Next Article in Journal
When Operation Technology Meets Information Technology: Challenges and Opportunities
Next Article in Special Issue
Internet of Robotic Things (IoRT) and Metaheuristic Optimization Techniques Applied for Wheel-Legged Robot
Previous Article in Journal
Data Protection and Multi-Database Data-Driven Models
Previous Article in Special Issue
Clinical Screening Prediction in the Portuguese National Health Service: Data Analysis, Machine Learning Models, Explainability and Meta-Evaluation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Quantum Computing for Healthcare: A Review

1
College of Engineering and Science, Victoria University, Melbourne, VIC 8001, Australia
2
Computer Science Department, College of Computer Sciences and Information Technology (CCSIT), King Faisal University, P.O. Box 400, Al-Ahsa 31982, Saudi Arabia
3
Department of Electrical and Software Engineering, University of Calgary, Calgary, AB T2N 1N4, Canada
4
Department of Computer Science, Information Technology University (ITU), Lahore 40050, Pakistan
5
Department of Computer Science and Engineering, College of Engineering, Qatar University, Doha 2713, Qatar
6
Department of Computer Science, Sheila and Robert Challey Institute for Global Innovation and Growth, North Dakota State University (NDSU), Fargo, ND 58108, USA
*
Author to whom correspondence should be addressed.
Future Internet 2023, 15(3), 94; https://doi.org/10.3390/fi15030094
Submission received: 28 January 2023 / Revised: 23 February 2023 / Accepted: 24 February 2023 / Published: 27 February 2023
(This article belongs to the Special Issue Internet of Things (IoT) for Smart Living and Public Health)

Abstract

:
In recent years, the interdisciplinary field of quantum computing has rapidly developed and garnered substantial interest from both academia and industry due to its ability to process information in fundamentally different ways, leading to hitherto unattainable computational capabilities. However, despite its potential, the full extent of quantum computing’s impact on healthcare remains largely unexplored. This survey paper presents the first systematic analysis of the various capabilities of quantum computing in enhancing healthcare systems, with a focus on its potential to revolutionize compute-intensive healthcare tasks such as drug discovery, personalized medicine, DNA sequencing, medical imaging, and operational optimization. Through a comprehensive analysis of existing literature, we have developed taxonomies across different dimensions, including background and enabling technologies, applications, requirements, architectures, security, open issues, and future research directions, providing a panoramic view of the quantum computing paradigm for healthcare. Our survey aims to aid both new and experienced researchers in quantum computing and healthcare by helping them understand the current research landscape, identifying potential opportunities and challenges, and making informed decisions when designing new architectures and applications for quantum computing in healthcare.

1. Introduction

In recent years, advances in computing technology have made processing large-scale data feasible. Quantum computing (QC) has shown the potential in solving complex tasks much faster than classical computers. Healthcare, in particular, will benefit from QC as the volume and diversity of health data increase exponentially. For instance, during the COVID-19 pandemic, novel virus variants emerged, challenging healthcare professionals who were genome sequencing the virus using traditional computing systems. This highlights the need to explore new ways to speed up healthcare analysis and monitoring efforts to efficiently handle future pandemic situations. QC promises a revolutionary approach to improving healthcare technologies. While previous research has demonstrated how QC can introduce new possibilities for complex healthcare computations, the existing literature on QC for healthcare is largely unstructured, and the existing papers on QC for healthcare that have been proposed only cover a small proportion of disruptive use cases. This research provides the first systematic analysis of QC in healthcare. The following sections introduce QC, its use in healthcare, and our motivation for this survey in light of the limitations of existing surveys and their contributions.

1.1. Introduction to Quantum Computing

QC is underpinned by quantum mechanics, and hence often explained through concepts of superposition, interference, and entanglement. In quantum physics, a single bit can be in more than one state simultaneously (i.e., 1 and 0) at a given time, and a QC system leverages this very behavior and recognizes it as a qubit (Quantum bit). Having roots in quantum physics, QC has the potential of becoming the fabric of tomorrow’s highly powerful computing infrastructures, enabling the processing of gigantic amounts of data in real time. Quantum computing has recently seen a surge of interest from researchers who are looking to take computing prowess to the next level as we move past the era of Moore’s law, however, there is a need for an in-depth systematic survey to explain possibilities, pitfalls, and challenges.

1.2. Quantum Computing for Healthcare

QC is particularly well-suited to numerous compute-intensive applications of healthcare [1], especially in the current highly connected Internet of Things (IoT) digital healthcare paradigm [2,3], which encompasses interconnected medical devices (such as medical sensors) that may be connected to the Internet or the cloud. The massive increase in computational capacity is not only beneficial for healthcare IoT but can allow quantum computers to enable fundamental breakthroughs in this domain. When we leap from bits to qubits, it could improve healthcare pharmaceutical research [4], which includes analyzing the folding of proteins, determining how molecular structures, for instance, drugs and enzymes, fit together [5], determining strengths of binding interactions between a single biomolecule, for example, protein or DNA, and its ligand/binding partner such as a drug or inhibitor [6], and accelerating the process of clinical trials [7]. A few potential applications are briefly described next for an illustration. A quantum computer can perform extremely fast DNA sequencing, which opens the possibility for personalized medicine. It can enable the development of new therapies and medicines through detailed modeling. Quantum computers have the potential to create efficient imaging systems that can provide clinicians with enhanced fine-grained clarity in real time. Moreover, it can solve complex optimization problems involved in devising an optimal radiation plan that is targeted at killing cancerous cells without damaging the surrounding healthy tissues. QC is set to enable the study of molecular interactions at the lowest possible level, paving the pathway to drug discovery and medical research. Whole-genome sequencing is a time-demanding task, but with the help of qubits, whole-genome sequencing and analytics could be implemented in a limited amount of time. QC can revolutionize the healthcare system through modern ways of enabling on-demand computing, redefining security for medical data, predicting chronic diseases, and accurate drug discoveries.

1.3. Comparison with Related Surveys

As far as we understand, this is the first survey on quantum computing that considers security and privacy implications, applications and architecture, and quantum requirements and machine learning aspects of healthcare. There are some other surveys that consider a subset of these dimensions that merit discussion. Table 1 presents a comparative analysis of these surveys with the current work. Gyongyosi et al. [8] discuss computational limitations of traditional systems and survey superposition and quantum-entanglement-based solutions to overcome these challenges. However, this survey encompasses complex quantum mechanics without discussing its general-purpose implications for society. Fernández et al. [9] survey resource bottlenecks of IoT and discuss a solution based on quantum cryptography. They develop an edge-computing-based security solution for IoT, where management software is used to deal with security vulnerabilities. However, this is a domain-specific survey that only deals with security challenges. Gyongyosi et al. [10] discuss quantum channel capacities, which ease the quantum computing implementation for information processing. In this approach, conventional information processing is achieved through quantum channel capacities. The survey literature lists a few other quantum-computing works, including quantum learning theories [11,12], quantum information security [13,14,15,16], quantum machine learning (ML) [17,18], and quantum data analytics [19,20]. These surveys are limited in their coverage of quantum computing applications. Some of the existing works analyze the impacts of quantum computing implementation. Huang et al. [21] analyze the implementation vulnerabilities in quantum cryptography systems. Botsinis et al. [22] discuss quantum search algorithms for wireless communication. Cuomo et al. [23] survey existing challenges and solutions for quantum distributed solutions and proposed a layered abstraction to deal with communication challenges. Many of these surveys are only tangentially related to healthcare or do not consider healthcare at all.
Table 1. A comparison of this survey with related works.
Table 1. A comparison of this survey with related works.
ReferencesYearHealthcare FocusSecurityPrivacyArchitecturesQuantum RequirementsMachine/Deep LearningApplications
Gyongyosi et al. [8]2019
Fernandez et al. [9]2019
Gyongyosi et al. [10]2018
Arunachalam et al. [11]2017
Li et al. [12]2020
Shaikh et al. [19]2016
Egger et al. [24]2020
Savchuk et al. [25]2019
Zhang et al. [13]2019
Mcgeoch et al. [26]2019
Shanon et al. [14]2020
Duan et al. [27]2020
Preskill et al. [28]2018
Roetteler et al. [15]2018
Upretyet al. [20]2020
Rowell et al. [29]2018
Padamvathi et al. [16]2016
Nejatollahi et al. [30]2019
Cuomo et al. [23]2020
Fingeruth et al. [31]2018
Huang et al. [21]2018
Botsinis et al. [22]2018
Ramezani et al. [17]2020
Bharti et al. [18]2020
Abbott et al. [32]2021
Kumar et al. [33]2021
Olgiati et al. [34]2021
Gupta et al. [35]2022
Kumar et al. [36]2022
Our Survey2022

1.4. Contributions and Organization

This survey systematically presents the evolution of quantum computing and its enabling technologies, explores the core application areas, and categorizes requirements for its implementation in high-performance healthcare systems, along with highlighting security implications. In summary, the salient contributions of this survey are as follows:
  • We present the first comprehensive review of quantum computing technologies for healthcare, covering its motivation, requirements, applications, challenges, architectures, and open research issues.
  • We discuss the enabling technologies of quantum computing that act as building blocks for the implementation of quantum healthcare service provisioning.
  • We discuss the core application areas of quantum computing and analyzed the critical importance of quantum computing in healthcare systems.
  • We review the available literature on quantum computing and its inclination toward the development of future-generation healthcare systems.
  • We discuss key requirements of quantum computing systems for the successful implementation of large-scale healthcare services provisioning and the security implications involved.
  • We discuss current challenges, their causes, and future research directions for an efficient implementation of quantum healthcare systems.
This paper is organized as follows. Table 2 shows acronyms and their definition. Section 2 discusses enabling technologies of quantum computing systems. Section 3 outlines the application areas of quantum computing. Section 4 discusses the key requirements of quantum computing for its successful implementation for large-scale healthcare services provisioning. Section 5 provides a taxonomy and description of quantum computing architectural approaches for healthcare architectures. Section 6 discusses the security architectures of the current quantum computing systems. Section 7 discusses current open issues, their causes, and promising directions for future research. Finally, Section 8 concludes the paper.

2. Quantum Computing: History, Background, and Enabling Technologies

In this section, we present enabling technologies of quantum computing that support the implementation of modern quantum computing systems. Specifically, we categorize quantum-computing-enabling technologies in different domains, i.e., hardware structure, control processor plane, quantum data plane, host processor, quantum control and measurement plane, and qubit technologies.

2.1. Quantum Computing vs. Classical Computing

We refer the reader to Figure 1 for a differentiation of quantum computing paradigms with classical computing approaches in terms of their strengths, weaknesses, and applicability. Unlike conventional computers that operate in terms of bits, the basic units of operation in a quantum computer are referred to as quantum bits, or “qubits", that possess two states or levels, i.e., they can represent a single bit in both ‘1’ and ‘0’ simultaneously.
Quantum physical systems, which leverage, for example, the orientation of a photon or spin of an electron, are used to create qubits. We note that quantum computers can come in various varieties, including one-qubit computers [37], two-qubit computers [38], and higher-qubit quantum computers. Key advancements in quantum computing were made earlier in the year 2000 when the very first 5-qubit quantum computer was invented [39]. Since then, many important advancements have been made so far, and the best-known quantum computer of the current era is IBM’s newest quantum-computing chip that contains 433 qubits [40]. However, the literature suggests that the minimum number of qubits to realize quantum supremacy is 50 [41]. Quantum supremacy is defined as the ability of a programmable quantum device, which is capable of solving a problem that cannot be solved by classical computers in a feasible amount of time [42]. The behavior of qubits relates directly to the behavior of a spinning electron orbiting an atom’s nucleus, which can demonstrate three key quantum properties: quantum superposition, quantum entanglement, and quantum interference [43].
  • Quantum superposition refers to the fact that a spinning electron’s position cannot be pinpointed to any specific location at any time. On the contrary, it is calculated as a probability distribution in which the electron can exist at all locations at all times with varying probabilities. Quantum computers rely on quantum superposition, in that they use a group of qubits for calculations and, while classical computer bits may take on only states 0 and 1, qubits can be either a 0 or 1, or a linear combination of both. These linear combinations are termed superposition states. Since a qubit can exist in two states, the computing capacity of a qubit quantum computer grows exponentially in the form of 2 q .
  • Quantum entanglement takes place in a highly intertwined pair of systems, such that knowledge of anyone immediately provides information about the other, regardless of the distance between them. This nonintuitive fact was described by Einstein as “spooky action at a distance”, because it went against the rule that information could never be communicated beyond light speed. Quantum entanglement in physics is when two systems such as photons or electrons are so highly interlinked that obtaining information about one’s state (for example, the direction of one electron’s upward spin) would provide instantaneous information about the other’s state, such as, for example, the direction of the second electron’s downward spin, no matter how far apart they are. Modifying one entangled qubit’s state therefore immediately perturbs the paired qubit’s state in quantum computers. Thereby, entanglement leads to the increased computational efficiency of quantum computers. Since processing one qubit provides knowledge about many qubits, doubling the number of qubits does not necessarily increase the number of entangled qubits. Quantum entanglement is therefore necessary for the exponentially faster performance of a quantum algorithm as compared with its classical counterpart.
  • Quantum interference occurs because, at the subatomic scale, particles have wavelike properties. These wavelike properties are often attributed to location, for example, where around a nucleus an electron might be. Two in-phase waves, which is to say they peak at the same time, constructively interfere, and the resulting wave peaks twice as high. Two waves that are out-of-phase, on the other hand, peak at opposite times and destructively interfere; the resulting wave is completely flat. All other phase differences will have results somewhere in between, with either a higher peak for constructive interference or a lower peak for destructive interference. In quantum computing, interference is used to affect probability amplitudes when measuring the energy level of qubits.
Quantum computing has applications in various disciplines, including communication, image processing, information theory, electronics, cryptography, etc. Practical quantum algorithms are emerging with the increasing availability of quantum computers. Quantum computing possesses a significant potential to bring a revolution to several verticals, such as financial modeling, weather precision, physics, and transportation (an illustration of salient verticals is presented in Figure 2). Quantum computing has already been used to improve different nonquantum algorithms being used in the aforementioned verticals. Moreover, the renewed efforts to envision physically scalable quantum computing hardware have promoted the concept that a fully envisioned quantum paradigm will be used to solve numerous computing challenges considering its intractable nature with the available computing resources.

2.2. Brief History of Quantum Computing

The term quantum computing was first coined by Richard Feynman in 1981 and has since had a rich intellectual history. Figure 3 depicts a timeline of major events in this area. Noteworthy in the timeline is that while there were somewhat larger gaps between events earlier on, recently, the field has started experiencing a more rapid series of developments. For example service providers have begun offering niche quantum computing products, as well as quantum cloud computing services (e.g., Amazon Braket). Recently, Google’s 54-qubit computer accomplished a task in merely 200 s that was estimated to take around over 10,000 years on a classical computing system [44]. Nevertheless, quantum computing is still in its infancy stages, and it will take some time before quantum computing chips reach desktops or handhelds. An important factor inhibiting the commoditization of quantum computing is the fact that controlling quantum effects is a delicate process, and any noise (e.g., stray heat) can flip 1s or 0s and disrupt quantum effects, such as superposition. This requires qubits to be fully operated under special conditions, such as very cold temperatures, sometimes very close to absolute zero. This also motivates research exploring fault-tolerant quantum computing [45]. Considering this fast-paced development of quantum computing, this is an opportune time for healthcare researchers and practitioners to investigate its benefits to healthcare systems.

2.3. Hardware Structure

Since quantum computer applications often deal with user data and network components that are part of traditional computing systems, a quantum computing system should ideally be capable of interfacing with and efficiently utilizing traditional computing systems. Qubits systems require carefully orchestrated control for efficient performance; this can be managed using conventional computing principles. An analogue gate-based quantum computing system could be mapped into various layers for building a basic understanding of its hardware components. These layers are responsible for performing different quantum operations and consist of the quantum control plane, measurement plane, and data plane. The control processor plane uses measurement outcomes to determine the sequence of operations and measurements that are required by the algorithm. It also supports the host processor, which looks after network access, user interfaces, and storage arrays.

2.4. Quantum Data Plane

It is the main component of the quantum computing ecosystem. It broadly consists of physical qubits and the structures required to bring them into an organized system. It contains support circuits required to identify the state of qubits and perform gated operations. It does this for the gate-based system or controlling “the Hamiltonian for an analog computer” [46]. Control signals that are sent towards selected qubits set the Hamiltonian path, thereby controlling the gate operations for a digital quantum computer. For gate-based systems, a configurable network is provided to support the interaction of qubits, while analog systems depend on richer interactions in qubits enabled through this layer. Strong isolation is required for high qubit fidelity. It limits connectivity as each qubit may not be able to directly interact with every other qubit. Therefore, we need to map computation to some specific architectural constraints provided by this layer. This shows that connection and operation fidelity are prime characteristics of the quantum data layer.
In conventional computing systems, the control and data plane are based on silicon technology. Control of the quantum data plane needs different technology and is performed externally by separating control and measurement layers. Analog qubit information should be sent to the specific qubits. Control information is transmitted through (data plane) wires electronically, in some of the systems. Network communication is handled in a way that it retains high specificity, affecting only the desired qubits without influencing other qubits that are not related to the underlying operation. However, it becomes challenging when the number of qubits grows; therefore, the number of qubits in a single module is another vital part of the quantum data plane.

2.5. Quantum Control and Measurement Plane

The role of the quantum plane is to convert digital signals received from the control processor. It defines a set of quantum operations that are performed in the quantum data plane on the qubits. It efficiently translates the data plane’s analog output of qubits to classical data (i.e., binary), which are easier to be handled by the control processor. Any difference in the isolation of the signals leads to small qubit signals that cannot be fixed during an operation, thus resulting in inaccuracies in the states of qubits. Control signals shielding is complex, since such signals must be passed via the apparatus that is used for isolating the quantum data plane from the environment. This could be performed using vacuums, cooling, or through both required constraints. Signal crosstalk and qubit manufacturing errors gradually change with the configuration change in the system. Even if the underlying quantum system allows fast operations, the speed can still be limited by the time required to generate and send a precise pulse.

