Quantum Computing in Software Design: A Systematic Literature Review

Authors

Farheen Siddiqui

Department of Computer Science and Engineering, Shri Ramswaroop Memorial University, Barabanki (India)

Mohd Nadeem

Department of Computer Science and Engineering, Shri Ramswaroop Memorial University, Barabanki (India)

Article Information

DOI: 10.47772/IJRISS.2026.100300598

Subject Category: Computer Science

Volume/Issue: 10/3 | Page No: 8238-8255

Publication Timeline

Submitted: 2026-03-31

Accepted: 2026-04-06

Published: 2026-04-21

Abstract

Quantum computing represents one of the most transformative technological shifts in computational science since the advent of classical computing architectures. This systematic literature review (SLR) synthesizes 212 peer-reviewed studies published between 2015 and 2024 to map the current landscape of quantum computing research as it intersects with software development practices, tools, frameworks, and methodologies. Following the PRISMA 2020 guidelines, we searched six major academic databases and identified relevant literature through a rigorous multi-stage screening process. Our analysis reveals five dominant research themes: quantum algorithm development and software frameworks, quantum machine learning integration, quantum cryptography and security applications, quantum software testing and verification, and hybrid quantum-classical software architectures. We further document major challenges including hardware decoherence, limited qubit availability, the absence of mature quantum DevOps pipelines, and a critical shortage of quantum-competent software engineers. The review concludes with a structured research agenda identifying six high-priority gaps where future scholarly work is most urgently needed. This paper provides a foundational reference for software engineers, researchers, and technology strategists seeking to understand and navigate the rapidly evolving quantum software ecosystem.

Keywords

Quantum Computing, Software Development

Downloads

References

1. W. Alosaimi et al., "Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques," AIMS Math., vol. 9, no. 3, pp. 7017–7039, 2024, doi: 10.3934/math.2024342. [Google Scholar] [Crossref]

2. Alharbi et al., "Managing software security risks through an integrated computational method," Intell. Autom. Soft Comput., vol. 28, no. 1, p. 179, Mar. 2021, doi: 10.32604/IASC.2021.016646. [Google Scholar] [Crossref]

3. Alharbi et al., "Novel 59-layer dense inception network for robust deepfake identification," Sci. Rep., vol. 15, no. 1, p. 24159, 2025, doi: 10.1038/s41598-025-03889-6. [Google Scholar] [Crossref]

4. Alharbi et al., "Selection of data analytic techniques by using fuzzy AHP TOPSIS from a healthcare perspective," BMC Med. Inform. Decis. Mak., vol. 24, no. 1, p. 240, 2024, doi: 10.1186/s12911-024-02651-8. [Google Scholar] [Crossref]

5. F. Alassery, A. Alzahrani, A. I. Khan, A. Khan, M. Nadeem, and M. T. J. Ansari, "Quantitative evaluation of mental-health in type-2 diabetes patients through computational model," Intell. Autom. Soft Comput., vol. 32, no. 3, 2022, doi: 10.32604/IASC.2022.023314. [Google Scholar] [Crossref]

6. M. Ahmad et al., "Healthcare device security assessment through computational methodology," Comput. Syst. Sci. Eng., vol. 41, no. 2, 2022, doi: 10.32604/csse.2022.020097. [Google Scholar] [Crossref]

7. Attaallah, S. Khatri, M. Nadeem, S. A. Ansar, A. K. Pandey, and A. Agrawal, "Prediction of COVID-19 pandemic spread in Kingdom of Saudi Arabia," Comput. Syst. Sci. Eng., vol. 37, no. 3, 2021, doi: 10.32604/CSSE.2021.014933. [Google Scholar] [Crossref]

8. F. Arute et al., "Quantum supremacy using a programmable superconducting processor," Nature, vol. 574, no. 7779, pp. 505–510, 2019. [Google Scholar] [Crossref]

9. H. Alyami et al., "Analyzing the data of software security life-span: Quantum computing era," Intell. Autom. Soft Comput., vol. 31, no. 2, 2022, doi: 10.32604/iasc.2022.020780. [Google Scholar] [Crossref]

10. H. Alyami et al., "The evaluation of software security through quantum computing techniques: A durability perspective," Appl. Sci., vol. 11, no. 24, 2021, doi: 10.3390/app112411784. [Google Scholar] [Crossref]

11. K. Bharti et al., "Noisy intermediate-scale quantum algorithms," Rev. Mod. Phys., vol. 94, no. 1, p. 015004, 2022. [Google Scholar] [Crossref]

12. J. Biamonte et al., "Quantum machine learning," Nature, vol. 549, no. 7671, pp. 195–202, 2017. [Google Scholar] [Crossref]

