• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

量子抗性软件安全:量子计算时代基于模糊层次分析法的评估框架

Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.

作者信息

Almotiri Sultan H

机构信息

Cybersecurity Department, College of Computers, Umm Al-Qura University, Makkah City, Kingdom of Saudi Arabia.

出版信息

PLoS One. 2024 Dec 30;19(12):e0316274. doi: 10.1371/journal.pone.0316274. eCollection 2024.

DOI:10.1371/journal.pone.0316274
PMID:39775742
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11684851/
Abstract

The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives. We use a multi-criteria decision-making methodology in this work to evaluate the efficacy of quantum computing approaches in improving software security. As the number of electronic applications grows, software developers strive to produce more sophisticated and user-friendly alternatives. However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. The rapid development of quantum bits (qubits) regarded as basic quantum entities adds complexity and risk to the software security landscape. As a result, in the age of quantum computing, evaluating software security becomes not only necessary but also critical. To accomplish this objective, we propose the Fuzzy Analytic Hierarchy Process (F-AHP), a soft computing method, as a reliable tool for accomplishing this goal. Our research aims to prioritise security variables using quantum security criteria, providing an innovative viewpoint on software security evaluation in the quantum computing era.

摘要

量子计算的引入改变了信息技术的格局,带来了前所未有的机遇和重大挑战。随着量子技术不断发展,应对其对软件安全的影响已成为一个重要的研究领域。这种范式转变提供了一个前所未有的机会,可从一开始就加强软件安全,带来了大量新颖的选择。在这项工作中,我们使用多标准决策方法来评估量子计算方法在提高软件安全方面的功效。随着电子应用数量的增加,软件开发人员努力开发更复杂、更用户友好的应用程序。然而,在追求复杂性的过程中,可能会无意中引入漏洞,对软件安全构成重大威胁。我们的研究针对量子方法的五个主要组成部分来克服这些挑战:基于格的密码学、全同态算法、量子密钥分发、量子哈希函数和盲量子算法。作为基本量子实体的量子比特(qubit)的快速发展给软件安全格局增添了复杂性和风险。因此,在量子计算时代,评估软件安全不仅变得必要,而且至关重要。为实现这一目标,我们提出模糊层次分析法(F-AHP),一种软计算方法,作为实现这一目标的可靠工具。我们的研究旨在使用量子安全标准对安全变量进行优先级排序,为量子计算时代的软件安全评估提供一个创新的视角。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/f16664d04d18/pone.0316274.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/1a07fdaeba5f/pone.0316274.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/7f4a7a994261/pone.0316274.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/b801dfc1e667/pone.0316274.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/2a2f1299a7a3/pone.0316274.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/97dcce94a9fe/pone.0316274.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/77b69abee404/pone.0316274.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/cfee157d9d8a/pone.0316274.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/ca3aa8343ca0/pone.0316274.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/1aceb4de472d/pone.0316274.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/f16664d04d18/pone.0316274.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/1a07fdaeba5f/pone.0316274.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/7f4a7a994261/pone.0316274.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/b801dfc1e667/pone.0316274.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/2a2f1299a7a3/pone.0316274.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/97dcce94a9fe/pone.0316274.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/77b69abee404/pone.0316274.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/cfee157d9d8a/pone.0316274.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/ca3aa8343ca0/pone.0316274.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/1aceb4de472d/pone.0316274.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/9288/11684851/f16664d04d18/pone.0316274.g010.jpg

相似文献

1
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.量子抗性软件安全:量子计算时代基于模糊层次分析法的评估框架
PLoS One. 2024 Dec 30;19(12):e0316274. doi: 10.1371/journal.pone.0316274. eCollection 2024.
2
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.后量子密码密钥封装算法的弹性优化。
Sensors (Basel). 2023 Jun 6;23(12):5379. doi: 10.3390/s23125379.
3
Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS.基于模糊层次分析法-逼近理想解排序法对 Gen V 多向量攻击下的现代入侵检测方法进行评估。
PLoS One. 2024 May 14;19(5):e0302559. doi: 10.1371/journal.pone.0302559. eCollection 2024.
4
A novel image encryption scheme based on quantum dynamical spinning and rotations.一种基于量子动力学旋转和转动的新型图像加密方案。
PLoS One. 2018 Nov 19;13(11):e0206460. doi: 10.1371/journal.pone.0206460. eCollection 2018.
5
Securing healthcare information system through fuzzy based decision-making methodology.通过基于模糊决策的方法确保医疗保健信息系统的安全。
Health Informatics J. 2022 Oct-Dec;28(4):14604582221135420. doi: 10.1177/14604582221135420.
6
Prioritization of Information Security Controls through Fuzzy AHP for Cloud Computing Networks and Wireless Sensor Networks.通过模糊层次分析法对云计算网络和无线传感器网络的信息安全控制进行优先级排序。
Sensors (Basel). 2020 Feb 28;20(5):1310. doi: 10.3390/s20051310.
7
Enhancing biometric system selection: A hybrid AHP-neutrosophic fuzzy TOPSIS approach.增强生物识别系统选择:一种混合层次分析法- Neutrosophic 模糊 TOPSIS 方法。
BMC Res Notes. 2024 Sep 13;17(1):263. doi: 10.1186/s13104-024-06903-8.
8
A fuzzy TOPSIS based analysis toward selection of effective security requirements engineering approach for trustworthy healthcare software development.基于模糊 TOPSIS 的可信医疗软件开发有效安全需求工程方法选择分析。
BMC Med Inform Decis Mak. 2020 Sep 18;20(1):236. doi: 10.1186/s12911-020-01209-8.
9
Security durability assessment through fuzzy analytic hierarchy process.基于模糊层次分析法的安全性耐久性评估
PeerJ Comput Sci. 2019 Sep 2;5:e215. doi: 10.7717/peerj-cs.215. eCollection 2019.
10
Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.支持物联网的智能家居系统动态卸载中的混合计算框架安全
PeerJ Comput Sci. 2024 Aug 23;10:e2211. doi: 10.7717/peerj-cs.2211. eCollection 2024.

本文引用的文献

1
Mode-pairing quantum key distribution.模式配对量子密钥分发
Nat Commun. 2022 Jul 7;13(1):3903. doi: 10.1038/s41467-022-31534-7.
2
Quantum supremacy using a programmable superconducting processor.用量子计算优越性使用可编程超导处理器。
Nature. 2019 Oct;574(7779):505-510. doi: 10.1038/s41586-019-1666-5. Epub 2019 Oct 23.
3
Assessment of Service Quality in Teaching Hospitals of Yazd University of Medical Sciences: Using Multi-criteria Decision Making Techniques.亚兹德医科大学教学医院服务质量评估:运用多准则决策技术
Osong Public Health Res Perspect. 2016 Aug;7(4):239-47. doi: 10.1016/j.phrp.2016.05.001. Epub 2016 May 14.