2.6. Control Processor Plane and Host Processor

This plane recognizes and invokes a series of quantum gate operations to be performed by the control and measurement plane. This set of steps implements a quantum algorithm via the host processor. The application should be custom-built, using specific functionalities of the quantum layer that are offered by the software tool stack. One of the critical responsibilities of the control processor plane is to provide an algorithm for quantum error correction. Conventional data processing techniques are used to perform different quantum operations that are required for error correction according to computed results. This introduces a delay that may slow down the quantum computer processing. The overhead can be reduced if the error correction is carried out in a comparable time to that of the time needed for the quantum operations. As the computational task increases with the machine size, the control processor plane would inevitably consist of more elements for increasing computational load. However, it is quite challenging to develop a control plane for large-scale quantum machines.
One technique to solve these challenges is to split the plane into components. The first component being a regular processor that can be tasked to run the quantum program, while the other component can be customized hardware to enable direct interaction with the measurement and control planes. It computes the next actions to be performed on the qubits by combining the controller’s output of higher-level instructions with the syndrome measurements. The key challenge is to design customized hardware that is both fast and scalable with machine size, as well as appropriate for creating high-level instruction abstraction. A low abstraction level is used in the control processor plane. It converts the compiled code into control- and measurement-layer commands. The user will not be able to directly interact with the control processor plane. Subsequently, it will be attached to the computing machine to fasten the execution of a few specific applications. Such kind of architectures have been employed in current computers that have accelerators for graphics, ML, and networking. These accelerators typically require a direct connection with the host processors and shared access to a part of their memory, which could be exploited to program the controller.

2.7. Qubit Technologies

Shor’s algorithm [47] opened the gate to possibilities for designing adequate systems that could implement quantum logic operations. There are many qubit systems, e.g., photon, solid-state spins, trapped-ion qubits, and superconducting qubits. Trapped-ion qubits and superconducting qubits are the two most promising platforms for quantum computing, and they are explained in the following subsections.

2.7.1. Trapped Ion Qubits

“The first quantum logic gate was developed in 1995 by utilizing trapped atomic ions” that were developed using a theoretical framework proposed in the same year [48]. After its first demonstration, technical developments in qubit control have paved the way toward fully functional processors of quantum algorithms. The small-scale demonstration shows promising results; however, trapped ions remain a considerable challenge. As opposed to Very Large Circuits Integration (VLSI), developing a trapped-ion-based quantum computer requires the integration of a range of technologies, including optical, radiofrequency, vacuum, laser, and coherent electronic controllers. However, the integration challenges associated with trapped-ion qubits must be thoroughly addressed before deploying a solution.
A data plane consists of ions and a mechanism to trap those into desired positions. The measurement and control plane contains different lasers to perform certain operations, e.g., a precise laser source is used for inflicting a specific ion to influence its quantum state. Measurements of the ions are captured through a laser, and the state of ions is detected through photon detectors.

2.7.2. Superconducting Qubits

Superconducting qubits share some common characteristics with today’s silicon-based circuits. These qubits, when cooled, show quantitative energy levels due to quantified states of electronic-charge. The fact that they operate at a nanosecond time scale, have continuous improvement in coherence times, and their ability to utilize lithographic scaling make them an efficient solution for quantum computing. Upon the convergence of these characteristics, superconducting qubits are considered both for quantum computation and quantum annealing.

2.8. Lessons Learned: Summary and Insights

In this section, we discus enabling technologies of quantum computing. We found that the key characteristics of a quantum data plane are the error rates of the single- and two-qubit gates. Furthermore, qubit coherence times, interqubit connection, and the qubits within a single module are vital in the quantum data plane. We also explained that the quantum computer’s speed is limited by the precise control signals that are required to perform quantum operations. The control processor plane and host computer run a traditional OS equipped with libraries for its operations that provides software development tools and services. It runs the software development tools that are essential for running the control process. These are different from the software that runs on today’s conventional computers. These systems provide capabilities of networking and storage that a quantum application might require during execution. Thus, connecting a quantum process to a traditional computer enables it to leverage all its features without starting from scratch.

3. Applications of Quantum Computing for Healthcare

Recent research shows that quantum computing has a clear advantage over classical computing systems. Quantum computing provides an incremental speedup of disease diagnosis and treatment and, in some use cases, can drastically reduce the computation times from years to minutes [33,49]. It provokes innovative ways of realizing a higher level of skills for certain tasks, new architectures, and strategies. Therefore, quantum computing has an immense potential to be employed for a wide variety of use cases in the health sector in general and for healthcare service providers in particular, especially in the areas of accelerated diagnoses, personalized medicine, and price optimization. A literature survey shows that there is a visible increase in the use of classical modeling and quantum-based approaches, primarily due to the improvement in access to worldwide health-relevant data sources and availability. This section brings forward some potential use cases for the applications of quantum computing in healthcare; an illustration of these use cases is presented in Figure 4.

3.1. Molecular Simulations

Quantum computers tend to process data in a fundamentally novel way using quantum bits, as compared with classical computing, where integrated circuits determine the processing speed [50]. Quantum computers, unlike storing information in terms of 0 s and 1 s, use the phenomena of quantum entanglement, which paves the way for the quantum algorithms countering classical computing, which is not designed to benefit from this phenomenon [51]. In the healthcare industry, quantum computers can exploit ML, optimization, and artificial intelligence (AI) to perform complex simulations [52]. Processes in healthcare often consist of complex correlations and well-connected structures of molecules with interacting electrons. The computational requirements for simulations and other operations in this domain naturally grow exponentially with the problem size, with time always being the limiting factor [53]. Therefore, we argue that quantum-computing-based systems are a natural fit for the use case.

3.2. Precision Medicine

The domain of precision medicine focuses on providing prevention and treatment methodologies for individuals’ healthcare needs [54]. Due to the complexity of the human biological system, personalized medicine will be required in the future that will go beyond standard medical treatments [54]. Classical ML has shown effectiveness in predicting the risk of future diseases using EHRs [34]. However, there are still limitations in using classical ML approaches due to quality and noise, feature size, and the complexity of relations among features. This provokes the idea of using quantum-enhanced ML, which could facilitate more accurate and granular early disease discovery [50]. Healthcare workers may then use tools to discover the impact of risks on individuals in given condition changes by continual virtual diagnosis based on continuous data streams. Drug sensitivity is an ongoing research topic at a cellular level considering genomes features of cancer cells. Ongoing research is discovering the chemical properties of drug models that could be used for predicting cancer efficiency at a granular level. Quantum-enhanced ML could expedite breakthroughs in the healthcare domain, mainly by enabling drug inference models [55,56].
Precision medicine has the goal of identifying and explaining relationships among causes and treatments and predicting the next course of action at an individual level. Traditional diagnosis based on the patient’s reported symptoms results in umbrella diagnoses, where the related treatments tend to sometimes fail [57]. Quantum computing could help in utilizing continuous data streams using personalized interventions in predicting diseases and allowing relevant treatments. Quantum-enhanced predictive medicine optimizes and personalizes healthcare services using continuous care [58]. Patient adherence and engagement at individual-level treatments could be supported by quantum-enhanced modeling. A use case of quantum-computing-based precision medicine is illustrated in Figure 5.

3.3. Diagnosis Assistance

Early diagnosis of the diseases could render better prognosis and treatment, as well as lower the healthcare cost. For instance, it has been shown in the literature that the treatment cost lowers by a factor of 4, whereas the survival rate could be decreased “by a factor of 9 when the colon cancer is diagnosed at an early stage” [59]. In the meantime, the current diagnostics and treatment for most of the diseases are costly and slow, having deviations in the diagnosis of around 15–20% [60]. The use of X-rays, CT scans, and MRIs has become critical over the past few years with computer-aided diagnostics developing at a faster pace. In this situation, diagnoses and treatment suffer from noise, data quality, and replicability issues. In this regard, quantum-assisted diagnosis has the potential to analyze medical images and oversee the processing steps, such as edge detection in medical images, which improves the image-aided diagnosis.
The current techniques use single-cell methods for diagnosis, while analytical methods are needed in single-cell sequencing data and flow cytometry. These techniques further require advanced data analytic methods, particularly combining datasets from different techniques. In this context, cell classification on the basis of biochemical and physical attributes is regarded as one of the main challenges. While this classification is vital for critical diagnoses, such as cancerous cell integration from healthy cells, it requires an extended feature space where the predictor variable becomes considerably larger. Quantum ML techniques, such as quantum vector machines (QVM), enable such classifications and enable single-cell diagnostic methods. The discovery and characterization of biomarkers pave the way for the study of intricate omics datasets, such as metabolomics, transcriptomics, proteomics, and genomics. These processes could lead to increased feature space, provoking complex patterns and correlations that are nearly impossible to be analyzed using classical computational methodologies.
During the diagnosis process, quantum computing may help to support the diagnostics insights, eliminating the need for repetitive diagnosis and treatment. This paradigm helps in providing continuous monitoring and analysis of individuals’ health. It also helps in performing meta-analysis for cell-level diagnosis to determine the best possible procedure at a specific time. This could help to reduce the cost and allow extended data-driven diagnosis, bringing value for both medical practitioners and individuals.

3.4. Radiotherapy

Radiation therapy has been employed for the treatment of cancers; it uses radiation beams to eliminate cancerous cells to stop them from multiplying. However, radiotherapy is a sensitive process which requires highly precise computations to drop the beam on the cancer-causing tissues and avoid any impact on the surrounding healthy body cells. Radiography is performed using highly precise computers and involves a highly precise optimization problem to perform the precise radiography operation, which requires multiple precise and complex simulations to reach an optimal solution. Through quantum computing, running simultaneous simulations and figuring out a plan in an optimal time becomes possible, and hence the spectrum of opportunities is very vast if quantum concepts are employed for simulations.

3.5. Drug Research and Discovery

Quantum computing enables medical practitioners to model atomic-level molecular interactions, which is necessary for medical research [61]. This will be particularly essential for diagnosis, treatment, drug discovery, and analytics. Due to the advancements in quantum computing, it is now possible to encode tens of thousands of proteins and simulate their interactions with drugs, which has not been possible before [35]. Quantum computing helps process this information more effectively by orders of magnitude as compared with conventional computing capabilities [62]. Quantum computing allows doctors to simultaneously compare large collections of data and their permutations to identify the best patterns. Detection of biomarkers specific to a disease in the blood is now possible through gold nanoparticles by using known methods, such as bio-barcode assay. In this situation, the goal could be to exploit the comparisons used to help the identification of a diagnosis [63].
Identifying small molecules, macromolecules, and other molecular formations that develop into drugs that treat or cure diseases is a core activity of pharmaceutical companies. Many important drugs have been discovered in the past by way of scientific fortuity, with some notable examples being penicillin, chloral hydrate, LSD, and the smallpox vaccine. To tackle modern-day challenges such as those related to climate change and the COVID-19 virus, chemists cannot rely on luck alone. Modern-day drug discovery requires precise modeling of the energies dissipated in chemical reactions. Classical computers rely heavily on approximations for this, because even just calculating the quantum behavior of a couple of electrons involves very time-consuming computation. This reduces the precision and value of the model and puts the onus on the chemist to guide the model and validate the results in the lab. Converselt, quantum computers are already reliably modeling the properties of small molecules, such as lithium hydride [64], and have been shown to benefit quantum chemistry calculations requiring an explicit depiction of the wave function [65] because of high system entanglement and because they simulate properties at high accuracies. Finally, researchers have developed several quantum algorithms for chemistry, such as those that estimate the ground-state energies of molecular Hamiltonians and those that compute molecular reaction rates that are superior to their classical computing counterparts.
Research by Huggins et al. [66] has demonstrated that it is even possible to accurately compute circuitry exhibiting noise with quantum chemistry. The researchers utilized a maximum of 16 qubits on Google’s 53-qubit quantum computer to run a Monte Carlo simulation developed for physics models consisting of fermions that comprise electrons. The H4 molecules, molecular nitrogen, and solid diamond involving a maximum of 120 electron orbitals were simulated.

3.6. Pricing of Diagnosis (Risk Analysis)

Creating pricing strategies is considered one of the key challenges that contribute to the complexities of the healthcare ecosystem [67]. In pricing analysis, quantum computing helps in risk analysis by predicting the current health of patients and predicting whether the patient is prone to a particular disease [68]. This is useful for optimizing insurance premiums and pricing [1]. A population-level analysis of disease risks, and mapping that to the quantum-based risk models, could help in computing financial risks and pricing models at a finer level. One of the key areas which could support pricing decisions is the detection of fraud; healthcare frauds cost billions of dollars in revenue [69]. In this regard, traditional data mining techniques offer insights into detecting and reducing healthcare fraud. Quantum computing could provide higher classification and pattern detection performance, thus uncovering malicious behavior attempting fraudulent medical claims. This could in turn help in better management of pricing models and lowering the costs associated with frauds [70]. Quantum computing can substantially accelerate pricing computations as well, resulting in not only lowering the premiums but also in developing customized plans [71].

3.7. Lessons Learned: Summary and Insights

Different tests and systems, based on historical data, MRIs, CT scans, etc., could possibly become one of the quantum computing applications. Quantum computing could help in performing DNA sequencing, which takes 2–3 months using classical computing. It could also help perform cardiomyopathy analysis for DNA variants promptly. Although the growth of quantum computing brings novel benefits to healthcare, the broad use of novel quantum techniques may provoke security challenges. Therefore, there is a need to invest in quantum computing for better healthcare services provisioning. Furthermore, vaccine research could be automated more efficiently. Moreover, there is a need to allocate distributed quantum computing, where a quantum supercomputer distributes its resources using the cloud.

4. Requirements of Quantum Computing for Healthcare

Quantum-enhanced computing can decrease processing time in various healthcare applications. However, the requirements of quantum computing for healthcare could not be generalized across different applications. For instance, drug discovery requirements are different from vaccination development systems. Therefore, quantum computing applications in healthcare require consideration of multiple factors for effective implementation. Table 3 outlines the requirements of quantum computing for a successful operation of healthcare systems, which are elaborated below.

4.1. Computational Power

Low computational time is one of the major requirements of any healthcare application. The classical computers having CPUs and GPUs are not capable of solving certain complex healthcare problems, e.g., simulating molecular structures. This motivates the need for using quantum computing that can exploit vast amounts of multidimensional spaces to represent large problems. A prominent example illustrating the power of quantum computing can be seen in Grover’s search algorithm [72], which is used to search from a list of items. For instance, if we want to search a specific item in N number of items, we have to search N 2 items on average or, in the worst case, check all N items. Grover’s search algorithm searches all these items by checking n items. This demonstrates remarkable efficiency in computational power. Let us assume we want to search through 1 trillion items, and every item takes 1 microsecond to check; it will take only 1 second for a quantum computer.

4.2. High-Speed Connectivity (5G/6G Networks)

Fifth-generation (5G) connectivity has become an essential technology connecting smart medical objects. It provides extremely robust integrity, lower latency, higher bandwidth, and has an extremely large capacity. IoT objects work by transferring data to edge/cloud infrastructure for processing. Cloud storage suffers from security issues from a user perspective, thus raising novel challenges associated with the availability, integrity, and confidentiality of data. Quantum computing can gain benefits from 5G/6G networks to provide novel services. Quantum walks deliver a universal processing model and inherent cryptographic features to deliver efficient solutions for the healthcare paradigm. Quantum walks are the mechanical counterparts of traditional random walks that allow to develop novel quantum algorithms and protocols using high-speed 5G/6G networks.
A few examples of using quantum walks for designing secure quantum applications include pseudorandom number generators, substituting boxes, quantum-based authentication, and image encryption protocols. This could help in providing secure ways to store and transmit data using high-speed networks. In a cryptography mandate for secure transmission of information, the entity’s data are encrypted before sending them over the cloud. In this context, key management, encryption, decryption, and access control are taken care of by the entities. This could be for novel research exploiting quantum technologies using 5G healthcare to enhance performance and resist attacks from classical and quantum scenarios.

4.3. Quantum Communications Networks

Quantum communication (QC) is a quantum technologies subbranch that concerns the distribution of quantum states of light for accomplishing a particular communication task [73,74]. The potential use of QC in commercial applications has been gaining popularity recently. Two leading technologies of QC include quantum key distribution (QKD) and quantum random-number generation (QRNG). QKD enables private communication by allowing remote entities to share a secret key, and together, these promise to enable the perfect secrecy protocol to provide resistance to external attacks. The goal of the quantum Internet [75,76] is to develop a quantum communication network that connects quantum computers together to achieve quantum-enhanced network security, synchronization, and computing. Qirg is an IETF quantum Internet research group that is responsible for the standardization process of the quantum Internet.

4.4. Higher-Dimensional Quantum Communication

Quantum information has been strongly influenced by modern technological paradigms. The literature shows that high-dimensional quantum states are of increasing interest, especially with respect to quantum communication. Hilbert space provides numerous benefits, such as large information capacity and noise resilience [77]. Moreover, the authors in [77] explored “multiple photonic degrees of freedom for generating high-dimensional quantum states”, using both integrated photonics and bulk optics. Different channels were spun up for propagation of the quantum states, e.g., single-mode, free-space links, aquatic channels, and multicore and multimode fibers.