13. M. Cerezo et al., "Variational quantum algorithms," Nat. Rev. Phys., vol. 3, no. 9, pp. 625–644, 2021. [Google Scholar] [Crossref]

14. E. Farhi, J. Goldstone, and S. Gutmann, "A quantum approximate optimization algorithm," arXiv preprint arXiv:1411.4028, 2014. [Google Scholar] [Crossref]

15. M. Fingerhuth, T. Babej, and P. Wittek, "Open source software in quantum computing," PLOS ONE, vol. 13, no. 12, p. e0208561, 2018. [Google Scholar] [Crossref]

16. S. S. Gill et al., "Quantum computing: A taxonomy, systematic review and future directions," Softw. Pract. Exp., vol. 52, no. 1, pp. 66–114, 2022. [Google Scholar] [Crossref]

17. L. K. Grover, "A fast quantum mechanical algorithm for database search," in Proc. 28th Annu. ACM Symp. Theory Comput., 1996, pp. 212–219. [Google Scholar] [Crossref]

18. Hakami et al., "Clinical characteristics and early outcomes of hospitalized COVID-19 patients with end-stage kidney disease in Saudi Arabia," Int. J. Gen. Med., vol. 14, 2021, doi: 10.2147/IJGM.S327186. [Google Scholar] [Crossref]

19. W. Harrow, A. Hassidim, and S. Lloyd, "Quantum algorithm for linear systems of equations," Phys. Rev. Lett., vol. 103, no. 15, p. 150502, 2009. [Google Scholar] [Crossref]

20. F. Kirmani, "Detecting strongly-lensed supernovae in wide-field space telescope imaging via deep learning," arXiv e-prints, Art. no. arXiv:2512.19886, 2025, doi: 10.48550/arXiv.2512.19886. [Google Scholar] [Crossref]

21. F. Kirmani, B. Lane, and J. Rose, "Identifying proteotypic peptides via deep learning," in Proc. 11th Int. Conf. Bioinformatics Res. Appl. (ICBRA '24), New York, NY, USA: ACM, 2025, pp. 42–47, doi: 10.1145/3700666.3700691. [Google Scholar] [Crossref]

22. F. Kirmani, B. J. Lane, and J. R. Rose, "Exploring machine learning techniques to improve peptide identification," in Proc. IEEE 19th Int. Conf. Bioinformatics Bioeng. (BIBE), Athens, Greece, 2019, pp. 66–71, doi: 10.1109/BIBE.2019.00021. [Google Scholar] [Crossref]

23. F. Kirmani, A. S. Unni, V. P. Kulkarni, K. Lackey, and J. R. Rose, "Detecting polar ring galaxies via deep learning," RAS Tech. Instrum., vol. 4, p. rzaf043, 2025, doi: 10.1093/rasti/rzaf043. [Google Scholar] [Crossref]

24. S. Kirmani, "Exploiting graph embedding for parallelism and performance," Ph.D. dissertation, Dept. Comput. Sci. Eng., Pennsylvania State Univ., University Park, PA, USA, 2014. [Online]. Available: https://etda.libraries.psu.edu/catalog/27325 [Google Scholar] [Crossref]

25. S. Kirmani and K. Madduri, "Spectral graph drawing: Building blocks and performance analysis," in Proc. IEEE Int. Parallel Distrib. Process. Symp. Workshops (IPDPSW), Vancouver, BC, Canada, 2018, pp. 269–277, doi: 10.1109/IPDPSW.2018.00053. [Google Scholar] [Crossref]

26. S. Kirmani, J. Park, and P. Raghavan, "An embedded sectioning scheme for multiprocessor topology-aware mapping of irregular applications," Int. J. High Perform. Comput. Appl., vol. 31, no. 1, pp. 91–103, 2017, doi: 10.1177/1094342015597082. [Google Scholar] [Crossref]

27. S. Kirmani and P. Raghavan, "Scalable parallel graph partitioning," in Proc. Int. Conf. High Perform. Comput. Netw. Storage Anal. (SC '13), New York, NY, USA: ACM, 2013, pp. 1–10, doi: 10.1145/2503210.2503280. [Google Scholar] [Crossref]

28. S. Kirmani and M. Shankar, "Generating keywords by associative context with input words," U.S. Patent US10699302B2, Jun. 30, 2020. [Online]. Available: https://patents.google.com/patent/US10699302B2/en [Google Scholar] [Crossref]

29. S. Kirmani, H. Sun, and P. Raghavan, "A scalability and sensitivity study of parallel geometric algorithms for graph partitioning," in Proc. 30th Int. Symp. Comput. Archit. High Perform. Comput. (SBAC-PAD), Lyon, France, 2018, pp. 420–427, doi: 10.1109/CAHPC.2018.8645916. [Google Scholar] [Crossref]

