KTN ran a series of workshops to identify markets and users for new capabilities emerging from the quantum programme.

KTN ran a series of workshops to identify markets and users for new capabilities emerging from the quantum programme, and to inform users of the new opportunities resulting from this.

The innovation workshop explored several promising commercial applications of QT within cyber security, plotting them on a 30-year roadmap, and highlighting early market applications.  Nearly thirty participants from different stakeholder groups, including potential end-users, QT developers from industry and academia, and other government QT stakeholders, spent a full day brainstorming 26 potential applications, and selecting nine promising applications for further consideration, including:

1. Secure computation and storage – enable secure information processing, storage and sharing, improving trust within complex systems that require authentication for defence, personal privacy protection, and banking, including blockchain methods;

2. Machine learning – enable improved applications of ‘machine learning’ for fraud/anomaly detection within cyber networks, financial flows, and social networks; intrusion detection across massive global networks; and better pattern recognition and simulation of complex systems;

3. Quantum key distribution (QKD) – enable secure fast and reliable communications between short-range, local and national networks;

4. Intelligence gathering, analysis and collaboration – enable more secure gathering, sharing and improved analysis of intelligence for law enforcement and national security;

5. Internet of Things (IoT) – improve authentication of mobile/internet of things (IoT) devices;

6. Different security models – address ‘different’ security models for personal communications; self-defending networks; autonomous vehicles; and globally-connected secure cloud solutions;

7. Fault management – improve the diagnosis and management of faults across massive interconnected systems, especially CNI and military;

8. Navigation and timing – enable secure navigation, without the global positioning systems (GPS) and provide better time-stamping of transactions;

9. High-grade cryptographic key generation – enable high-grade secure communications between government/corporate organisations, handling highly classified and sensitive data.

 

Read the full report here.

Share this article