4.5. Scalability of Quantum Computing

Highly connected quantum states that are continuously interacting are challenging to simulate considering their many-body Hilbert vector space that increases with the growing number of particles. One of the promising methods to improve scalability is using the methods of transfer learning. It dictates reusing the capability of ML models to solve potentially similar yet different problem classes. By reusing features of the neural network quantum states, we can exploit physics-inspired transfer learning protocols.
It has been verified that even simple neural networks (i.e., Boltzmann machines [78]) can precisely imitate the state of many-body quantum systems. Transfer learning uses the same trained model to be used for another task that is trained from a similar system with a larger size. In this regard, various physics-inspired protocols can be used for transfer learning to achieve scalability. FPGAs can also be used to emulate quantum computing algorithms, providing higher speed as compared with software-based simulations. However, required hardware resources to emulate quantum systems become a critical challenge. In this regard, scalable FPGA-based solutions could provide more scalability.

4.6. Fault Tolerance

Fault tolerance in quantum computers is extremely necessary, as the components are connected in a fragile entangled state. This makes quantum computers robust and introduces ways to solve quantum problems, leading to the high fidelity of quantum computations. This allows quantum computers to perform computations that were challenging to process in traditional computing. However, during processing, any error in the qubit or in the mechanism of measuring the qubit will bring devastating consequences for the systems depending on those computations. The system of correcting errors itself suffers from major issues. A feasible way of monitoring these systems is to monitor qubits using ancillary qubits, which constantly analyze the logical errors for corrections and detection. Ancillary qubits have already shown promising results, but errors themselves in ancillary qubits may lead to errors in qubits, thereby inflicting more errors in the operation. Error correction code could be embedded among the qubits, allowing the system to correct the code when some bits are wrong. It helps in faulty error propagation by ensuring that a single faulty gate or time stamp produces a single faulty gate.

4.7. Quantum Availability of the Healthcare Systems

In traditional systems, computing is performed in close proximity to the devices. However, quantum computers are located far away from users’ locality. If you want to share a virtual machine hosted on a quantum computer, it is challenging to access such a virtual machine; therefore, the availability requirements of quantum computers should be addressed carefully.

4.8. Deployment of Quantum Gates

One of the requirements in layered quantum computing is the deployment of quantum gates. In this scenario, each quantum gate has the responsibility to perform specific operations on the quantum systems. Quantum gates are applied in multiple quantum computing applications due to hardware restrictions, such as the no-cloning theorem, which makes it challenging for a given quantum system to coordinate in more than one quantum gate simultaneously [79]. In this paradigm, the requirement of coupling topology arises; qubit-to-qubit coupling is one such example where the circuit depth relies on the fidelity of the involved gates.
Paler et al. [80] proposed a quantum approximate optimization algorithm (QAOA), which solves the challenge of combinatorial optimization problems. In this technique, the working mechanism depends on the positive integer, which is directly related to the quality of the approximation. Farhi et al. [81] applied QAOA using a set of linear equations containing exactly three Boolean variables. This algorithm brings different advantages over traditional algorithms and efficiently solves the input problem. In [82], the authors used gate-model quantum computers for QAOA. This algorithm converges to a combinatorial optimization problem as input and provides a string output satisfying a higher “fraction of the maximum number of clauses”. Farhi et al. [83] proposed QAOA for fixed qubit architectures that provide a method for programming gate models without considering requirements of error correction and compilation. The proposed method uses a sequence of unitaries that reside on the qubit-layout-generating states. Meter et al. [84] developed a blueprint of a multicomputer using Shor’s factoring algorithm [85]. A quantum-based multicomputer is designed using a quantum bus and nodes. The primary metric was the performance of the factorization process. Several optimization methods make this technique suitable for reducing latency and the circuit path.

4.9. Use of Distributed Topologies

Large-scale quantum computers could be realized by distributed topologies due to physical distances among quantum states. A quantum bus is deployed for the communication of quantum computers, where quantum algorithms (i.e., error correction) are run in a distributed topology. It requires a coordinated infrastructure and a communication protocol for distributed computation, communication, and quantum error correction for quantum applications. A system area networks model is required to have arbitrary quantum hardware handled by communication protocols.
Van Meter et al. [86] performed an experimental evaluation of different quantum error correction models for scalable quantum computing. Ahsan et al. [87] proposed a million-qubit quantum computer, suggesting the need “for large-scale integration of components and reliability of hardware technology using” simulation and modeling tools. In [88], the authors proposed quantum generalization for feed-forward neural networks, showing that the classical neurons could be generalized with the quantum case with reversibility. The authors demonstrate that the neuron module can be implemented photonically, thus making the practical implementation of the model feasible. In [89], the authors present an idea of using quantum dots for implementing neural networks through dipole–dipole interactions and showed that the implementation is versatile and feasible.

4.10. Requirements for Physical Implementation

The current implementation of quantum computers can be grouped into four generations [86]. The first-generation quantum computers could be implemented by ion traps, where KhZ represents physical speed and Hz shows the logical speed having footprints in the range of mm–cm [87,90,91,92,93,94,95]. Second-generation quantum computers can be implemented by distributed diamonds, superconducting quantum circuits, and linear optical strategies. The physical speed of these computers ranges from MhZ, whereas logical speed constitutes the KhZ range, having a footprint size of —mm. The third-generation quantum computers are based on monolithic diamonds, donor, and quantum dot technologies. Their logical speed corresponds to MhZ, while their physical speed ranges in GHz having a footprint size of —um. Topological quantum computing is used in fourth-generation quantum computers in the evolutionary stage. This generation of quantum computers does not need any quantum error correction, having the natural protection of decoherence. In order to address an open problem of enabling distributed quantum computing via anionic particles, Monz et al. [96] propose a practical realization of the scalable Shor algorithm on quantum computers. This work does not discuss the algorithm’s scalability and mainly demonstrates various implementations of a factorization algorithm on multiple architectures.

4.11. Quantum Machine Learning

Quantum AI and quantum ML are emerging fields; therefore, requirements analyses of both fields from the perspective of experimental quantum information processing is necessary. Lamata [97] studied the implementation of basic protocols using superconducting quantum circuits. Superconducting quantum circuits are implemented for realizing computations and quantum information processing. In [98], the authors proposed a quantum recommendation system, which efficiently samples from a preference matrix, that does not need a matrix reconstruction. Benedetti et al. [99] proposed a classical quantum DL architecture for near-term industrial devices. The authors presented a hybrid quantum–classical framework to tackle high-dimensional real-world ML datasets on continuous variables. In their proposed approach, DL is utilized for low-dimensional binary data. This scheme is well-suited for small-scale quantum processors and mainly for training unsupervised models. An overview of 40 theoretical and experimental (proof-of-concept) quantum technologies for three clinical use cases (that include (1) genomics and clinical research; (2) diagnostics; and (3) treatments and interventions) is presented in [63]. Furthermore, this research also elaborates upon the use of quantum machine learning using real clinical data, e.g., quantum neural networks and quantum support vector classifiers.

4.12. Lessons Learned: Summary and Insights

In this section, we present novel requirements for healthcare systems implementation using quantum computing. Quantum computing for healthcare requires consideration of the diverse requirements of different infrastructures. Therefore, an effective realization of quantum healthcare systems requires healthcare infrastructure to be upgraded to coordinate with the high computational power provided by quantum computing.

5. Quantum Computing Architectures for Healthcare

This section presents an overview of the existing literature focused on developing quantum computing architecture for healthcare applications. We start this section by first providing a brief overview of general quantum computing architecture.

5.1. Quantum Computing Architecture: A Brief Overview

Different components of quantum computing are integrated to form a quantum computing architecture. The basic elements of a classical quantum computer are its quantum states (i.e., qubits), the architecture used for fault tolerance and error correction, the use of quantum gates and circuits, the use of quantum teleportation, the use of solid-state electronics [100], etc. The design and analysis of these components and their different architectural combinations have been widely studied in the literature. For instance, most of the proposed/developed quantum computing architectures are layered architectures [101,102], which are a conventional approach to the design of complex information engineering architectures. So far, many researchers have provided different perspectives and guidelines to design quantum computer architectures [103,104]. For instance, the fundamental criteria for viable quantum computing were introduced in [105], and the need for a quantum error correction mechanism within the quantum computer architecture is emphasized in [106,107]. Ref. [108] presents a comparative analysis of IBM Quantum vs fully connected trapped ions.

5.2. Quantum Algorithm Design for Healthcare Applications

The rapid advancement in quantum computers would be of little use to chemists in developing lifesaving drugs if there exist limited algorithms for healthcare applications that are optimized for these systems. Modern quantum algorithms are mostly hybrid, in that they leverage both classical as well as quantum computers. The need for the design of hybrid algorithms for healthcare applications is of utmost importance. Firstly, they allow these applications to utilize computationally superior quantum hardware. Secondly, even if they do not fully utilize quantum hardware capability, they still promote innovation in quantum-inspired classical algorithms that surpass the originals. Together, both hybrid and quantum-inspired methods will eventually evolve into pure quantum algorithms as the field matures. Both hybrid and quantum-inspired methods are organic evolutionary stages toward realizing pure quantum methods.
Sengupta et al. [109] developed a quantum algorithm for quicker clinical prognostic analysis of COVID-19 patients. They leveraged the growing class of quantum machine learning (QML) algorithms, which essentially grew from quantum computing theory. The idea is to employ quantum computing for machine learning tasks for solution parallelism for optimal constraint solving using Moore’s law. The researchers report good performance for large-scale biased CT-scanned image classification due to efficient quantum simulation and fast convergence.
Mehboob et al. [110] design a multiobjective quantum-inspired genetic algorithm (MQGA) to solve the problem of healthcare deadline scheduling. The motivation is that missing the deadline for healthcare applications may have dire consequences, such as patient injury or fatality. The proposed algorithm models healthcare applications as workflows, represented as directed cyclic graphs (DAGs). Individual tasks within the workflow constitute a deadline to guarantee the quality of service (QoS).
There are several large initiatives that aim to help translate quantum algorithmic research into practical healthcare-related software. The UK has allocated GBP 8.4 billion for the development of a quantum-enhanced computing platform [111] for pharmaceutical R&D, and many pharmaceuticals are collaborating with organizations experimenting with quantum computing to utilize quantum algorithms for drug discovery. For instance, the biotech company Biogen [112] is using the technology to develop novel neurological disease candidates, such as for fighting Alzheimer’s.

5.3. Quantum Computing Frameworks for Healthcare

Different quantum-computing-based approaches can be noted in the literature. For instance, Liu et al. [113] proposed a logistic regression health assessment model using quantum optimal swarm optimization to detect different diseases at an early stage. Javidi [114] studied various research works that use 3D approaches for image- visualization and quantum imaging under photon-starved conditions and proposed a visualization. Childs et al. [49] proposed a study using cloud-based quantum computers exploiting natural language processing on electronic healthcare data. Datta et al. [115] proposed “Aptamers for Detection and Diagnostics (ADD) and developed a mobile app acquiring optical data from conjugated quantum nanodots to identify molecules indicating” the presence of the SARS-CoV-2 virus. Koyama et al. [116] proposed a midinfrared spectroscopic system using a pulsed quantum cascade and high-speed wavelength-swept laser for healthcare applications, e.g., blood glucose measurement. Naresh et al. [117] proposed a quantum DH extension to dynamic quantum group key agreement for multiagent systems-based e-healthcare applications in smart cities.

5.4. Secure Quantum Computing for Healthcare

Janani et al. [118] proposed quantum block-based scrambling and encryption for telehealth systems (image processing application); their proposed approach has two levels of security that work by selecting an initial seed value for encryption. The proposed system provides higher security against statistical and differential attacks. However, the proposed system produces immense overhead during complex computations of quantum cryptography. Qiu et al. [119] proposed a quantum digital signature for the access control of critical data in the Big Data paradigm that involves signing parties, including the signer, the arbitrator, and the receiver. The authors did not propose a new quantum computer; rather, they implemented a quantum protocol that does not put more overhead on the network. However, this scheme does not consider sensitive data transferred from the source to the destination during the proposed quantum computing implementation. Al-Latif et al. [120] proposed a quantum walk-based cryptography application, which is composed of substitution and permutations.
In a recent study [121], a hybrid framework based on blockchain and quantum computing was proposed for an electronic health record protection system, where blockchain is used to assign roles to authorize entities in the network to access data securely. However, the performance of the proposed system suffers, as the quantum computing and blockchain infrastructure pose immense network overhead. Therefore, the performance of the proposed system should be assessed intuitively before its actual deployment. Latif et al. [122] proposed two novel quantum information hiding techniques, i.e., a steganography approach and a quantum image watermarking approach. The quantum steganography methodology hides a quantum secret image into a cover image using a controlled-NOT gate to secure embedded data, and the quantum watermarking approach hides a quantum watermarking gray image into a carrier image. Perumal et al. [123] propose a quantum key management scheme with negligible overhead. However, this scheme lacks a comparison with the available approaches to demonstrate its efficacy.

5.5. Actual Clinical Deployment of Quantum Computing

Helgeson et al. [124] explored the impact of clinician awareness of quantum physics principles among patients and healthcare service providers and show that the principles of physics improve communication in the healthcare paradigm. However, this study is based on survey-based analysis, which did not provide an actual representation of the quantum healthcare implementation paradigm. An implementation-level study should be conducted based on the findings of this research to identify its implications. Similarly, Hastings et al. [125] suggested that healthcare professionals must be aware of the fact that quantum computing involves extensive mathematical understanding to ensure efficient services of quantum computing in healthcare applications. Similarly, Grady et al. [126] suggested that leadership in the quantum age requires engaging with stakeholders and resonating with creativity, energy, and products of the work that results from the mutual efforts enforced by the leaders. On a similar note, we argue that the quantum computing architecture for healthcare applications should be developed by considering the important requirements that we have identified in this paper (which are discussed in detail in Section 4 and are summarized in Table 3).

5.6. Lessons Learned: Summary and Insights

In summary, this section discusses state-of-the-art quantum computing healthcare literature. Table 4 shows a comparison of the available approaches in terms of different parameters. We defined key parameters based on quantum computing usage in the healthcare paradigm. Most of the existing studies do not consider IoT implementation in the quantum healthcare paradigm. Therefore, there is a need for IoT implementation in healthcare due to its greater implication in healthcare services provisioning.

6. Security of Quantum Computing for Healthcare

As healthcare applications are essentially life-critical, therefore, ensuring their security is fundamentally important. However, a major challenge faced by healthcare researchers is the siloed nature of healthcare systems that impedes innovation, data sharing, and systematic progress [127]. Furthermore, Chuck Brooks, a leader in cybersecurity and the chair of the Quantum Security Alliance, suggests that effective implementation of security should allow academia, industry, researchers, and governments to collaborate effectively [128]. Security of a quantum computing system is also very important, as it can enable exponential upgradation of computing capacities, which can put at risk current cryptographic-based approaches. Whereas cryptography has been considered the theoretical basis for healthcare information security, quantum computing using cryptography exploits the combination of classical cryptography and quantum mechanics to offer unconditional security for both sides of healthcare communication among healthcare service consumers. Quantum cryptography has become the first commercially available use case of quantum computing. Quantum cryptography is based on the fundamental laws of mechanics rather than unproven complex computational assumptions. A taxonomy of key security technologies that could help healthcare information security is presented in Figure 6 and described below.

6.1. Quantum Key Distribution

Frequent recycling of strong cryptographic keys in healthcare IoT devices and terminals that are placed in public spaces plays an important factor in mitigating the increasing number of medical data breach incidents plaguing the healthcare system. Quantum key distribution (QKD) is a protocol that is used to authorize two components by distributing a mutually agreed key to ensure secure transmission. QKD protocol uses certain quantum laws (which are generally based on complex characteristics of quantum computing) to detect information extraction attacks. Specifically, QKD leverages the footprints left when an adversary attempts to steal the information for attack detection. QKD allows the generation of arbitrarily long keys, and it will stop the keys generation process if an attack is detected. The first QKD technique, known as BB84, was proposed by Gillies Brassed [129], and it is the most widely used method in theoretical research on quantum computing. QKD has enormous potential in helping to overcome key management and distribution limitations in classical algorithms. Shor et al. [130] presented the proof of the BB84 technique by relating the security to the entanglement purification protocol and the quantum error correction code. Devi et al. [2] suggest utilizing QKD using an enhanced version of the BB84 protocol for sharing keys between communicating entities in the remote health monitoring of patients using wireless body sensor networks. Their results demonstrate that the approach helps secure the sensed data being transmitted across the sensor network to the physician from attacks. Perumal et al. [123] designed an optimized QKD technique for heterogeneous medical devices. The communication is set up using quantum channels between authorized parties, and the key server distributes the encryption key in terms of qubits over the quantum channel. In the literature, substantial research has been conducted using the QKD security protocol, and several novel improvements in the quantum computing security paradigm using QKD protocol have been made so far.

6.2. Defense Using D-Level Systems

Quantum D-level systems are attractive for healthcare since they are characterized by higher data transfer rates that are required for next-generation medical sensors. Consider the case of implantable brain–machine interface systems where a huge amount of neural data [131] is transmitted by thousands of electrodes monitoring the brain tissue in the different cortical layers. With regard to QKD, the d-level protocols promise to increase the transmitted key rate, as well as provide greater error resistance. In [132], the authors used d-level systems to protect against individual and concurrent attacks. They discussed two cryptosystems, where the first system uses two mutually unbiased bases, while the second utilizes d+1 concurrently unbiased bases. The proof of security for the protocols with entangled photons for individual attacks has been demonstrated by [133]. However, the challenge with this approach was the increased error rate. In [134], the authors proposed the decoy pulse method for BB84 in high-loss rate scenarios. A privileged user replaces signal pulses with multiphoton pulses. The security proof of coherent-state protocol using Gaussian-modulated coherent state and homodyne detection against arbitrary coherent attacks is provided in [135]. In [136], authors proposed security against common types of attacks that could be inflicted on the quantum channels by eavesdroppers having vast computational power. The security of device-independent (DI) QKD against collective attacks has been analyzed in [137], which has been extended by [138] with a more general form of attacks. A passive approach for security using a beam divider to segregate each input pulse and demonstrate its effectiveness is presented in [139]. Table 5 presents a taxonomy and summary of different approaches focused on using d-level systems as a defense strategy to withstand security attacks.