30. F. Leymann and J. Barzen, "The bitter truth about gate-based quantum algorithms in the NISQ era," Quantum Sci. Technol., vol. 5, no. 4, p. 044007, 2020. [Google Scholar] [Crossref]

31. Mishra, S. Kirmani, and K. Madduri, "Fast spectral graph layout on multicore platforms," in Proc. 49th Int. Conf. Parallel Process. (ICPP '20), New York, NY, USA: ACM, 2020, Art. no. 45, pp. 1–11, doi: 10.1145/3404397.3404471. [Google Scholar] [Crossref]

32. Mishra, S. Kirmani, and K. Madduri, "Fast sentence classification using word co-occurrence graphs," in Proc. IEEE Int. Conf. Big Data (BigData), Washington, DC, USA, 2024, pp. 620–629, doi: 10.1109/BigData62323.2024.10825869. [Google Scholar] [Crossref]

33. E. Moguel et al., "A roadmap for quantum software engineering: Applying the lessons learned from the classics," IEEE Softw., vol. 39, no. 1, pp. 28–35, 2022. [Google Scholar] [Crossref]

34. M. Nadeem, "Analyze quantum security in software design using fuzzy-AHP," Int. J. Inf. Technol., 2024, doi: 10.1007/s41870-024-02002-w. [Google Scholar] [Crossref]

35. M. Nadeem, M. Ahmad, M. Ahmad, P. C. Pathak, S. Gupta, and H. Pandey, "Evaluating the factors of CGTMSE scheme in bank by using fuzzy AHP," in Proc. 6th Int. Conf. Contemporary Comput. Informatics (IC3I), 2023, vol. 6, pp. 56–61, doi: 10.1109/IC3I59117.2023.10397669. [Google Scholar] [Crossref]

36. M. Nadeem et al., "Deep learning approach for classifying DDoS attack traffic in SDN environments," J. Inf. Secur. Cybercrimes Res., vol. 7, no. 2, pp. 109–126, Dec. 2024, doi: 10.26735/VNFU3495. [Google Scholar] [Crossref]

37. M. Nadeem, P. C. Pathak, M. Ahmad, and N. A. Farooqui, "Identification of security factors in cloud computing: Defence security perspective," in Computational Intelligence Applications in Cyber Security, CRC Press, 2024, pp. 78–99. [Google Scholar] [Crossref]

38. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, 10th Anniversary ed. Cambridge, U.K.: Cambridge Univ. Press, 2010. [Google Scholar] [Crossref]

39. NIST, "Post-quantum cryptography standards," National Institute of Standards and Technology, 2024. [Online]. Available: https://www.nist.gov/pqcrypto [Google Scholar] [Crossref]

40. M. J. Page et al., "The PRISMA 2020 statement: An updated guideline for reporting systematic reviews," BMJ, vol. 372, p. n71, 2021. [Google Scholar] [Crossref]

41. Peruzzo et al., "A variational eigenvalue solver on a photonic quantum processor," Nat. Commun., vol. 5, p. 4213, 2014. [Google Scholar] [Crossref]

42. M. Piattini et al., "The quantum software challenge," IEEE Softw., vol. 38, no. 3, pp. 7–11, 2021. [Google Scholar] [Crossref]

43. J. Preskill, "Quantum computing in the NISQ era and beyond," Quantum, vol. 2, p. 79, 2018, doi: 10.22331/q-2018-08-06-79. [Google Scholar] [Crossref]

44. O. Samuel, N. Javaid, T. A. Alghamdi, and N. Kumar, "Towards sustainable smart cities: A secure and scalable trading system for residential homes using blockchain and artificial intelligence," Sustain. Cities Soc., vol. 76, p. 103371, 2022, doi: 10.1016/j.scs.2021.103371. [Google Scholar] [Crossref]

45. P. W. Shor, "Algorithms for quantum computation: Discrete logarithms and factoring," in Proc. 35th Annu. Symp. Found. Comput. Sci., 1994, pp. 124–134. [Google Scholar] [Crossref]

46. J. Tyler, J. Pastor, M. N. Huhns, S. Kirmani, and H. Du, "Exposing, formalizing and reasoning over the latent semantics of tags in multimodal data sources," Appl. Ontol., vol. 8, no. 2, pp. 95–130, 2013, doi: 10.3233/AO-130124. [Google Scholar] [Crossref]

47. Weder et al., "The quantum software lifecycle," in Proc. 1st ACM SIGSOFT Int. Workshop Archit. Paradigms Eng. Quantum Softw., 2021, pp. 2–9. [Google Scholar] [Crossref]

48. J. Zhao, "Quantum software engineering: Landscapes and horizons," arXiv preprint arXiv:2007.07047, 2020. [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles