Main Article Content
Abstract
Privacy-preserving data-sharing mechanisms traditionally rely on data anonymization techniques, which aim to dissociate individual records from their corresponding data subjects in order to transform sensitive information into a form that minimizes the risk of re-identification. In parallel, trust-broker models have emerged as an additional layer of protection, whereby authorized data providers disclose controlled contact information that enables potential data users to request access under predefined conditions determined by the data owner. In contemporary data-sharing environments, cryptography remains a fundamental pillar for ensuring confidentiality and integrity during data exchange. Cryptographic protection typically involves two operations: an encryption process, in which the sender transforms plaintext into ciphertext that is unintelligible to unauthorized entities, and a decryption process, in which only the intended recipient restores the ciphertext to its original form. Both operations rely on a cryptographic algorithm paired with one or more secret keys. Symmetric-key cryptography employs a single shared key for both encryption and decryption. In contrast, asymmetric cryptography uses a mathematically linked pair of keys, where one key is used for encryption and the other for decryption. When the encryption key is publicly available while the corresponding decryption key remains private, only the legitimate recipient holding the private key is capable of recovering the plaintext. This cryptographic structure forms the basis for securing data confidentiality against unauthorized access in both classical and quantum-aware communication systems.
Keywords
Article Details
Copyright (c) 2025 Zaid Ibrahim Rasool, Nisreen Saad Hadi (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
- S.-K. Liao et al., "Satellite-to-ground quantum key distribution," Nature, vol. 549, pp. 43-47, 2017, doi: https://doi.org/10.1038/nature23655.
- B. Li, G. Zhang, and C. Zhou, "Measurement-Device-Independent Quantum Key Distribution: Advances and Perspectives," Quantum Science and Technology, vol. 6, no. 3, p. 033003, 2021.
- R. Renner, "Security of quantum key distribution," International Journal of Quantum Information, vol. 6, no. 1, pp. 1-127, 2008, doi: https://doi.org/10.1142/S0219749908003256.
- F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, "Secure quantum key distribution with realistic devices," Reviews of modern physics, vol. 92, no. 2, p. 025002, 2020, doi: https://doi.org/10.1103/RevModPhys.92.025002.
- C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Transactions on Information theory, vol. 41, no. 6, pp. 1915-1923, 2002, doi: https://doi.org/10.1109/18.476316.
- V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, "The security of practical quantum key distribution," Reviews of Modern Physics, vol. 81, no. 3, pp. 1301-1350, 2009, doi: https://doi.org/10.1103/RevModPhys.81.1301.
- M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, "Overcoming the rate–distance limit of quantum key distribution without quantum repeaters," Nature, vol. 557, pp. 400-403, 2018, doi: https://doi.org/10.1038/s41586-018-0066-6.
- A. Boaron et al., "Secure quantum key distribution over 421 km of optical fiber," Physical Review Letters, vol. 121, no. 19, p. 190502, 2018, doi: https://doi.org/10.1103/PhysRevLett.121.190502.
- G. Zhang, J. Wang, and Y. Liu, "Large-Scale Quantum Key Distribution Network and Applications," Frontiers of Optoelectronics, vol. 12, no. 3, pp. 289–302, 2019.
- R. Kumar, A. Ciurana, and N. Walenta, "Versatile Quantum Key Distribution Protocol for Securing Long-Distance Communication," Quantum Information & Computation, vol. 19, no. 7-8, pp. 1071–1090, 2019.
- E. O. Kiktenko, A. S. Trushechkin, C. C. W. Lim, Y. V. Kurochkin, and A. K. Fedorov, "Symmetric blind information reconciliation for quantum key distribution," Physical Review Applied, vol. 8, no. 4, p. 044017, 2017, doi: Https://doi.org/10.1103/PhysRevApplied.8.044017.
- J. Wang, H. Wang, and G. Zhang, "Practical Applications of Quantum Cryptography," Applied Physics Reviews, vol. 8, no. 5, p. 051302, 2021.
- J. Yin et al., "Entanglement-based secure quantum cryptography over 1,120 kilometres," Nature, vol. 582, pp. 501-505, 2020, doi: https://doi.org/10.1038/s41586-020-2401-y.
- S. Wang et al., "Twin-field quantum key distribution over 830-km fibre," Nature photonics, vol. 16, pp. 154-161, 2022, doi: https://doi.org/10.1038/s41566-021-00928-2.
- B. Qi, Zhang, and X. Ma, "Quantum Cryptography and its Security in the Quantum Era," Quantum Information Processing, vol. 18, no. 5, p. 133, 2020.
- S. Wan, Z. Yu, and Z. Huang, "Quantum Privacy Amplification for Quantum Key Distribution," Journal of Quantum Information Science, vol. 11, no. 4, pp. 387–404, 2021.
- N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Reviews of Modern Physics, vol. 74, no. 1, pp. 145-195, 2002, doi: https://doi.org/10.1103/RevModPhys.74.145.