6.3. Defense against General Security Risks

A system that relies on quantum computing for healthcare processing and security is vulnerable to a variety of security risks. These include, but are not limited to, authentication, interception, substitution, man-in-the-middle, protocol, and denial of service. In this section, we present existing defense approaches to withstand different general attacks against quantum computing systems. For instance, Maroy et al. [140] proposed a defense strategy for BB84 that enforces security with random individual imperfections concurrently in the quantum sources and detectors. Similarly, Pawlowski et al. [141] proposed a semi-device-independent defense scheme against individual attacks that provides security when the devices are assumed to devise quantum systems of a given dimension. In [142], authors presented a defensive scheme for a greater number of quantum protocols, where the key is generated by independent measurements. A comparative analysis of secret keys that violate Bell inequality is presented in [143]. The authors suggested that any available information to the eavesdroppers should be consistent with the nonsignaling principle.
Leverrier et al. [144] evaluated “the security of Gaussian continuous variable QKD with coherent states against arbitrary attacks in the finite-size scheme”. In a similar study, Morder et al. [145] presented a method to evaluate the security aspects of a practical distributed-phase-reference QKD against general attacks. A framework for the continuous-variable QKD is presented in [146], which is based on an orthogonal frequency division multiplexing scheme. A comprehensive security analysis of continuous-variable MDI QKD in a finite-sized scenario is presented in [147], and defense against generic DI QKD protocols is presented in [148]. In [149], authors presented a method “to prove the security of two-way QKD protocols against the most general quantum attack on an eavesdropper, which is based on an entropic uncertainty” relation. In [150], authors particularly defined the perspective of Eckert’s original entanglement protocol against a general class of attacks. A taxonomy summarizing different defenses against general security attacks is presented in Table 6.

6.4. Defense Using Finite Key Analysis Method

During the past few years, the finite key analysis method has become a popular security scheme for QKD, which has been integrated into the composable unconditional security proof. In [152], authors attempt to address the security constraints of finite-length keys in different practical environments of BB84 that include prepare and measure implementation without decoy state and entanglement-based techniques. Similarly, the finite-key analysis of MDI QKD presented in [153] works by removing the major detector channels and generating different novel schemes of the key rate that is greater than that of a full-device-independent QKD. The security proof against the general form of attacks in the finite-key regime is presented in [154]. The authors present the feasibility of long-distance implementations of MDI QKD within a specific signal transmission time frame. A practical prepare and measure partial device-independent BB84 protocol having finite resources is presented in [155]. A security analysis performed against discretionary communication exposure from the preparation process is presented in [156]. Table 7 presents the taxonomy and summary of the finite-key analysis security schemes.

6.5. Measurement-Device-Independent Quantum Key Distribution

DI QKD [137] aims to fill the gap in the practical realization of the QKD without considering the working mechanism of the underlying quantum device. It requires a violation of the Bell inequality between both ends of the communication and can provide higher security than classical schemes through reduced security assumptions. Alternatively, information receivers on both ends need to identify the infringement of Bell inequality. DI attributes to the fact that there is no need to acquire information on the underlying devices. In this case, the device may correspond to adversaries. Therefore, the identification of elements is necessary as compared with considering how quantum security is implemented [157]. In this context, DI QKD is capable of defending against different kinds of security vulnerabilities including time-shift attacks [158], phase-remapping attacks [159], binding attacks [160], and wavelength-dependent attacks [161]. Additionally, security vulnerability identification generated by quantum communication channels can be defended using the technique presented in [162]. Furthermore, Broadbent et al. proposed a generalized two-mode Schrodinger cat states DI QKD protocol [163]. The taxonomy and summary of the device-independent quantum key distribution is presented in Table 8.
Table 8. Summary of countermeasures and security protocols using measurement-device-independent quantum key distribution.
Table 8. Summary of countermeasures and security protocols using measurement-device-independent quantum key distribution.
AuthorObjectiveSecurity AlgorithmProsCons
Acin et al.
[137]
  • Device-independent cryptography against collective attacks
  • Holevo information
  • Bell-type inequality

  • Generate secret key
  • Freedom and secrecy
  • Leakage of information
Barret et al.
[157]
  • Security from memory attacks
  • Device-independent protocols
  • Quantum cryptography
  • Secret key rate for fixed noise
  • Securely destroying or isolating devices
  • More practical paradigm
  • Restricted to individual eavesdropping attacks
  • Leaking secret data.
  • Costly and often impractical
Qi et al.
[158]
  • Security against time-shift attack
  • Signal pulse synchronization pulse
  • Time-multiplexing technique
  • Simple and feasible
  • Generalization to any arbitrary case
  • Resource efficiency
  • Higher computational cost
  • Require more resources
  • Final key they share is insecure
Fung et al.
[159]
  • Phase remapping
  • Unconditionally secure against Measurement devices
  • Eavesdroppers with unlimited
  • Lowering down phase error rate
  • Securing against any attack
  • Lack of robustness
  • Meager improvement
Lydersen et al.
[160]
  • Relevant quantum property of single photons
  • Commercially available QKD systems
  • Acquire the full secret key
  • Lowering down phase error rate
  • Securing against any attack
  • Lack of robustness
  • Meager improvement
Li et al.
[161]
  • Attacking practical quantum key
  • Wavelength-dependent beam splitter
  • Multiwavelength sources
  • Widespread scope
  • Securing against any attack
  • Higher error rate
  • Higher implementation cost
Lim et al.
[162]
  • Local Bell test
  • Device-independent quantum key
  • Multiwavelength sources
  • Casually independent devices
  • Losses in the channel is avoided.
  • Implementation loopholes
  • Side-channel attacks
Broadbent
et al. [163]
  • Device-independent quantum key distribution
  • Generalized two-mode Schrodinger
  • Multiwavelength sources
  • Coherent attacks
  • Low error rate.
  • Lack of accuracy
  • Attack vulnerabilities
Cao et al.
[164]
  • Long-distance free-space measurement
  • Based on two-photon interference
  • Multiwavelength sources
  • Fiber-based implementations
  • Way to quantum experiments
  • Low error rate.
  • Long-distance interference
  • Security attacks
Li et al.
[165]
  • Continuous-variable measurement
  • Quantum catalysis
  • discrete-variable
  • Zero-photon catalysis
  • Defense against attacks
  • Simulation results.
  • Lack of accuracy
  • Attack vulnerabilities
Ma et al.
[166]
  • Measurement-device-independent quantum
  • Quantum catalysis
  • High-security quantum information
  • Gaussian-modulated coherent states
  • Continuous-variable entanglement
  • Losses in current telecom components.
  • More overhead.
  • Lack of accuracy
Zhou et al.
[167]
  • Biased decoy-state measurement
  • Finite secret key rates
  • Efficient decoy-state information
  • Single-photon yield
  • Simulation results
  • Increased efficiency
  • More overhead.
  • Lack of accuracy
Tamaki et al.
[168]
  • Phase encoding schemes
  • Basis-dependent flaw
  • Phase encoding schemes
  • Single-photon yield
  • Non-phase-randomized coherent pulses
  • Increased efficiency
  • More overhead.
  • Lack of accuracy
Zhao et al.
[169]
  • Phase encoding schemes
  • Post selection using untrusted measurement
  • Virtual photon subtraction
  • Single-photon yield
  • Non-Gaussian postselection
  • Non-phase-randomized coherent pulses
  • Increased efficiency
  • Reduced reliability
  • Increased complexity
Ma et al.
[170]
  • Continuous-variable measurement device
  • Independent quantum key distribution via quantum catalysis
  • Single-photon yield
  • Noiseless attenuation process
  • Single-photon subtraction coherent pulses
  • Improving performance
  • Higher secret key rate
  • Limitation of transmission distance
Li et al.
[171]
  • Fault-tolerant measurement
  • Decoherence-free subspace
  • Collective-rotation noise
  • Collective-dephasing noises
  • Reducing experiment difficulty
  • Enhanced security
  • Lack of general noise cases
  • Lack of improving overall efficiency
Lo et al. proposed a device-independent measurement scheme [164], which is a step forward in achieving information theory security for key sharing among two legitimate remote users. Comparatively, MDI-QKD incorporates different added advantages as compared with DI-QKD. The actual key rate of MDI-QKD achieves a higher rating as compared with DI-QKD by successfully eliminating the detector channel vulnerabilities. Moreover, both ends of communication do not require to execute any kind of measurements where they only need to transmit quantum signals that could be measured. In this case, both ends of the communication do not need to hold any measurement devices treating them as black boxes. This could help in eliminating the requirement to validate detectors in the QKD standardization mechanism. In this regard, bit strings designated to both ends of the communication would not be secured from the detector side channels due to the nonavailability of detectors, though they need to characterize the quantum states they transfer using channels, which occurs in a secure paradigm. This paradigm is relatively secure from the adversary who may exploit the encoding and decoding modules without focusing on polarization maintenance. Li et al. proposed an untrusted third-party attack detection using a continuous-variable MDI protocol [165]. Similarly, Ma et al. [166] proposed an MDI-based scheme using Gaussian-modulated coherent states. The authors in [167] proposed a decoy-state protocol. In this scheme, a measurement basis is chosen to have a biased probability and intensities of various types of states, and an optimized strategy is used to achieve a finite secret key rate. In [168], authors proposed two techniques for phase encoding including phase locking and conversion of BB84 standard encoding pulses into polarization modes. Zhao et al. [169] improved the performance of a coherent-state continuous-variable MDI protocol by virtual photon subtraction. In a similar study [170], authors used photon subtraction to improve the efficiency of the continuous-variable MDI protocol.

6.6. Semiquantum Key Distribution

SQKD exploits novel quantum capabilities of at least one party in communication. It eliminates computational overhead and alleviates computational cost. SQKD ensures that both ends of the communication achieve QKD. In this mechanism, only the sender should be quantum-capable, whereas the receiver may have classical capabilities. Specifically, the sender performs various operations, including preparation of quantum states, performing quantum measurements, and storage of quantum states. In this paradigm, the receiver performs multiple operations, including preparation of novel qubits, measurement of qubits, order arrangement of qubits, and transmitting qubits without disturbing quantum channels. Boyer et al. [172] proposed the first SQKD in 2007. In this scheme, they used single photons to determine the robustness of the protocol. In the later state, they extended this work by generalizing the underlying conditions. They analyzed these conditions and proved that complete robustness could only be achieved when the qubits are transmitted individually but are attacked collectively. In their later work, Boyer et al. [173] also proposed a feasible protocol using four-level systems. Lu et al. [174] proposed a classical sender-based protocol. The sender can send encoded key bits on a Z basis. Zou et al. [175] proposed a robust SQKD protocol that transfers fewer than four quantum states. Maitra et al. [176] analyzed a two-way eavesdropping scheme against an SQKD protocol. Karawec et al. [177] proposed a secret key-sharing scheme between two classical users. In [178], the authors avoided measurement capabilities of the sender and ensured that it is robust against joint attacks, thus showing that the measurement capability of the classical users is not essential for the implementation of SQKD. Liu et al. [179] used an untrusted quantum server that tries to steal session keys. Currently, various quantum states and technologies are used to devise novel protocols [180,181,182,183,184,185]. Additionally, a few researchers have analyzed the security vulnerabilities of SQKD [186,187,188]. The taxonomy and summary of research studies focused on leveraging SQKD is presented in Table 9.

6.7. Lessons Learned: Summary and Insights

In this section, we outlined all the security solutions developed using the quantum mechanics concept. Security of healthcare is critical, as healthcare systems store a large amount of private information of patients. Therefore, quantum cryptography provides extended benefits to deal with the security issues faced by healthcare systems.

7. Open Issues and Future Research Directions

This section discusses the various open issues related to quantum computing for healthcare. We present a taxonomy of those challenges, their causes, and some future research directions to solve those challenges.

7.1. Quantum Computing for Big Data Processing

Due to its natural ability to boost computational processing, quantum computing is a good fit for big data analytics. Previous research has shown the great promise of using big data for revolutionizing healthcare by enabling personalized services and better diagnostics and prognostics [127,190]. In particular, big data for healthcare can leverage data science and advancements in ML/DL to enable descriptive, predictive, and prescriptive analytics. For instance, multimodal data can be leveraged to develop ensemble methods for efficient predictive analytics in healthcare [191]. Moreover, the intersection of semantic technologies and quantum computing also needs to be explored to improvise advanced solutions to process medical big data for better categorization and understanding. Moreover, it can help in discovering latent relationships from large-scale multimodal medical databases. For instance, Ma et al. [192] developed a quantum machine learning algorithm that leverages semantic knowledge graphs. Similarly, in [193], a framework for quantum semantic communications is presented for developing future reasoning-based communication systems by considering three key requirements, i.e., accuracy, efficiency, and minimalism. Furthermore, they employed unsupervised quantum clustering to extract contextual and semantic knowledge from messages to be communicated.

7.2. Quantum AI/ML Applications

Quantum computing promises to provide additional computational capabilities that can be used to train more advanced AI/ML models, which can drive revolutionary breakthroughs in healthcare [194]. Of the various kinds of quantum algorithms that are relevant to healthcare, quantum-enhanced AI/ML stands out for the breadth of its applications. Quantum approaches are particularly well-suited for ML algorithms, many of which rely on operations with large matrices, which can be enhanced significantly using quantum computing [1]. AI/ML is a powerful and diverse method that supports a variety of applications. There are multiple traditional learning models, such as the conjugate gradient method, that use traditional hardware accelerators. Quantum computing could provide support for AI/ML tasks during the machine design phase for overall enhancement of the inference model. A popular design using the Boltzmann machine [195] provides an early example. The Boltzmann machine consists of hidden artificial neurons having weighted edges between them. Neurons are characterized by an energy function that depends on the interaction with their connected neighbors. Hence, quantum AI could speed up the ML training process and increase the accuracy of the training models.
Some of these systems deal with real-time decision making, such as driving a vehicle, stock selection to maximize a portfolio, or computing recommendations to select the right product. Most AI applications develop an inference model for informed decision making. These inference models work based on rule-based analysis, pattern recognition, and sequence identification. Rule-based inference models accompany preconfigured responses in the design of the system. However, these applications rely on the imagination of the application creator. An alternative method is to use patterns and associations using a large amount of existing data. A smaller amount of error in the inference models could bring the accuracy of predictions down. Error reduction in inference models is akin to a search problem.

7.3. Large-Scale Optimization

Optimization techniques are used routinely in various fields. Many optimization problems suffer from intractability and from a combinatorial explosion when dealing with large instances. For instance, the Traveling Salesman Problem (TSP) is a famous optimization problem that aims at identifying the shortest possible distance between cities by hitting each city once and then returning to the initial point. The TSP problem is NP-Hard, and an optimal solution to this problem becomes intractable when the number of cities becomes very large. In such cases, heuristics are resorted to, as solving such problems on traditional computing systems simply takes an impractically long time. Quantum computing provides two probable solutions to these problems, including quantum annealing and universal quantum computers. Furthermore, quantum annealing is an optimization heuristic that can overcome the challenges of traditional computing systems in solving optimization problems. Specialized quantum annealers could be implemented and are considered easier to implement as compared with a universal quantum computer. However, their efficacy over traditional computers is yet to be explored. Lightweight digital annealers can simulate quantum annealers features on classical computing systems, resulting in cost-effective solutions. Universal annealers are fully capable of solving quantum computing problems, but their commercial implementations are rare.

7.4. Quantum Computers for Simulation

Richard Feynman is reported to have said that “nature isn’t classical, dammit, and if you want to make a simulation of nature, you’d better make it quantum mechanical.” Quantum computing offers great promise in developing realistic simulators for complex tasks that are difficult to predict using traditional methods. Quantum computers can be used to simulate chaotic systems, such as the weather. They can also be used to model the evolution of complex biological systems and social contagions, such as the evolution of an epidemic or a pandemic. Furthermore, quantum computers also hold promise for simulating metabolism within a call and for investigating drug interaction at a cellular and molecular level. This can enable and facilitate the development of new vaccines and medications. Quantum computers can also be used to develop digital twins of human organs and cells. Quantum computing will also enable fine-grained and potentially intrusive applications, and it is necessary to consider and address the various ethical issues that may emerge [196,197]

7.5. Quantum Web and Cloud Services

Bringing quantum computing services to commodity hardware is a critical challenge to reap the benefits of the extended functionalities provided by quantum computing. Due to the large number of resources required for quantum computing implementations, it becomes challenging to access quantum computing for general-purpose problem-solving. The USD 500 million under-development Cleveland Clinic–IBM Discovery Accelerator [198] is an example of a project that attempts to overcome the quantum healthcare services on commodity hardware challenges. The project’s goal is to provide a cloud-based platform, dubbed “RXN”, that uses AI models to predict chemical reactions for optimized synthesis methods and automated generation of chemical procedures for remotely accessible laboratory operations. Amazon web services provide an example of an implementation scenario that can be used to implement quantum web services. Amazon Braket [199] is one example of implementing quantum web services. It provides an efficient platform for researchers and experts to analyze and evaluate quantum computing models in a real-time testing environment. Amazon Braket provides an experimental environment to design, test, and evaluate quantum computing algorithms on a simulated quantum environment and runs them on quantum hardware. It uses D-wave’s quantum annealing and gate-based hardware under the hood. These gate-based quantum computers include ion-trap devices from IonQ, as well as systems built on superconducting qubits from Rigetti [200]. Apart from the Amazon web services environment, other quantum computing solutions are required to provide quantum web services to the users. Software development kits (SDK) could be implemented, which can be used to simulate the developed quantum computing algorithm.

