625-630). IEEE.

[18] Radanliev, P. (2024). Artificial intelligence and quantum cryptography. Journal of Analytical Science and Technology, 15(1), 4.

[19] Adeli, M., Bagheri, N., Maimani, H. R., Kumari, S., & Rodrigues, J. J. (2023). A post quantum compliant authentication scheme for IoT healthcare systems. IEEE Internet of Things Journal, 11(4), 6111-6118.

[20] Karthikeyan, D. (2023, December). Secure Medical Data Transmission In Iot Healthcare: Hybrid Encryption, Post-Quantum Cryptography, And Deep Learning-Enhanced Approach. In 2023 Global Conference on Information Technologies and Communications (GCITC) (pp. 1-12). IEEE.

[21] Yavuz, A. A., Darzi, S., & Nouma, S. E. (2023). Lightweight and Scalable Post-Quantum Authentication for Medical Internet of Things. arXiv preprint arXiv:2311.18674.

[22] Li, S., Chen, Y., Chen, L., Liao, J., Kuang, C., Li, K., ... & Xiong, N. (2023). Post-quantum security: Opportunities and challenges. Sensors, 23(21), 8744.

[23] Gawali, P. P., Mahalle, P. N., Shinde, G. R., Sable, N. P., Takale, D. G., & Barot, J. (2023, August). Quantum Key Distribution and Blockchain Based Secure Authentication in Medical Cyber-Physical Systems. In International Conference on ICT for Sustainable Development (pp. 607-622). Singapore: Springer Nature Singapore.

[24] Suganthi, P., & Kavitha, R. (2023). Secure and privacy in healthcare data using quaternion based neural network cryptography with the blockchain mechanism. IETE Journal of Research, 69(10), 6997-7014.

[25] Bavdekar, R., Chopde, E. J., Agrawal, A., Bhatia, A., & Tiwari, K. (2023, January). Post quantum cryptography: a review of techniques, challenges and standardizations. In 2023 International Conference on Information Networking (ICOIN) (pp. 146-151). IEEE.

[26] Xu, G., Mao, J., Sakk, E., & Wang, S. P. (2023, March). An overview of quantum-safe approaches: quantum key distribution and post-quantum cryptography. In 2023 57th Annual Conference on Information Sciences and Systems (CISS) (pp. 1-6). IEEE.

[27] Mantry, H., & Maheshwari, A. (2022). Quantum cryptography for securing personal health information in hospitals.

[28] Kalaivani, V. (2021). Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. Personal and ubiquitous computing, 27(3), 875.

[29] Malina, L., Dzurenda, P., Ricci, S., Hajny, J., Srivastava, G., Matulevičius, R., ... & Tang, Q. (2021). Post-quantum era privacy protection for intelligent infrastructures. IEEE Access, 9, 36038-36077.

[30] Cena, J., Oluwaseyi, J., & Emmanuel, O. K. (2021). Quantum-Enhanced Data Encryption for Protecting Microsphere-Based Drug Delivery Innovations.

[31] Kumar, M., & Pattnaik, P. (2020, September). Post quantum cryptography (pqc)-an overview. In 2020 IEEE High Performance Extreme Computing Conference (HPEC) (pp. 1-9). IEEE.

[32] Chen, A. C. (2024). Homomorphic Encryption Based on Lattice Post-Quantum Cryptography. arXiv preprint arXiv:2501.03249.

[33] Alif, A., Hasan, K. F., Laeuchli, J., & Chowdhury, M. J. M. (2024). Quantum Threat in Healthcare IoT: Challenges and Mitigation Strategies. arXiv preprint arXiv:2412.05904.

[34] Mamatha, G. S., Dimri, N., & Sinha, R. (2024). Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era. arXiv preprint arXiv:2403.11741.

Downloads

Published

2025-12-30

Issue

Section

Articles

How to Cite

Post Quantum Cryptography on Healthcare Security: Safeguarding Patient Data in Medical Systems. (2025). Journal of Recent Innovation in Science and Technology , 1(2), 36-53. https://doi.org/10.70454/JRIST.2025.10204