- H.-K. Lo, M. Curty, and K. Tamaki, "Secure quantum key distribution," Nature Photonics, vol. 8, pp. 595-604, 2014, doi: https://doi.org/10.1038/nphoton.2014.149.
- G. L. Long and X. S. Liu, "Theoretically efficient high-capacity quantum-key-distribution scheme," Physical Review A, vol. 65, p. 032302, 2002, doi: https://doi.org/10.1103/PhysRevA.65.032302.
- C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. K. Wootters, "Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels," Physical review letters, vol. 70, no. 13, p. 1895, 1993, doi: https://doi.org/10.1103/PhysRevLett.70.1895.
References
S.-K. Liao et al., "Satellite-to-ground quantum key distribution," Nature, vol. 549, pp. 43-47, 2017, doi: https://doi.org/10.1038/nature23655.
B. Li, G. Zhang, and C. Zhou, "Measurement-Device-Independent Quantum Key Distribution: Advances and Perspectives," Quantum Science and Technology, vol. 6, no. 3, p. 033003, 2021.
R. Renner, "Security of quantum key distribution," International Journal of Quantum Information, vol. 6, no. 1, pp. 1-127, 2008, doi: https://doi.org/10.1142/S0219749908003256.
F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, "Secure quantum key distribution with realistic devices," Reviews of modern physics, vol. 92, no. 2, p. 025002, 2020, doi: https://doi.org/10.1103/RevModPhys.92.025002.
C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, "Generalized privacy amplification," IEEE Transactions on Information theory, vol. 41, no. 6, pp. 1915-1923, 2002, doi: https://doi.org/10.1109/18.476316.
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, "The security of practical quantum key distribution," Reviews of Modern Physics, vol. 81, no. 3, pp. 1301-1350, 2009, doi: https://doi.org/10.1103/RevModPhys.81.1301.
M. Lucamarini, Z. L. Yuan, J. F. Dynes, and A. J. Shields, "Overcoming the rate–distance limit of quantum key distribution without quantum repeaters," Nature, vol. 557, pp. 400-403, 2018, doi: https://doi.org/10.1038/s41586-018-0066-6.
A. Boaron et al., "Secure quantum key distribution over 421 km of optical fiber," Physical Review Letters, vol. 121, no. 19, p. 190502, 2018, doi: https://doi.org/10.1103/PhysRevLett.121.190502.
G. Zhang, J. Wang, and Y. Liu, "Large-Scale Quantum Key Distribution Network and Applications," Frontiers of Optoelectronics, vol. 12, no. 3, pp. 289–302, 2019.
R. Kumar, A. Ciurana, and N. Walenta, "Versatile Quantum Key Distribution Protocol for Securing Long-Distance Communication," Quantum Information & Computation, vol. 19, no. 7-8, pp. 1071–1090, 2019.
E. O. Kiktenko, A. S. Trushechkin, C. C. W. Lim, Y. V. Kurochkin, and A. K. Fedorov, "Symmetric blind information reconciliation for quantum key distribution," Physical Review Applied, vol. 8, no. 4, p. 044017, 2017, doi: Https://doi.org/10.1103/PhysRevApplied.8.044017.
J. Wang, H. Wang, and G. Zhang, "Practical Applications of Quantum Cryptography," Applied Physics Reviews, vol. 8, no. 5, p. 051302, 2021.
J. Yin et al., "Entanglement-based secure quantum cryptography over 1,120 kilometres," Nature, vol. 582, pp. 501-505, 2020, doi: https://doi.org/10.1038/s41586-020-2401-y.
S. Wang et al., "Twin-field quantum key distribution over 830-km fibre," Nature photonics, vol. 16, pp. 154-161, 2022, doi: https://doi.org/10.1038/s41566-021-00928-2.
B. Qi, Zhang, and X. Ma, "Quantum Cryptography and its Security in the Quantum Era," Quantum Information Processing, vol. 18, no. 5, p. 133, 2020.
S. Wan, Z. Yu, and Z. Huang, "Quantum Privacy Amplification for Quantum Key Distribution," Journal of Quantum Information Science, vol. 11, no. 4, pp. 387–404, 2021.
N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography," Reviews of Modern Physics, vol. 74, no. 1, pp. 145-195, 2002, doi: https://doi.org/10.1103/RevModPhys.74.145.
H.-K. Lo, M. Curty, and K. Tamaki, "Secure quantum key distribution," Nature Photonics, vol. 8, pp. 595-604, 2014, doi: https://doi.org/10.1038/nphoton.2014.149.
G. L. Long and X. S. Liu, "Theoretically efficient high-capacity quantum-key-distribution scheme," Physical Review A, vol. 65, p. 032302, 2002, doi: https://doi.org/10.1103/PhysRevA.65.032302.
C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. K. Wootters, "Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels," Physical review letters, vol. 70, no. 13, p. 1895, 1993, doi: https://doi.org/10.1103/PhysRevLett.70.1895.