7.6. Quantum Game Theory

Quantum computing is likely to impact future game theory applications. The complementary aspect of quantum computing overlaps game theory applications. In game theory, every player is maximizing individual payoffs. A prime example is the Prisoner’s Dilemma [201], where each player faces criminal charges. Pareto [202] calls for players to cooperate, whereas the Nash equilibrium [203] implies that both players must defeat each other. Thus, there are apparent contradictions among different game theory applications. Quantum game theory is a novel extension of the traditional game theory involving quantum information resources. Quantum computing resources have already been providing better solutions for the Prisoner’s Dilemma. Furthermore, players can achieve a Pareto optimal solution, provided the circumstances that they are allowed to share a mutually entangled state.
The Prisoner’s Dilemma is useful in healthcare to understand the doctor–patient relationship. For example, there are two players: a doctor and an obese patient with high blood pressure and cholesterol. The doctor can prescribe either medicine or advise lifestyle changes such as diet and exercise. Prescribing medicine takes only a few minutes, while the latter, although it is more effective a treatment, requires more time and effort for the doctor. The patient can either comply or be noncompliant and get a second opinion. When the patient and the doctor cooperate, it leads to the best outcome, however, the dominant patient strategy is noncompliance, no matter what the doctor does. If the doctor prescribes ineffective drugs, the patient simply ignores it, and if the doctor actually gives sound lifestyle advice, then the patient goes for a second opinion. So, eventually, the doctor is better off quickly prescribing drugs, since the patient is going to be noncompliant with whatever strategy the doctor employs anyways. The Prisoner’s Dilemma happens because the current healthcare system relies on fee-for-service, rather than the health outcomes of the patients; the two parties do not have any incentive to cooperate. Quantum-based simulations can help explain this and other noncooperative behaviors in the healthcare industry, such as medical spending and pricing to encourage healthcare providers and insurance companies to cooperate.

7.7. Quantum Security Applications

Cyberspace has been under the constant threat of an increasing number of attackers [204,205]. Necessary security frameworks have been developed to protect cyberspace against these attacks. However, this process becomes daunting for classical computing systems. Quantum computing using ML helps develop security schemes for traditional computing systems. Quantum computing supports quantum cryptography, which provides efficient solutions to protect data against privacy-breaching attacks. However, the unprecedented computing power of quantum computing also raises security risks and undermines traditional encryption schemes. This motivates the need for quantum-resisting encryption techniques to mitigate the threats of quantum computing. The National Institute of Standards and Technology (NIST) is developing such a solution to cope with encryption problems. Encryption techniques should be carefully developed to ensure that they are quantum-ready. Moreover, traditional password management schemes could become insufficient in the quantum environment. For example, passwords that may require extended time for decryption can be guessed in a shorter period using quantum computing applications. Personal health information (PHI) is particularly vulnerable to weaknesses in postquantum encryption because it is long-lived. Consider an encrypted medical record that states that a person had bone surgery due to a sports injury at school. This record remains valid for the person till their death and does not expire. Such records, if stolen today, can be kept around by hackers and decrypted and exposed by attacks once quantum computing becomes a reality. Therefore, novel techniques need to be developed to enforce strong encryption schemes to protect sophisticated data. Quantum services are also currently being offered via the cloud; it is important to acknowledge and mitigate the various security risks that emerge from using cloud services, especially when quantum machine learning services are being offered via the cloud [206].

7.8. Developing a Quantum Market Place

One of the vital challenges in quantum computing implementations is the pricing and resource allocation of quantum services to the service subscribers. Similar to web services, a quantum computing marketplace could be developed, providing a platform for the subscribers to utilize a pay-per-use pricing model for the services. Users can subscribe to the services that they want and, based on the consumed services, the price should be determined. A quantum market place for healthcare systems may include suppliers and partners of quantum computing hardware who specialize in services such as automated diagnosis, drug discovery, healthcare monitoring, DNA sequencing, cardiomyopathy analysis, and remote patient monitoring. Customers such as healthcare providers would subscribe to such services hosted in the cloud using a pay-per-use model. However, such a distributed quantum marketplace development requires a coordinated quantum strategy, which can be used to distribute quantum services and develop pricing models. Such a system also requires experts from different domains to have expertise in quantum systems and can develop financial models, services distributed mechanisms, and control strategies for quantum resource distribution. Recently, D-Wave announced plans to launch D-Wave’s Leap quantum cloud service on the Amazon AWS cloud for the first time [207].

8. Conclusions

Quantum computing has revolutionized traditional computational systems by bringing unimaginable speed, efficiency, and reliability. These key features of quantum computing can be leveraged to develop computationally efficient healthcare applications. To this end, we, in this paper, provide a comprehensive survey of the existing literature focused on leveraging quantum computing for the development of healthcare solutions. Specifically, we discussed different potential healthcare applications that can be benefited from quantum computing. In addition, we elaborated upon the key requirements for the development of quantum-computing-empowered healthcare applications and provided a taxonomy of existing quantum computing architectures for healthcare systems. Furthermore, we also discussed different security aspects for the use of quantum computing in healthcare applications and discussed different quantum technologies that can ensure the security of such applications. Finally, we discussed current challenges, their causes, and future research directions where quantum computing could provide immense benefits. This is a novel study which underlines all the key areas of quantum computing implications in the healthcare paradigm and can provide a one-stop solution to the research community interested in utilizing and analyzing different prospects of quantum computing in various healthcare applications.

Funding

This research received no external funding.

Data Availability Statement

Not applicable, the study does not report any data.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Flöther, F.; Murphy, J.; Murtha, J.; Sow, D. Exploring Quantum Computing Use Cases for Healthcare (IBM Expert Insights). Available online: https://www.ibm.com/thought-leadership/institute-business-value/report/quantum-healthcare# (accessed on 27 January 2023).
  2. Devi, A.; Kalaivani, V. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. Pers. Ubiquitous Comput. 2021, 1–11. [Google Scholar] [CrossRef]
  3. Sadki, S.; Bakkali, H.E. Towards negotiable privacy policies in mobile healthcare. In Proceedings of the Fifth International Conference on the Innovative Computing Technology (INTECH 2015), Galcia, Spain, 20–22 May 2015; pp. 94–99. [Google Scholar]
  4. Zinner, M.; Dahlhausen, F.; Boehme, P.; Ehlers, J.; Bieske, L.; Fehring, L. Toward the institutionalization of quantum computing in pharmaceutical research. Drug Discov. Today 2021, 27, 378–383. [Google Scholar] [CrossRef] [PubMed]
  5. Banchi, L.; Fingerhuth, M.; Babej, T.; Ing, C.; Arrazola, J.M. Molecular docking with Gaussian boson sampling. Sci. Adv. 2020, 6, eaax1950. [Google Scholar] [CrossRef] [PubMed]
  6. Li, R.Y.; Di Felice, R.; Rohs, R.; Lidar, D.A. Quantum annealing versus classical machine learning applied to a simplified computational biology problem. NPJ Quantum Inf. 2018, 4, 14. [Google Scholar] [CrossRef] [Green Version]
  7. Fedorov, V.V.; Leonov, S.L. Combinatorial and model-based methods in structuring and optimizing cluster trials. In Platform Trial Designs in Drug Development; Chapman and Hall/CRC: Boca Raton, FL, USA, 2018; pp. 265–286. [Google Scholar]
  8. Gyongyosi, L.; Imre, S. A survey on quantum computing technology. Comput. Sci. Rev. 2019, 31, 51–71. [Google Scholar] [CrossRef]
  9. Fernández-Caramés, T.M. From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things. IEEE Internet Things J. 2019, 7, 6457–6480. [Google Scholar] [CrossRef]
  10. Gyongyosi, L.; Imre, S.; Nguyen, H.V. A survey on quantum channel capacities. IEEE Commun. Surv. Tutor. 2018, 20, 1149–1205. [Google Scholar] [CrossRef]
  11. Arunachalam, S.; de Wolf, R. Guest column: A survey of quantum learning theory. ACM SIGACT News 2017, 48, 41–67. [Google Scholar] [CrossRef] [Green Version]
  12. Li, Y.; Tian, M.; Liu, G.; Peng, C.; Jiao, L. Quantum optimization and quantum learning: A survey. IEEE Access 2020, 8, 23568–23593. [Google Scholar] [CrossRef]
  13. Zhang, H.; Ji, Z.; Wang, H.; Wu, W. Survey on quantum information security. China Commun. 2019, 16, 1–36. [Google Scholar] [CrossRef]
  14. Shannon, K.; Towe, E.; Tonguz, O.K. On the use of quantum entanglement in secure communications: A survey. arXiv 2020, arXiv:2003.07907. [Google Scholar]
  15. Roetteler, M.; Svore, K.M. Quantum computing: Codebreaking and beyond. IEEE Secur. Priv. 2018, 16, 22–36. [Google Scholar] [CrossRef]
  16. Padamvathi, V.; Vardhan, B.V.; Krishna, A. Quantum cryptography and quantum key distribution protocols: A survey. In Proceedings of the 2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, India, 27–28 February 2016; pp. 556–562. [Google Scholar]
  17. Ramezani, S.B.; Sommers, A.; Manchukonda, H.K.; Rahimi, S.; Amirlatifi, A. Machine learning algorithms in quantum computing: A survey. In Proceedings of the 2020 International Joint Conference on Neural Networks (IJCNN), Glasgow, UK, 19–24 July 2020; pp. 1–8. [Google Scholar]
  18. Bharti, K.; Haug, T.; Vedral, V.; Kwek, L.C. Machine learning meets quantum foundations: A brief survey. AVS Quantum Sci. 2020, 2, 034101. [Google Scholar] [CrossRef]
  19. Shaikh, T.A.; Ali, R. Quantum computing in big data analytics: A survey. In Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8–10 December 2016; pp. 112–115. [Google Scholar]
  20. Uprety, S.; Gkoumas, D.; Song, D. A Survey of Quantum Theory Inspired Approaches to Information Retrieval. ACM Comput. Surv. (CSUR) 2020, 53, 1–39. [Google Scholar] [CrossRef]
  21. Huang, A.; Barz, S.; Andersson, E.; Makarov, V. Implementation vulnerabilities in general quantum cryptography. New J. Phys. 2018, 20, 103016. [Google Scholar] [CrossRef]
  22. Botsinis, P.; Alanis, D.; Babar, Z.; Nguyen, H.V.; Chandra, D.; Ng, S.X.; Hanzo, L. Quantum search algorithms for wireless communications. IEEE Commun. Surv. Tutor. 2018, 21, 1209–1242. [Google Scholar] [CrossRef] [Green Version]
  23. Cuomo, D.; Caleffi, M.; Cacciapuoti, A.S. Towards a distributed quantum computing ecosystem. IET Quantum Commun. 2020, 1, 3–8. [Google Scholar] [CrossRef]
  24. Egger, D.J.; Gambella, C.; Marecek, J.; McFaddin, S.; Mevissen, M.; Raymond, R.; Simonetto, A.; Woerner, S.; Yndurain, E. Quantum computing for Finance: State of the art and future prospects. IEEE Trans. Quantum Eng. 2020, 1. [Google Scholar] [CrossRef]
  25. Savchuk, M.; Fesenko, A. Quantum Computing: Survey and Analysis. Cybern. Syst. Anal. 2019, 55, 10–21. [Google Scholar] [CrossRef]
  26. McGeoch, C.C.; Harris, R.; Reinhardt, S.P.; Bunyk, P.I. Practical annealing-based quantum computing. Computer 2019, 52, 38–46. [Google Scholar] [CrossRef]
  27. Duan, S.; Cong, S.; Song, Y. A survey on quantum positioning system. Int. J. Model. Simul. 2021, 4, 265–283. [Google Scholar] [CrossRef]
  28. Preskill, J. Quantum Computing in the NISQ era and beyond. Quantum 2018, 2, 79. [Google Scholar] [CrossRef]
  29. Rowell, E.; Wang, Z. Mathematics of topological quantum computing. Bull. Am. Math. Soc. 2018, 55, 183–238. [Google Scholar] [CrossRef] [Green Version]
  30. Nejatollahi, H.; Dutt, N.; Ray, S.; Regazzoni, F.; Banerjee, I.; Cammarota, R. Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. (CSUR) 2019, 51, 1–41. [Google Scholar] [CrossRef]
  31. Fingerhuth, M.; Babej, T.; Wittek, P. Open source software in quantum computing. PLoS ONE 2018, 13, e0208561. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  32. Abbott, A. Quantum computers to explore precision oncology. Nat. Biotechnol. 2021, 39, 1324–1325. [Google Scholar] [CrossRef]
  33. Kumar, Y.; Koul, A.; Sisodia, P.S.; Shafi, J.; Kavita, V.; Gheisari, M.; Davoodi, M.B. Heart Failure Detection Using Quantum-Enhanced Machine Learning and Traditional Machine Learning Techniques for Internet of Artificially Intelligent Medical Things. Wirel. Commun. Mob. Comput. 2021, 2021, 1616725. [Google Scholar] [CrossRef]
  34. Olgiati, S.; Heidari, N.; Meloni, D.; Pirovano, F.; Noorani, A.; Slevin, M.; Azamfirei, L. A quantum-enhanced precision medicine application to support data-driven clinical decisions for the personalized treatment of advanced knee osteoarthritis: Development and preliminary validation of precisionKNEE QNN. medRxiv 2021, 2021, 1–5. [Google Scholar] [CrossRef]
  35. Gupta, S.; Modgil, S.; Bhatt, P.C.; Jabbour, C.J.C.; Kamble, S. Quantum computing led innovation for achieving a more sustainable COVID-19 healthcare industry. Technovation 2022, 120, 102544. [Google Scholar] [CrossRef]
  36. Kumar, A.; Bhushan, B.; Shriti, S.; Nand, P. Quantum Computing for Health Care: A Review on Implementation Trends and Recent Advances. Multimedia Technologies in the Internet of Things Environment, Volume 3; Springer: Berlin/Heidelberg, Germany, 2022; pp. 23–40. [Google Scholar]
  37. Sinitsyn, N.A. Computing with a single qubit faster than the computation quantum speed limit. Phys. Lett. A 2018, 382, 477–481. [Google Scholar] [CrossRef] [Green Version]
  38. Hanneke, D.; Home, J.; Jost, J.D.; Amini, J.M.; Leibfried, D.; Wineland, D.J. Realization of a programmable two-qubit quantum processor. Nat. Phys. 2010, 6, 13–16. [Google Scholar] [CrossRef]
  39. Balaganur, S. Man’s Race to Quantum Supremacy: The Complete Timeline; Analytics India Magazine: Bengaluru, India, 2019. [Google Scholar]
  40. Watabe, S.; Serikow, M.; Kawabata, S.; Zagoskin, A. Scaling Law in Large Quantum Devices with Dissipation. In Proceedings of the APS March Meeting Abstracts, Virtual, 15–19 March 2021. [Google Scholar]
  41. Boixo, S.; Isakov, S.V.; Smelyanskiy, V.N.; Babbush, R.; Ding, N.; Jiang, Z.; Bremner, M.J.; Martinis, J.M.; Neven, H. Characterizing quantum supremacy in near-term devices. Nat. Phys. 2018, 14, 595–600. [Google Scholar] [CrossRef] [Green Version]
  42. Zhong, H.S.; Wang, H.; Deng, Y.H.; Chen, M.C.; Peng, L.C.; Luo, Y.H.; Qin, J.; Wu, D.; Ding, X.; Hu, Y.; et al. Quantum computational advantage using photons. Science 2020, 370, 1460–1463. [Google Scholar] [CrossRef] [PubMed]
  43. Hu, X.M.; Huang, C.X.; Sheng, Y.B.; Zhou, L.; Liu, B.H.; Guo, Y.; Zhang, C.; Xing, W.B.; Huang, Y.F.; Li, C.F.; et al. Long-distance entanglement purification for quantum communication. Phys. Rev. Lett. 2021, 126, 010503. [Google Scholar] [CrossRef] [PubMed]
  44. Porter, J. Google Confirms ’Quantum Supremacy’ Breakthrough. Available online: https://www.theverge.com/2019/10/23/20928294/google-quantum-supremacy-sycamore-computer-qubit-milestone (accessed on 16 June 2021).
  45. Preskill, J. Fault-tolerant quantum computation. In Introduction to Quantum Computation and Information; World Scientific: Singapore, 1998; pp. 213–269. [Google Scholar]
  46. Moser, J.K. Lectures on Hamiltonian Systems; CRC Press: Boca Raton, FL, USA, 2020. [Google Scholar]
  47. Lanyon, B.P.; Weinhold, T.J.; Langford, N.K.; Barbieri, M.; James, D.F.; Gilchrist, A.; White, A.G. Experimental demonstration of a compiled version of Shor’s algorithm with quantum entanglement. Phys. Rev. Lett. 2007, 99, 250505. [Google Scholar] [CrossRef] [Green Version]
  48. National Academies of Sciences, Engineering, and Medicine. Quantum Computing: Progress and Prospects; The National Academies Press: Washington, DC, USA, 2019. [Google Scholar] [CrossRef]
  49. Childs, H. Applications of Cloud-Based Quantum Computers with Cognitive Computing Algorithms in Automated, Evidence-Based Virginia Geriatric Healthcare. Auctus J. Undergrad. Res. Creat. Available online: https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=1075&context=auctus (accessed on 27 January 2023).
  50. Outeiral, C.; Strahm, M.; Shi, J.; Morris, G.M.; Benjamin, S.C.; Deane, C.M. The prospects of quantum computing in computational molecular biology. Wiley Interdiscip. Rev. Comput. Mol. Sci. 2021, 11, e1481. [Google Scholar] [CrossRef]
  51. Grimsley, H.R.; Economou, S.E.; Barnes, E.; Mayhall, N.J. An adaptive variational algorithm for exact molecular simulations on a quantum computer. Nat. Commun. 2019, 10, 3007. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  52. Hu, F.; Wang, B.N.; Wang, N.; Wang, C. Quantum machine learning with D-wave quantum computer. Quantum Eng. 2019, 1, e12. [Google Scholar] [CrossRef] [Green Version]
  53. Yordanov, Y.S.; Arvidsson-Shukur, D.R.; Barnes, C.H. Efficient quantum circuits for quantum computational chemistry. Phys. Rev. A 2020, 102, 062612. [Google Scholar] [CrossRef]
  54. Malviya, R.; Sundram, S. Exploring potential of quantum computing in creating smart healthcare. Open Biol. J. 2022, 9, 56–57. [Google Scholar] [CrossRef]
  55. Marinho, M.M.; Almeida-Neto, F.W.Q.; Marinho, E.M.; da Silva, L.P.; Menezes, R.R.; Dos Santos, R.P.; Marinho, E.S.; de Lima-Neto, P.; Martins, A.M. Quantum computational investigations and molecular docking studies on amentoflavone. Heliyon 2021, 7, e06079. [Google Scholar] [CrossRef] [PubMed]
  56. Langione, M.; Bobier, J.F.; Meier, C.; Hasenfuss, S.; Schulze, U. Will Quantum Computing Transform Biopharma R&D? Available online: https://www.bcg.com/publications/2019/quantum-computing-transform-biopharma-research-development (accessed on 27 January 2023).
  57. Sarkar, A.; Al-Ars, Z.; Bertels, K. Estimating algorithmic information using quantum computing for genomics applications. Appl. Sci. 2021, 11, 2696. [Google Scholar] [CrossRef]
  58. Zinner, M.; Dahlhausen, F.; Boehme, P.; Ehlers, J.; Bieske, L.; Fehring, L. Quantum computing’s potential for drug discovery: Early stage industry dynamics. Drug Discov. Today 2021, 26, 1680–1688. [Google Scholar] [CrossRef] [PubMed]
  59. Birtwistle, M. Saving Lives and Averting Costs? The Case for Earlier Diagnosis Just Got Stronger; Cancer Research UK: London, UK, 22 September 2014. [Google Scholar]
  60. Singh, H.; Meyer, A.N.; Thomas, E.J. The frequency of diagnostic errors in outpatient care: Estimations from three large observational studies involving US adult populations. BMJ Qual. Saf. 2014, 23, 727–731. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  61. Niraula, D.; Jamaluddin, J.; Matuszak, M.M.; Haken, R.K.T.; Naqa, I.E. Quantum deep reinforcement learning for clinical decision support in oncology: Application to adaptive radiotherapy. Sci. Rep. 2021, 11, 23545. [Google Scholar] [CrossRef] [PubMed]
  62. Pakela, J. Quantum Inspired Machine Learning Algorithms for Adaptive Radiotherapy. Ph.D. Thesis, University of Michiga, Ann Arbor, MI, USA, 2021. [Google Scholar]
  63. Flöther, F.F. The state of quantum computing applications in health and medicine. arXiv 2023, arXiv:2301.09106. [Google Scholar]
  64. Garzia, J.M. How Quantum Computing Could Remake Chemistry. Available online: https://www.scientificamerican.com/article/how-quantum-computing-could-remake-chemistry/ (accessed on 27 January 2023).
  65. Cao, Y.; Romero, J.; Olson, J.P.; Degroote, M.; Johnson, P.D.; Kieferová, M.; Kivlichan, I.D.; Menke, T.; Peropadre, B.; Sawaya, N.P.; et al. Quantum chemistry in the age of quantum computing. Chem. Rev. 2019, 119, 10856–10915. [Google Scholar] [CrossRef] [Green Version]
  66. Huggins, W.J.; O’Gorman, B.A.; Rubin, N.C.; Reichman, D.R.; Babbush, R.; Lee, J. Unbiasing fermionic quantum Monte Carlo with a quantum computer. Nature 2022, 603, 416–420. [Google Scholar] [CrossRef]
  67. Egger, D.J.; Gutiérrez, R.G.; Mestre, J.C.; Woerner, S. Credit risk analysis using quantum computers. IEEE Trans. Comput. 2020, 70, 2136–2145. [Google Scholar] [CrossRef]
  68. Woerner, S.; Egger, D.J. Quantum risk analysis. NPJ Quantum Inf. 2019, 5, 15. [Google Scholar] [CrossRef] [Green Version]
  69. Bova, F.; Goldfarb, A.; Melko, R.G. Commercial applications of quantum computing. EPJ Quantum Technol. 2021, 8, 2. [Google Scholar] [CrossRef]
  70. Giani, A.; Eldredge, Z. Quantum computing opportunities in renewable energy. SN Comput. Sci. 2021, 2, 393. [Google Scholar] [CrossRef]
  71. Chamola, V.; Jolfaei, A.; Chanana, V.; Parashari, P.; Hassija, V. Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography. Comput. Commun. 2021, 176, 99–118. [Google Scholar] [CrossRef]
  72. Kwiat, P.; Mitchell, J.; Schwindt, P.; White, A. Grover’s search algorithm: An optical approach. J. Mod. Opt. 2000, 47, 257–266. [Google Scholar] [CrossRef]
  73. Bouchard, F.; England, D.; Bustard, P.J.; Heshami, K.; Sussman, B. Quantum communication with ultrafast time-bin qubits. PRX Quantum 2022, 3, 010332. [Google Scholar] [CrossRef]
  74. Stanco, A.; Santagiustina, F.B.; Calderaro, L.; Avesani, M.; Bertapelle, T.; Dequal, D.; Vallone, G.; Villoresi, P. Versatile and concurrent fpga-based architecture for practical quantum communication systems. IEEE Trans. Quantum Eng. 2022, 3, 1–8. [Google Scholar] [CrossRef]
  75. Wehner, S.; Elkouss, D.; Hanson, R. Quantum internet: A vision for the road ahead. Science 2018, 362, eaam9288. [Google Scholar] [CrossRef] [Green Version]
  76. Cacciapuoti, A.S.; Caleffi, M.; Tafuri, F.; Cataliotti, F.S.; Gherardini, S.; Bianchi, G. Quantum internet: Networking challenges in distributed quantum computing. IEEE Netw. 2019, 34, 137–143. [Google Scholar] [CrossRef] [Green Version]
  77. Young, N. An Introduction to Hilbert Space; Cambridge University Press: Cambridge, UK, 1988. [Google Scholar]
  78. Salakhutdinov, R.; Hinton, G. Deep Boltzmann Machines. In Proceedings of the Artificial Intelligence and Statistics, PMLR, Clearwater Beach, FL, USA, 16–18 April 2009; pp. 448–455. [Google Scholar]
  79. Neven, H.; Denchev, V.S.; Rose, G.; Macready, W.G. Training a large scale classifier with the quantum adiabatic algorithm. arXiv 2009, arXiv:0912.0779. [Google Scholar]
  80. Paler, A.; Polian, I.; Nemoto, K.; Devitt, S.J. Fault-tolerant, high-level quantum circuits: Form, compilation and description. Quantum Sci. Technol. 2017, 2, 025003. [Google Scholar] [CrossRef]
  81. Farhi, E.; Goldstone, J.; Gutmann, S. A quantum approximate optimization algorithm. arXiv 2014, arXiv:1411.4028. [Google Scholar]
  82. Gyongyosi, L. Quantum state optimization and computational pathway evaluation for gate-model quantum computers. Sci. Rep. 2020, 10, 14220. [Google Scholar] [CrossRef]
  83. Farhi, E.; Goldstone, J.; Gutmann, S.; Neven, H. Quantum algorithms for fixed qubit architectures. arXiv 2017, arXiv:1703.06199. [Google Scholar]
  84. Van Meter, R.D. Architecture of a quantum multicomputer optimized for Shor’s factoring algorithm. arXiv 2006, arXiv:quantph/0607065. [Google Scholar]
  85. Ekert, A.; Jozsa, R. Quantum computation and Shor’s factoring algorithm. Rev. Mod. Phys. 1996, 68, 733. [Google Scholar] [CrossRef] [Green Version]
  86. Van Meter, R.; Devitt, S.J. Local and distributed quantum computation. arXiv 2016, arXiv:1605.06951. [Google Scholar]
  87. Ahsan, M.; Meter, R.V.; Kim, J. Designing a million-qubit quantum computer using a resource performance simulator. ACM J. Emerg. Technol. Comput. Syst. (JETC) 2015, 12, 1–25. [Google Scholar] [CrossRef] [Green Version]
  88. Wan, K.H.; Dahlsten, O.; Kristjánsson, H.; Gardner, R.; Kim, M. Quantum generalisation of feedforward neural networks. NPJ Quantum Inf. 2017, 3, 36. [Google Scholar] [CrossRef] [Green Version]
  89. Altaisky, M.V.; Zolnikova, N.N.; Kaputkina, N.E.; Krylov, V.A.; Lozovik, Y.E.; Dattani, N.S. Towards a feasible implementation of quantum neural networks using quantum dots. Appl. Phys. Lett. 2016, 108, 103108. [Google Scholar] [CrossRef] [Green Version]
  90. Blakestad, R.; Ospelkaus, C.; VanDevender, A.; Amini, J.; Britton, J.; Leibfried, D.; Wineland, D.J. High-fidelity transport of trapped-ion qubits through an X-junction trap array. Phys. Rev. Lett. 2009, 102, 153002. [Google Scholar] [CrossRef] [Green Version]
  91. Brown, K.R.; Kim, J.; Monroe, C. Co-designing a scalable quantum computer with trapped atomic ions. NPJ Quantum Inf. 2016, 2, 16034. [Google Scholar] [CrossRef] [Green Version]
  92. Cirac, J.I.; Zoller, P. Quantum computations with cold trapped ions. Phys. Rev. Lett. 1995, 74, 4091. [Google Scholar] [CrossRef] [PubMed]
  93. Duan, L.M.; Madsen, M.; Moehring, D.; Maunz, P.; Kohn, R., Jr.; Monroe, C. Probabilistic quantum gates between remote atoms through interference of optical frequency qubits. Phys. Rev. A 2006, 73, 062324. [Google Scholar] [CrossRef] [Green Version]
  94. Hensinger, W.; Olmschenk, S.; Stick, D.; Hucul, D.; Yeo, M.; Acton, M.; Deslauriers, L.; Monroe, C.; Rabchuk, J. T-junction ion trap array for two-dimensional ion shuttling, storage, and manipulation. Appl. Phys. Lett. 2006, 88, 034101. [Google Scholar] [CrossRef] [Green Version]
  95. Hucul, D.; Inlek, I.V.; Vittorini, G.; Crocker, C.; Debnath, S.; Clark, S.M.; Monroe, C. Modular entanglement of atomic qubits using photons and phonons. Nat. Phys. 2015, 11, 37–42. [Google Scholar] [CrossRef] [Green Version]
  96. Monz, T.; Nigg, D.; Martinez, E.A.; Brandl, M.F.; Schindler, P.; Rines, R.; Wang, S.X.; Chuang, I.L.; Blatt, R. Realization of a scalable Shor algorithm. Science 2016, 351, 1068–1070. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  97. Lamata, L. Basic protocols in quantum reinforcement learning with superconducting circuits. Sci. Rep. 2017, 7, 1609. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  98. Kerenidis, I.; Prakash, A. Quantum recommendation systems. arXiv 2016, arXiv:1603.08675. [Google Scholar]
  99. Benedetti, M.; Realpe-Gómez, J.; Perdomo-Ortiz, A. Quantum-assisted Helmholtz machines: A quantum–classical deep learning framework for industrial datasets in near-term devices. Quantum Sci. Technol. 2018, 3, 034007. [Google Scholar] [CrossRef] [Green Version]
  100. Copsey, D.; Oskin, M.; Impens, F.; Metodiev, T.; Cross, A.; Chong, F.T.; Chuang, I.L.; Kubiatowicz, J. Toward a scalable, silicon-based quantum computing architecture. IEEE J. Sel. Top. Quantum Electron. 2003, 9, 1552–1569. [Google Scholar] [CrossRef]
  101. Jones, N.C.; Van Meter, R.; Fowler, A.G.; McMahon, P.L.; Kim, J.; Ladd, T.D.; Yamamoto, Y. Layered architecture for quantum computing. Phys. Rev. X 2012, 2, 031007. [Google Scholar] [CrossRef] [Green Version]
  102. Svore, K.M.; Aho, A.V.; Cross, A.W.; Chuang, I.; Markov, I.L. A layered software architecture for quantum computing design tools. Computer 2006, 39, 74–83. [Google Scholar] [CrossRef]
  103. Spiller, T.P.; Munro, W.J.; Barrett, S.D.; Kok, P. An introduction to quantum information processing: Applications and realizations. Contemp. Phys. 2005, 46, 407–436. [Google Scholar] [CrossRef]
  104. Meter, R.v.; Oskin, M. Architectural implications of quantum computing technologies. ACM J. Emerg. Technol. Comput. Syst. (JETC) 2006, 2, 31–63. [Google Scholar] [CrossRef] [Green Version]
  105. DiVincenzo, D.P. The physical implementation of quantum computation. Fortschritte Phys. Prog. Phys. 2000, 48, 771–783. [Google Scholar] [CrossRef]
  106. Steane, A.M. Quantum computer architecture for fast entropy extraction. arXiv 2002, arXiv:quant-ph/0203047. [Google Scholar] [CrossRef]
  107. Steane, A.M. How to build a 300 bit, 1 giga-operation quantum computer. arXiv 2004, arXiv:quant-ph/0412165. [Google Scholar] [CrossRef]
  108. Linke, N.M.; Maslov, D.; Roetteler, M.; Debnath, S.; Figgatt, C.; Landsman, K.A.; Wright, K.; Monroe, C. Experimental comparison of two quantum computing architectures. Proc. Natl. Acad. Sci. USA 2017, 114, 3305–3310. [Google Scholar] [CrossRef] [Green Version]
  109. Sengupta, K.; Srivastava, P.R. Quantum algorithm for quicker clinical prognostic analysis: An application and experimental study using CT scan images of COVID-19 patients. BMC Med. Inform. Decis. Mak. 2021, 21, 227. [Google Scholar] [CrossRef]
  110. Hussain, M.; Wei, L.F.; Abbas, F.; Rehman, A.; Ali, M.; Lakhan, A. A multi-objective quantum-inspired genetic algorithm for workflow healthcare application scheduling with hard and soft deadline constraints in hybrid clouds. Appl. Soft Comput. 2022, 128, 109440. [Google Scholar] [CrossRef]
  111. SEEQC UK Receives 7.99M Grant from Innovate UK to Build Quantum Enhanced Computer for Pharmaceutical R&D|Silicon Canals. Available online: https://siliconcanals.com/crowdfunding/seeqc-uk-receives-7-99m-grant/. (accessed on 18 February 2023).
  112. Castellanos, S. Quantum Computing May Speed Drug Discovery, Biogen Test Suggests. The Wall Street Journal. Available online: https://www.wsj.com/articles/BL-CIOB-12236 (accessed on 27 January 2023).
  113. Liu, Z.; Liang, X.; Huang, M. Design of Logistic Regression Health Assessment Model Using Novel Quantum PSO. In Proceedings of the 2018 IEEE 3rd International Conference on Cloud Computing and Internet of Things (CCIOT), Dalian, China, 20–21 October 2018; pp. 39–42. [Google Scholar]
  114. Javidi, B. 3D imaging with applications to displays, quantum imaging, optical security, and healthcare. In Proceedings of the 2015 14th Workshop on Information Optics (WIO), Kyoto, Japan, 1–5 June 2015; pp. 1–3. [Google Scholar]
  115. Datta, S.; Newell, B.; Lamb, J.; Tang, Y.; Schoettker, P.; Santucci, C.; Pachta, T.G.; Joshi, S.; Geman, O.; Vanegas, D.C.; et al. Aptamers for Detection and Diagnostics (ADD) is a Proposed Mobile App Acquiring Optical Data from Conjugated Quantum Nanodots to Identify Molecules Indicating Presence of SARS-CoV-2 Virus: Why Public Health and Healthcare Need Smartphone Sensors as a Platform for Early Detection and Prevention. ChemRxiv. Available online: https://chemrxiv.org/engage/chemrxiv/article-details/617c108926b9c744380acf48 (accessed on 27 January 2023).
  116. Koyama, T.; Shibata, N.; Kino, S.; Sugiyama, A.; Akikusa, N.; Matsuura, Y. A Compact Mid-Infrared Spectroscopy System for Healthcare Applications Based on a Wavelength-Swept, Pulsed Quantum Cascade Laser. Sensors 2020, 20, 3438. [Google Scholar] [CrossRef] [PubMed]
  117. Naresh, V.S.; Nasralla, M.M.; Reddi, S.; García-Magariño, I. Quantum Diffie–Hellman Extended to Dynamic Quantum Group Key Agreement for e-Healthcare Multi-Agent Systems in Smart Cities. Sensors 2020, 20, 3940. [Google Scholar] [CrossRef] [PubMed]
  118. Janani, T.; Brindha, M. A secure medical image transmission scheme aided by quantum representation. J. Inf. Secur. Appl. 2021, 59, 102832. [Google Scholar] [CrossRef]
  119. Qiu, L.; Cai, F.; Xu, G. Quantum digital signature for the access control of sensitive data in the big data era. Future Gener. Comput. Syst. 2018, 86, 372–379. [Google Scholar] [CrossRef]
  120. Abd EL-Latif, A.A.; Abd-El-Atty, B.; Abou-Nassar, E.M.; Venegas-Andraca, S.E. Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things. Opt. Laser Technol. 2020, 124, 105942. [Google Scholar] [CrossRef]
  121. Bhavin, M.; Tanwar, S.; Sharma, N.; Tyagi, S.; Kumar, N. Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications. J. Inf. Secur. Appl. 2021, 56, 102673. [Google Scholar] [CrossRef]
  122. Abd El-Latif, A.A.; Abd-El-Atty, B.; Hossain, M.S.; Rahman, M.A.; Alamri, A.; Gupta, B.B. Efficient quantum information hiding for remote medical image sharing. IEEE Access 2018, 6, 21075–21083. [Google Scholar] [CrossRef]
  123. Perumal, A.M.; Nadar, E.R.S. Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 7173–7180. [Google Scholar] [CrossRef]
  124. Helgeson, H.L.; Peyerl, C.K.; Solheim-Witt, M. Quantum physics principles and communication in the acute healthcare setting: A pilot study. EXPLORE J. Sci. Health 2016, 12, 408–415. [Google Scholar] [CrossRef]
  125. Hastings, J. Modern nursing and modern physics: Does quantum theory contain useful insights for nursing practice and healthcare management? Nurs. Philos. 2002, 3, 205–212. [Google Scholar] [CrossRef]
  126. Porter-O’Grady, T. Quantum mechanics and the future of healthcare leadership. J. Nurs. Adm. 1997, 27, 15–20. [Google Scholar] [CrossRef]
  127. Latif, S.; Qadir, J.; Farooq, S.; Imran, M.A. How 5G wireless (and concomitant technologies) will revolutionize healthcare? Future Internet 2017, 9, 93. [Google Scholar] [CrossRef] [Green Version]
  128. Brooks, C. Quantum Trends and the Internet of Things. Available online: https://www.forbes.com/sites/cognitiveworld/2019/12/05/quantum-trends-and-the-internet-of-things/?sh=148479943eb0 (accessed on 16 June 2021).
  129. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. arXiv 2020, arXiv:2003.06557. [Google Scholar] [CrossRef]
  130. Shor, P.W.; Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  131. Rapeaux, A.B.; Constandinou, T.G. Implantable brain machine interfaces: First-in-human studies, technology challenges and trends. Curr. Opin. Biotechnol. 2021, 72, 102–111. [Google Scholar] [CrossRef] [PubMed]
  132. Cerf, N.J.; Bourennane, M.; Karlsson, A.; Gisin, N. Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 2002, 88, 127902. [Google Scholar] [CrossRef] [Green Version]
  133. Waks, E.; Zeevi, A.; Yamamoto, Y. Security of quantum key distribution with entangled photons against individual attacks. Phys. Rev. A 2002, 65, 052310. [Google Scholar] [CrossRef] [Green Version]
  134. Hwang, W.Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett. 2003, 91, 057901. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  135. Iblisdir, S.; Van Assche, G.; Cerf, N. Security of quantum key distribution with coherent states and homodyne detection. Phys. Rev. Lett. 2004, 93, 170502. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  136. Biham, E.; Boyer, M.; Boykin, P.O.; Mor, T.; Roychowdhury, V. A proof of the security of quantum key distribution. J. Cryptol. 2006, 19, 381–439. [Google Scholar] [CrossRef] [Green Version]
  137. Acín, A.; Brunner, N.; Gisin, N.; Massar, S.; Pironio, S.; Scarani, V. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 2007, 98, 230501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  138. McKague, M. Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices. New J. Phys. 2009, 11, 103037. [Google Scholar] [CrossRef]
  139. Zhao, Y.; Qi, B.; Lo, H.K.; Qian, L. Security analysis of an untrusted source for quantum key distribution: Passive approach. New J. Phys. 2010, 12, 023024. [Google Scholar] [CrossRef]
  140. Marøy, Ø.; Lydersen, L.; Skaar, J. Security of quantum key distribution with arbitrary individual imperfections. Phys. Rev. A 2010, 82, 032337. [Google Scholar] [CrossRef] [Green Version]
  141. Pawłowski, M.; Brunner, N. Semi-device-independent security of one-way quantum key distribution. PHysical Rev. A 2011, 84, 010302. [Google Scholar] [CrossRef] [Green Version]
  142. Masanes, L.; Pironio, S.; Acín, A. Secure device-independent quantum key distribution with causally independent measurement devices. Nat. Commun. 2011, 2, 238. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  143. Masanes, L.; Renner, R.; Christandl, M.; Winter, A.; Barrett, J. Full security of quantum key distribution from no-signaling constraints. IEEE Trans. Inf. Theory 2014, 60, 4973–4986. [Google Scholar] [CrossRef] [Green Version]
  144. Leverrier, A.; García-Patrón, R.; Renner, R.; Cerf, N.J. Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 2013, 110, 030502. [Google Scholar] [CrossRef] [Green Version]
  145. Moroder, T.; Curty, M.; Lim, C.C.W.; Zbinden, H.; Gisin, N. Security of distributed-phase-reference quantum key distribution. Phys. Rev. Lett. 2012, 109, 260501. [Google Scholar] [CrossRef] [Green Version]
  146. Zhang, H.; Mao, Y.; Huang, D.; Li, J.; Zhang, L.; Guo, Y. Security analysis of orthogonal-frequency-division-multiplexing–based continuous-variable quantum key distribution with imperfect modulation. Phys. Rev. A 2018, 97, 052328. [Google Scholar] [CrossRef]
  147. Lupo, C.; Ottaviani, C.; Papanastasiou, P.; Pirandola, S. Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks. Phys. Rev. A 2018, 97, 052327. [Google Scholar] [CrossRef] [Green Version]
  148. Pironio, S.; Masanes, L.; Leverrier, A.; Acín, A. Security of device-independent quantum key distribution in the bounded-quantum-storage model. Phys. Rev. X 2013, 3, 031007. [Google Scholar] [CrossRef] [Green Version]
  149. Beaudry, N.J.; Lucamarini, M.; Mancini, S.; Renner, R. Security of two-way quantum key distribution. Phys. Rev. A 2013, 88, 062302. [Google Scholar] [CrossRef] [Green Version]
  150. Vazirani, U.; Vidick, T. Fully device independent quantum key distribution. Commun. ACM 2019, 62, 133. [Google Scholar] [CrossRef] [Green Version]
  151. Sheridan, L.; Scarani, V. Security proof for quantum key distribution using qudit systems. Phys. Rev. A 2010, 82, 030301. [Google Scholar] [CrossRef] [Green Version]
  152. Cai, R.Y.; Scarani, V. Finite-key analysis for practical implementations of quantum key distribution. New J. Phys. 2009, 11, 045024. [Google Scholar] [CrossRef] [Green Version]
  153. Song, T.T.; Wen, Q.Y.; Guo, F.Z.; Tan, X.Q. Finite-key analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 2012, 86, 022332. [Google Scholar] [CrossRef] [Green Version]
  154. Curty, M.; Xu, F.; Cui, W.; Lim, C.C.W.; Tamaki, K.; Lo, H.K. Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 2014, 5, 3732. [Google Scholar] [CrossRef] [Green Version]
  155. Zhou, C.; Xu, P.; Bao, W.S.; Wang, Y.; Zhang, Y.; Jiang, M.S.; Li, H.W. Finite-key bound for semi-device-independent quantum key distribution. Opt. Express 2017, 25, 16971–16980. [Google Scholar] [CrossRef]
  156. Wang, W.; Tamaki, K.; Curty, M. Finite-key security analysis for quantum key distribution with leaky sources. New J. Phys. 2018, 20, 083027. [Google Scholar] [CrossRef]
  157. Barrett, J.; Colbeck, R.; Kent, A. Memory attacks on device-independent quantum cryptography. Phys. Rev. Lett. 2013, 110, 010503. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  158. Qi, B.; Fung, C.H.F.; Lo, H.K.; Ma, X. Time-shift attack in practical quantum cryptosystems. arXiv 2005, arXiv:quant-ph/0512080. [Google Scholar] [CrossRef]
  159. Fung, C.H.F.; Qi, B.; Tamaki, K.; Lo, H.K. Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 2007, 75, 032314. [Google Scholar] [CrossRef] [Green Version]
  160. Lydersen, L.; Wiechers, C.; Wittmann, C.; Elser, D.; Skaar, J.; Makarov, V. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 2010, 4, 686–689. [Google Scholar] [CrossRef] [Green Version]
  161. Li, H.W.; Wang, S.; Huang, J.Z.; Chen, W.; Yin, Z.Q.; Li, F.Y.; Zhou, Z.; Liu, D.; Zhang, Y.; Guo, G.C.; et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 2011, 84, 062308. [Google Scholar] [CrossRef] [Green Version]
  162. Lim, C.C.W.; Portmann, C.; Tomamichel, M.; Renner, R.; Gisin, N. Device-independent quantum key distribution with local Bell test. Phys. Rev. X 2013, 3, 031006. [Google Scholar] [CrossRef] [Green Version]
  163. Broadbent, C.J.; Marshall, K.; Weedbrook, C.; Howell, J.C. Device-independent quantum key distribution with generalized two-mode Schrödinger cat states. Phys. Rev. A 2015, 92, 052318. [Google Scholar]
  164. Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar]
  165. Li, Z.; Zhang, Y.C.; Xu, F.; Peng, X.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 052301. [Google Scholar]
  166. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Gui, M.; Liang, L.M. Gaussian-modulated coherent-state measurement-device-independent quantum key distribution. Phys. Rev. A 2014, 89, 042335. [Google Scholar] [CrossRef] [Green Version]
  167. Zhou, C.; Bao, W.S.; Zhang, H.l.; Li, H.W.; Wang, Y.; Li, Y.; Wang, X. Biased decoy-state measurement-device-independent quantum key distribution with finite resources. Phys. Rev. A 2015, 91, 022313. [Google Scholar] [CrossRef] [Green Version]
  168. Tamaki, K.; Lo, H.K.; Fung, C.H.F.; Qi, B. Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 2012, 85, 042307. [Google Scholar] [CrossRef] [Green Version]
  169. Zhao, Y.; Zhang, Y.; Xu, B.; Yu, S.; Guo, H. Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction. Phys. Rev. A 2018, 97, 042328. [Google Scholar] [CrossRef] [Green Version]
  170. Ma, H.X.; Huang, P.; Bai, D.Y.; Wang, S.Y.; Bao, W.S.; Zeng, G.H. Continuous-variable measurement-device-independent quantum key distribution with photon subtraction. Phys. Rev. A 2018, 97, 042329. [Google Scholar] [CrossRef] [Green Version]
  171. Li, C.Y. Fault-tolerant measurement-device-independent quantum key distribution in a decoherence-free subspace. Quantum Inf. Process. 2018, 17, 287. [Google Scholar] [CrossRef]
  172. Boyer, M.; Kenigsberg, D.; Mor, T. Quantum key distribution with classical Bob. In Proceedings of the 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM’07), Guadeloupe, France, 2–6 January 2007; p. 10. [Google Scholar]
  173. Boyer, M.; Gelles, R.; Kenigsberg, D.; Mor, T. Semiquantum key distribution. Phys. Rev. A 2009, 79, 032341. [Google Scholar]
  174. Lu, H.; Cai, Q.Y. Quantum key distribution with classical Alice. Int. J. Quantum Inf. 2008, 6, 1195–1202. [Google Scholar] [CrossRef]
  175. Zou, X.; Qiu, D.; Li, L.; Wu, L.; Li, L. Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 2009, 79, 052312. [Google Scholar]
  176. Maitra, A.; Paul, G. Eavesdropping in semiquantum key distribution protocol. Inf. Process. Lett. 2013, 113, 418–422. [Google Scholar] [CrossRef] [Green Version]
  177. Krawec, W.O. Mediated semiquantum key distribution. Phys. Rev. A 2015, 91, 032323. [Google Scholar] [CrossRef] [Green Version]
  178. Zou, X.; Qiu, D.; Zhang, S.; Mateus, P. Semiquantum key distribution without invoking the classical party’s measurement capability. Quantum Inf. Process. 2015, 14, 2981–2996. [Google Scholar] [CrossRef]
  179. Liu, Z.R.; Hwang, T. Mediated Semi-Quantum Key Distribution Without Invoking Quantum Measurement. Ann. Phys. 2018, 530, 1700206. [Google Scholar] [CrossRef]
  180. Sun, Z.; Du, R.; Long, D. Semi-quantum key distribution protocol using Bell state. arXiv 2011, arXiv:1106.2910. [Google Scholar]
  181. Jian, W.; Sheng, Z.; Quan, Z.; Chao-Jing, T. Semiquantum key distribution using entangled states. Chin. Phys. Lett. 2011, 28, 100301. [Google Scholar]
  182. Yu, K.F.; Yang, C.W.; Liao, C.H.; Hwang, T. Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 2014, 13, 1457–1465. [Google Scholar] [CrossRef]
  183. Li, Q.; Chan, W.H.; Zhang, S. Semiquantum key distribution with secure delegated quantum computation. Sci. Rep. 2016, 6, 19898. [Google Scholar] [CrossRef] [Green Version]
  184. He, J.; Li, Q.; Wu, C.; Chan, W.H.; Zhang, S. Measurement-device-independent semiquantum key distribution. Int. J. Quantum Inf. 2018, 16, 1850012. [Google Scholar] [CrossRef]
  185. Zhu, K.N.; Zhou, N.R.; Wang, Y.Q.; Wen, X.J. Semi-quantum key distribution protocols with GHZ states. Int. J. Theor. Phys. 2018, 57, 3621–3631. [Google Scholar] [CrossRef]
  186. Krawec, W.O. Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 2014, 13, 2417–2436. [Google Scholar] [CrossRef]
  187. Yang, Y.G.; Sun, S.J.; Zhao, Q.Q. Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf. Process. 2015, 14, 681–686. [Google Scholar] [CrossRef]
  188. Krawec, W.O. Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 2016, 15, 2067–2090. [Google Scholar] [CrossRef] [Green Version]
  189. Boyer, M.; Katz, M.; Liss, R.; Mor, T. Experimentally feasible protocol for semiquantum key distribution. Phys. Rev. A 2017, 96, 062335. [Google Scholar] [CrossRef] [Green Version]
  190. Shafqat, S.; Kishwer, S.; Rasool, R.U.; Qadir, J.; Amjad, T.; Ahmad, H.F. Big data analytics enhanced healthcare systems: A review. J. Supercomput. 2020, 76, 1754–1799. [Google Scholar] [CrossRef]
  191. Ali, F.; El-Sappagh, S.; Islam, S.R.; Kwak, D.; Ali, A.; Imran, M.; Kwak, K.S. A smart healthcare monitoring system for heart disease prediction based on ensemble deep learning and feature fusion. Inf. Fusion 2020, 63, 208–222. [Google Scholar] [CrossRef]
  192. Ma, Y.; Tresp, V. Quantum machine learning algorithm for knowledge graphs. ACM Trans. Quantum Comput. 2021, 2, 1–28. [Google Scholar] [CrossRef]
  193. Chehimi, M.; Chaccour, C.; Saad, W. Quantum Semantic Communications: An Unexplored Avenue for Contextual Networking. arXiv 2022, arXiv:2205.02422. [Google Scholar]
  194. Solenov, D.; Brieler, J.; Scherrer, J.F. The potential of quantum computing and machine learning to advance clinical research and change the practice of medicine. Mo. Med. 2018, 115, 463. [Google Scholar]
  195. Sutskever, I.; Hinton, G.E.; Taylor, G.W. The recurrent temporal restricted Boltzmann machine. In Proceedings of the Advances in Neural Information Processing Systems, Vancouver, BC, Canada, 7–10 December 2009; pp. 1601–1608. [Google Scholar]
  196. Bruynseels, K.; Santoni de Sio, F.; van den Hoven, J. Digital twins in health care: Ethical implications of an emerging engineering paradigm. Front. Genet. 2018, 9, 31. [Google Scholar] [CrossRef] [Green Version]
  197. Rasheed, K.; Qayyum, A.; Ghaly, M.; Al-Fuqaha, A.; Razi, A.; Qadir, J. Explainable, trustworthy, and ethical machine learning for healthcare: A survey. Comput. Biol. Med. 2022, 149, 106043. [Google Scholar] [CrossRef]
  198. Cleveland Clinic. Cleveland Clinic and IBM Begin Installation of IBM Quantum System One. Cleaveland Clin. Newsroom. Available online: https://newsroom.ibm.com/2022-10-18-Cleveland-Clinic-and-IBM-Begin-Installation-of-IBM-Quantum-System-One (accessed on 27 January 2023).
  199. Gonzalez, C. Cloud based QC with Amazon Braket. Digit. Welt 2021, 5, 14–17. [Google Scholar] [CrossRef]
  200. Rigetti, C.; Blais, A.; Devoret, M. Protocol for universal gates in optimally biased superconducting qubits. Phys. Rev. Lett. 2005, 94, 240502. [Google Scholar] [CrossRef] [Green Version]
  201. Axelrod, R. Effective choice in the prisoner’s dilemma. J. Confl. Resolut. 1980, 24, 3–25. [Google Scholar] [CrossRef] [Green Version]
  202. Pardalos, P.M.; Migdalas, A.; Pitsoulis, L. Pareto Optimality, Game Theory and Equilibria; Springer Science & Business Media: New York, NY, USA, 2008; Volume 17. [Google Scholar]
  203. Mailath, G.J. Do people play Nash equilibrium? Lessons from evolutionary game theory. J. Econ. Lit. 1998, 36, 1347–1374. [Google Scholar]
  204. Qayyum, A.; Qadir, J.; Bilal, M.; Al-Fuqaha, A. Secure and Robust Machine Learning for Healthcare: A Survey. IEEE Rev. Biomed. Eng. 2020, 14, 156–180. [Google Scholar] [CrossRef] [PubMed]
  205. Qayyum, A.; Usama, M.; Qadir, J.; Al-Fuqaha, A. Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward. IEEE Commun. Surv. Tutor. 2020, 22, 998–1026. [Google Scholar]
  206. Qayyum, A.; Ijaz, A.; Usama, M.; Iqbal, W.; Qadir, J.; Elkhatib, Y.; Al-Fuqaha, A. Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security. Front. Big Data 2020, 3. [Google Scholar] [CrossRef] [PubMed]
  207. Business Wire. D-Wave Launches in AWS Marketplace. Available online: https://www.businesswire.com/news/home/20221021005086/en/D-Wave-Launches-in-AWS-Marketplace (accessed on 23 October 2022).
Figure 1. Comparison of Classical Computing vs. Quantum Computing in terms of four key attributes: (1) computing units; (2) computing capacity; (3) suitability; and (4) and error rates.
Figure 1. Comparison of Classical Computing vs. Quantum Computing in terms of four key attributes: (1) computing units; (2) computing capacity; (3) suitability; and (4) and error rates.
Futureinternet 15 00094 g001
Figure 2. Why use quantum computing and which key verticals will it disrupt?
Figure 2. Why use quantum computing and which key verticals will it disrupt?
Futureinternet 15 00094 g002
Figure 3. Timeline of developments in quantum computing technology.
Figure 3. Timeline of developments in quantum computing technology.
Futureinternet 15 00094 g003
Figure 4. Taxonomy of different potential applications of quantum computing for healthcare.
Figure 4. Taxonomy of different potential applications of quantum computing for healthcare.
Futureinternet 15 00094 g004
Figure 5. An illustration of quantum computing harnessing massive multimodal data to facilitate precision medicine.
Figure 5. An illustration of quantum computing harnessing massive multimodal data to facilitate precision medicine.
Futureinternet 15 00094 g005
Figure 6. Taxonomy of key technologies that can ensure security for healthcare information processing using quantum computing.
Figure 6. Taxonomy of key technologies that can ensure security for healthcare information processing using quantum computing.
Futureinternet 15 00094 g006
Table 2. List of acronyms and their explanation.
Table 2. List of acronyms and their explanation.
3GPPThird-Generation Partnership Project
5GFifth Generation
ADDAptamers for Detection and Diagnostics
AIArtificial Intelligence
DHDiffie–Hellman
ECCElliptic Curve Cryptography
EHRElectronic Health Records
ICIntegrated Circuit
IoTInternet of Things
ITInformation Technology
MLMachine Learning
MRIMagnetic Resonance Imaging
NISTNational Institute of Standards and Technology
QAOAQuantum Approximate Optimization Algorithm
QKDQuantum Key Distribution
QoSQuality of Service
QubitsQuantum Bits
RSARivest–Shamir–Adleman
SDKSoftware-Development Kits
TLSTransport Layer Security
TSPTraveling Salesman Problem
VLSIVery Large Circuits Integration
Table 3. A summary of key requirements of quantum computing for healthcare services provisioning along with different challenges and solutions.
Table 3. A summary of key requirements of quantum computing for healthcare services provisioning along with different challenges and solutions.
RequirementsChallengesSolutions
Computational power
  • Lower computational power of traditional systems.
  • Higher computational complexity.
  • Large problem sizes.
  • Complex system implementation.
  • Multidimensional spaces of quantum computers.
  • Efficient representation of larger problems.
  • Quantum wave interference.
  • Unprecedented speed of quantum computing.
High-speed connectivity
(5G/6G networks)
  • Lack of security in high-speed connectivity.
  • Lack of scalability in quantum computers.
  • Lack of confidentiality in information processing.
  • Quantum walks-based universal computing model.
  • Inherent cryptographic features of quantum computing.
  • Cryptographic protocols.
  • Quantum-computing-based authentication.
Higher-dimensional quantum
computing
  • Growing number of quantum states.
  • Lower capacity in traditional systems.
  • Increased processing requirements.
  • Increased noise resilience.
  • Quantum channel implementation.
  • Parallel execution of tasks.
Scalability of quantum
computing
  • Lack of scalability in quantum computations.
  • Lack of reusability.
  • Lack of support for growing amount of processing.
  • Lack of emulation environments.
  • Transfer learning methods.
  • Use of neural Boltzmann machines.
  • Physics-inspired transfer-learning protocols.
  • FPGA-based quantum computing applications.
Fault tolerance
  • Lack of fault tolerance.
  • Quantum entangled states.
  • Errors in qubits.
  • Lack of quantum correction code.
  • Monitoring qubits using ancillary qubit.
  • Logical errors detection.
  • Limiting error propagation.
Quantum availability of the
healthcare systems
  • Far-away processing systems.
  • Errors in the communication systems.
  • Lack of computing infrastructure.
  • Lack of service distribution.
  • Communication infrastructure improvement.
  • Fault correction mechanisms
  • Development of quantum services.
  • Improvement in traditional computing systems.
Deployment of quantum gates
  • No cloning restriction.
  • Challenges with coupling topology.
  • Combinatorial optimization problems.
  • Lack of error correction code.
  • Use of gate-model quantum computers.
  • Programming gated models.
  • Performance of factorization process.
Use of distributed
topologies
  • Physical distances among quantum states.
  • Latency on quantum bus execution.
  • Requirement of coordinated infrastructure.
  • Lack of system area network.
  • Development of distributed quantum technologies.
  • Efficient quantum bus implementation.
  • Feed-forward quantum neural networks.
  • Dipole–dipole interaction.
Requirements for physical
implementation
  • Higher implementation cost.
  • Lack of resources and expertise.
  • Lower initial revenue
  • Physical systems development.
  • Cost-effective solutions.
  • Manpower training.
Quantum ML
  • Extended execution time.
  • Lack of resources and higher complexity.
  • More implementation overhead.
  • Quantum-computing-based solutions.
  • Lower computational complexity.
  • Higher responsiveness.
Table 4. A comparison of the existing quantum computing literature on healthcare using different performance parameters.
Table 4. A comparison of the existing quantum computing literature on healthcare using different performance parameters.
TechniqueHealthcareSecurityPerformanceScalabilityIoTKey Feature
Liu et al. [113]×××Logistic regression
Janani et al. [118]×Blockchain
Qiu et al. [119]××Digital signature
Helgeson et al. [124]××××Survey
Latif et al. [120]×Quantum walks
Bhavin et al. [121]×Blockchain
Javidi [114]×××3D images visualization
Childs [49]×××Cloud computing
Perumal et al. [123]×××Qubits quantum
Latif et al. [122]×××Quantum watermarking
Hastings [125]××××Literature review
Grady et al. [126]×××××Quantum leadership
Datta et al. [115]××Smartphone app
Koyama et al. [116]×High-speed wavelet
Narseh et al. [117]×DH extension
Table 5. Summary of countermeasures and security protocols using d-level systems.
Table 5. Summary of countermeasures and security protocols using d-level systems.
AuthorObjectiveSecurity AlgorithmProsCons
Cerf et al.
[132]
  • Quantum cryptographic schemes
  • Quantum states in a d-dimensional Hilbert space
  • Cryptosystem uses two mutually unbiased bases
  • Enhanced accuracy
  • Efficient authentication
  • Increased error rate
Waks et al.
[133]
  • Design flows in security and privacy
  • Quantum key distribution with entangled photons
  • BB84 protocol
  • Enhanced authentication
  • Increased accuracy
  • More practical paradigm
  • Restricted to individual eavesdropping attacks
  • Lack of reliability
  • Lack of comparison
Hwang
[134]
  • Global secure communication
  • Quantum key distribution
  • Decoy pulse method
  • Coherent pulse sources
  • Generalization to any arbitrary case
  • Resource efficiency
  • Higher computational cost
  • Require more resources
  • Prone to attacks
Iblisdir et al.
[135]
  • Security of quantum key distribution
  • Coherent States and Homodyne Detection
  • Transmission of Gaussian- modulated coherent states
  • Lowering down phase error rate
  • Securing against any attack
  • Lack of robustness
  • Meager improvement
Biham et al.
[136]
  • Security of theoretical quantum key distribution
  • Attackers reduced density matrices
  • Securing against optimal attacks
  • Extensive usage of symmetry
  • Lack of scalability
  • Complex computations
Acin et al.
2020 [137]
  • Device-independent security of quantum cryptography
  • Quantum key cryptography
  • Authentication algorithm
  • Security against collective attacks
  • Implementation efficiency
  • Lower efficiency
  • Implementation issues
Mckague et al.
2019 [138]
  • Secure against coherent attacks with memoryless measurement devices
  • XOR
  • Device-independent quantum key distribution
  • Security againt overall attacks
  • Improved efficiency
  • Limited evaluation
  • Low-level scope
Zhao et al.
[139]
  • Security analysis of an untrusted source
  • Untrusted source scheme
  • Does not require fast optical switching
  • Reduce cost
  • False-positive rate
  • Limited efficiency
Table 6. Summary of countermeasures and security protocols for general security risks.
Table 6. Summary of countermeasures and security protocols for general security risks.
AuthorObjectiveSecurity AlgorithmProsCons
Maroy et al.
[140]
  • Security of quantum key distribution
  • Quantum states in a d-dimensional
  • Arbitrary individual imperfections
  • Enhanced accuracy
  • Efficient authentication
  • Increased error rate using qudit systems
Sheridan et al.
[151]
  • Security proof for quantum key distribution
  • Asymptotic regime
  • Higher-dimensional protocols
  • Secret key rate for fixed noise
  • Increased accuracy
  • More practical paradigm
  • Restricted to individual eavesdropping attacks
  • Lack of reliability
  • Lack of comparison
Pawlowski
[141]
  • Security of entanglement -based quantum key
  • Semi-device-independent security
  • One-way quantum key distribution
  • Coherent pulse sources
  • Generalization to any arbitrary case
  • Resource efficiency
  • Higher computational cost
  • Require more resources
  • Prone to attacks
Masanes et al.
[142]
  • Secure device-independent quantum key
  • Distribution with causally independent measurement devices
  • Quantum computing laws
  • Lowering down phase error rate
  • Securing against any attack
  • Lack of robustness
  • Meager improvement
Moroder et al.
[145]
  • Security of distributed phase reference
  • Variant of the COW protocol
  • Generic method for security
  • Extensive usage of symmetry
  • Lack of scalability
  • Complex computations
Beaudry et al.
[149]
  • Security of two-way quantum key distribution
  • Entropic uncertainty relation
  • Authentication algorithm
  • Security against collective attacks
  • Implementation efficiency
  • Lower efficiency
  • Implementation issues
Leverrier et al.
2019 [144]
  • Security of continuous-variable quantum key
  • Phase-space symmetries of the protocols
  • Gaussian continuous-variable quantum
  • Applicable to relevant finite-size regime
  • Improved efficiency
  • Limited evaluation
  • Low-level scope
Prionio et al.
[148]
  • Security of quantum key cryptography
  • Untrusted source scheme
  • Does not require fast optical switching
  • Reduce cost
  • False-positive rate
  • Limited efficiency
Masnes et al.
[143]
  • Full security of quantum key distribution
  • Secret key from correlations
  • Does not require fast optical switching
  • Reduce cost
  • False-positive rate
  • Limited efficiency
Vazirani et al.
[150]
  • Fully device independent quantum key distribution
  • Entanglement-based protocol building
  • Does not require fast optical switching
  • Reduce cost
  • False-positive rate
  • Limited efficiency
Zhang et al.
[146]
  • Security analysis of orthogonal
  • Continuous-variable quantum key distribution
  • Does not require fast optical switching
  • Reduce cost
  • False-positive rate
  • Limited efficiency
Lupo et al.
[147]
  • Continuous-variable measurement device-independent quantum
  • Security against collective Gaussian attacks
  • Does not require fast optical switching
  • Reduce cost
  • False-positive rate
  • Limited efficiency
Table 7. Summary of countermeasures and security protocols using Finite-Key Analysis.
Table 7. Summary of countermeasures and security protocols using Finite-Key Analysis.
AuthorObjectiveSecurity AlgorithmProsCons
Cai et al.
[152]
  • Finite-key unconditional security
  • Entanglement-based implementations
  • Finite-key bound for prepare and measure
  • Enhanced accuracy
  • Efficient authentication
  • Increased error rate using qudit systems
Song et al.
[153]
  • Imperfect detectors to learn a large part of the secret key
  • Asymptotic regime
  • Chernoff bound
  • Secret key rate for fixed noise
  • Increased accuracy
  • More practical paradigm
  • Restricted to individual eavesdropping attacks
  • Lack of reliability
  • Lack of comparison
Curty et al.
[154]
  • Finite-key analysis for device-independent measurement
  • Semi-device-independent security
  • One-way quantum key distribution
  • Coherent pulse sources
  • Generalization to any arbitrary case
  • Resource efficiency
  • Higher computational cost
  • Require more resources
  • Prone to attacks
Zhou et al.
[155]
  • Semi-device-independent QKD protocol
  • Distribution with causally independent measurement devices
  • Quantum computing laws
  • Lowering down phase error rate
  • Securing against any attack
  • Lack of robustness
  • Meager improvement
Table 9. Summary of countermeasures and security protocols using Semiquantum Key Distribution.
Table 9. Summary of countermeasures and security protocols using Semiquantum Key Distribution.
AuthorObjectiveSecurity AlgorithmProsCons
Boyer et al.
[173]
  • Semiquantum key distribution protocol
  • Nonzero information acquired
  • Measure-resend SQKD protocol
  • Robust approach
  • Eliminating information leak
  • Prone to PNS attacks
  • Lack of scope.
Boyer
2017 et al.
[189]
  • Semiquantum key distribution
  • SQKD protocols
  • Classical Alice with a controllable mirror

  • Robust approach
  • Comprehensive security
  • Lack of interoperability
  • Increased communication overhead
Lu 2008
et al.
[174]
  • Quantum key distribution with classical Alice
  • Encoding key bits
  • Classical encoding

  • Robust approach
  • Tolerable noise
  • Higher complexity
  • More processing time
Zou et al.
[175]
  • Semiquantum key distribution
  • Photon pulses
  • Quantum-state distribution

  • Robust approach
  • Tolerable noise
  • Increased latency
  • Higher processing time
Maitra et al.
[176]
  • Eavesdropping in semiquantum key distribution protocol
  • Eavesdropping in both directions
  • Disturbance and information leakage

  • Extract more info on secret approach
  • One-way strategy application
  • Increased latency
  • Higher processing time
Krawec et al.
[177]
  • Mediated semiquantum key distribution
  • Shared secret key
  • Fully quantum server

  • More overhead
  • One-way strategy application
  • Full quantum security
  • Higher processing time
Zou et al.
[178]
  • Semiquantum key distribution
  • Shared secret key
  • Fully quantum server

  • Robust against joint attacks
  • More control over classical party
  • Simple strategy prone to attacks
  • Lack of computational feasibility
Liu et al.
[179]
  • Mediated semiquantum key distribution
  • A shared secret key
  • Untrusted third party

  • Security against known attacks
  • More secure than three-party SQKD protocol
  • Higher quantum burden
  • Unable to combat the collective-rotation noise
Sun et al.
[180]
  • Semiquantum key distribution protocol using Bell state
  • Privacy amplification protocols
  • Untrusted third party

  • Security against known attacks
  • More secure than three-party SQKD protocol
  • Higher quantum burden
  • Unable to combat the collective-rotation noise
  • Higher computational complexity
Jian et al.
[181]
  • Semiquantum key distribution using entangled states
  • Maximally entangled states
  • Quantum Alice shares a secret key with classical Bob

  • Increased qubit efficiency
  • Security against eavesdropping
  • Challenges in implementing semiquantum
  • Increased computation overhead
  • Higher computational complexity
Yu et al.
[182]
  • Authenticated semiquantum key distribution
  • Presharing a master secret key
  • Transmitting a working key

  • Increased impersonation attack security
  • Security against eavesdropping
  • Prone to Trojan horse attacks
  • Increased computation overhead
  • Higher computational complexity
Li et al.
[183]
  • Semiquantum key distribution using secure delegated quantum computation
  • Establishing a secret key
  • Secure delegated quantum computation

  • Enhanced efficiency
  • More security
  • Quantum implementation challenges
  • Network overhead
  • Higher resource consumption
Li et al.
[183]
  • Long-distance free-space quantum key distribution
  • Establishing a secret key
  • Secure delegated quantum computation

  • Satellite quantum
  • Long-distance security
  • Noise accumulation
  • Communication restrictions
  • Higher resource consumption
He et al.
[184]
  • Measurement-device-independent semiquantum key distribution
  • Quantum key distribution
  • Key distribution

  • Higher security
  • Increased reliability
  • More latency
  • Secret key leakage
  • Side-channel attacks
Zhu et al.
[184]
  • Semiquantum key distribution protocols with GHZ States
  • Strong quantum capability
  • Achieve quantum key distribution

  • Higher security
  • Increased reliability
  • More latency
  • Secret key leakage
  • Side-channel attacks
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ur Rasool, R.; Ahmad, H.F.; Rafique, W.; Qayyum, A.; Qadir, J.; Anwar, Z. Quantum Computing for Healthcare: A Review. Future Internet 2023, 15, 94. https://doi.org/10.3390/fi15030094

AMA Style

Ur Rasool R, Ahmad HF, Rafique W, Qayyum A, Qadir J, Anwar Z. Quantum Computing for Healthcare: A Review. Future Internet. 2023; 15(3):94. https://doi.org/10.3390/fi15030094

Chicago/Turabian Style

Ur Rasool, Raihan, Hafiz Farooq Ahmad, Wajid Rafique, Adnan Qayyum, Junaid Qadir, and Zahid Anwar. 2023. "Quantum Computing for Healthcare: A Review" Future Internet 15, no. 3: 94. https://doi.org/10.3390/fi15030094

APA Style

Ur Rasool, R., Ahmad, H. F., Rafique, W., Qayyum, A., Qadir, J., & Anwar, Z. (2023). Quantum Computing for Healthcare: A Review. Future Internet, 15(3), 94. https://doi.org/10.3390/fi15030094

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop