Quantum Authentication for Data Security: A Review of Data Leakage Protection Strategies
Authors
Abdullah Fairuzullah Ahmad Tajuddin
Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah (Malaysia)
Faculty of Computing, Universiti Malaysia Pahang Al-Sultan Abdullah (Malaysia)
Article Information
DOI: 10.47772/IJRISS.2025.914MG00243
Subject Category: Management
Volume/Issue: 9/14 | Page No: 3179-3187
Publication Timeline
Submitted: 2025-12-04
Accepted: 2025-12-10
Published: 2025-12-24
Abstract
This research proposes and details a quantum authentication methodology as a promising and essential solution for enhancing data security in credit card transactions, specifically focusing on data leakage protection. Unlike conventional approaches such as blockchain, quantum authentication offers unbroken spoofing protection and does not require extensive data archiving. The practical implementation involves the establishment of secure communication channels using Quantum Key Distribution (QKD) between the Point-of-Sale (POS) terminal and the bank, the dynamic generation of a quantum-enhanced CVV, and the encryption of transaction data with post-quantum algorithms, including Lattice-based Cryptography, designed to resist future quantum attacks. Data Leakage Protection (DLP) systems, incorporating tokenization and encryption, are integral to secure data storage and processing throughout the entire transaction lifecycle. The methodology is underpinned by rigorous mathematical proofs and integrates various quantum authentication methods, such as Key-Controlled Maximally Mixed Quantum State Encryption, Three-Factor Quantum Biometric Authentication, and a Triple Security Mechanism, to provide robust security against unauthorized access and fraudulent activities. While offering significant advancements in security, challenges remain in its widespread adoption, including complexities in implementation efficiency, potential for message collisions, seamless integration with existing systems, and the requirement for specialized hardware. Furthermore, tokenization, though crucial, faces limitations such as technical complexity, interoperability issues, ongoing maintenance, and susceptibility to Electromagnetic Interference (EMI). This research highlights the critical need for continued development to fully leverage quantum technologies in securing financial data.
Keywords
Data Security, Blockchain, Data Leakage Protection
Downloads
References
1. Ahuja, B., Prabha, C., & Garg, G. (2025). Emerging Technologies in E-Commerce Security. Strategic Innovations of AI and ML for E-Commerce Data Security, 235-260. [Google Scholar] [Crossref]
2. Arele, A., & Sejwar, V. (2017). A Survey on E-Payment using Quantum and Visual Cryptography. International Journal of Advanced Research in Computer Science, 8(5). [Google Scholar] [Crossref]
3. Bhattacharyya, D., Ranjan, R., Alisherov, F., & Choi, M. (2009). Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2(3), 13-28. [Google Scholar] [Crossref]
4. Chen, X.-B., Sun, Y.-R., Xu, G., & Yang, Y.-X. (2019). Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing. Information Sciences, 501, 172-181. [Google Scholar] [Crossref]
5. Chen, X., Wang, B., & Li, H. (2024). A privacy-preserving multi-factor authentication scheme for cloud-assisted IoMT with post-quantum security. Journal of Information Security and Applications, 81, 103708. [Google Scholar] [Crossref]
6. Choi, M., Oh, S., Kim, I., Heo, J., & Kim, H. (2024). Extracting Payment Tokens Out of Sounds Produced by Magnetic Field Fluctuations. IEEE Transactions on Mobile Computing, 23(9), 8803-8821. doi:10.1109/TMC.2024.3359266 [Google Scholar] [Crossref]
7. Choi, M., Oh, S., Kim, I., & Kim, H. (2022). MagSnoop: listening to sounds induced by magnetic field fluctuations to infer mobile payment tokens. Paper presented at the Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services. [Google Scholar] [Crossref]
8. Das, D., & Das, A. (2024). Blockchain-Enabled Distributed Payment Card Tokenization System. Paper presented at the 2024 IEEE 5th India Council International Subsections Conference (INDISCON). [Google Scholar] [Crossref]
9. G A, S., Prabha, R., Avudainayaki, R., Sundaram, S., & Nithyashri, J. (2024). Advanced Mathematical Application of Cryptographic Protocols in Distributed Ledger Technologies and Digital Currency Systems. [Google Scholar] [Crossref]
10. Guan, Y., & Tick, A. (2024). Literature Review on Security of Personal Information in Electronic Payments. Paper presented at the 2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI). [Google Scholar] [Crossref]
11. Li Mo, Chen Feiliang, Li Qian, Zhang Lijun, Wang Pidong, Yao Yao, & Jian, Z. (2018). Quantum authentication method of triple security mechanism. [Google Scholar] [Crossref]
12. Lim, N.-H., Choi, J.-W., Kang, M.-S., Yang, H.-J., & Han, S.-W. (2023). Quantum authentication method based on key-controlled maximally mixed quantum state encryption. EPJ Quantum Technology, 10(1), 1-19. [Google Scholar] [Crossref]
13. Lukas, N., Salem, A., Sim, R., Tople, S., Wutschitz, L., & Zanella-Béguelin, S. (2023). Analyzing leakage of personally identifiable information in language models. 2023 IEEE Symposium on Security and Privacy (SP), 346-363. [Google Scholar] [Crossref]
14. Madje, U. P., & Pande, M. B. (2024). A Conceptual Model of Quantum Cryptography Techniques used to Provide Online Banking Transactions Security. Paper presented at the 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies. [Google Scholar] [Crossref]
15. Momeni, M. R., Jabbari, A., & Fung, C. (2024). A Privacy-Preserving and Secure Scheme for Online Payment in the Realm of Mobile Commerce. Paper presented at the 2024 IEEE International Conference on Cyber Security and Resilience (CSR). [Google Scholar] [Crossref]
16. Monyk, C. (2019). Quantum Cryptography. Foundations of Physics, 40, 494-531. doi:10.1007/978-3-642-04117-4_8 [Google Scholar] [Crossref]
17. Munoz-Ausecha, C., Ruiz-Rosero, J., & Ramirez-Gonzalez, G. (2021). RFID applications and security review. Computation, 9(6), 69. [Google Scholar] [Crossref]
18. Pavani, P., & Daftary, M. (2017). QUANTUM SECURE AUTHENTICATION (QSA) FOR SMART CARDS. Retrieved from https://consensus.app/papers/quantum-secure-authentication-qsa-for-smart-cards-pavani-daftary/e2ab8594b7945674940cec126df1dcbc/ [Google Scholar] [Crossref]
19. Rani, E., Sakthimohan, M., Amuthaguka, D., Gnanapriya, P., Naveena, G., & Ashok, A. (2023). QR Code-Based Login with Robust RSA Algorithm Encryption. Paper presented at the 2023 International Conference on Intelligent Technologies for Sustainable Electric and Communications Systems (iTech SECOM). [Google Scholar] [Crossref]
20. Rieffel, E., & Polak, W. (2011). Quantum Computing: A Gentle Introduction. doi:10.5860/choice.49-0911 [Google Scholar] [Crossref]
21. Roland, M., & Langer, J. (2013). Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on {EMV} Contactless. Paper presented at the 7th USENIX Workshop on Offensive Technologies (WOOT 13). [Google Scholar] [Crossref]
22. Salim, A., Susilowati, T., & Sejati, H. (2024). Consumer Data Protection In Electronic Transaction Practices In E-Commerce. Journal of Economics, Technology & Business/Jurnal Ekonomi Teknologi & Bisnis (JETBIS), 3(8). [Google Scholar] [Crossref]
23. Sasikala, V., & CH, B. S. (2024). Data Leakage Detection and Prevention Using Ciphertext-Policy Attribute Based Encryption Algorithm. Paper presented at the 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO). [Google Scholar] [Crossref]
24. Shenoy, K. A. (2024). A Novel Approximation Algorithm for the Shortest Vector Problem. IEEE Access, 12, 141026-141031. doi:10.1109/ACCESS.2024.3469368 [Google Scholar] [Crossref]
25. Solat, S. (2017). Security of electronic payment systems: A comprehensive survey. arXiv preprint arXiv:1701.04556. [Google Scholar] [Crossref]
26. Sunderajulu, K. B. (2024). eCommerce & Digital Wallet Payment Fraud. Deleted Journal. Value in Health, 2(6), https://doi.org/10.62127/aijmr.62024.v62102i62106.61111. [Google Scholar] [Crossref]
27. Tang, L., Hui, X., Chen, J., Guo, H., & Wu, F. (2023). Self-powered, anti-detectable wireless near-field communication strategy based on mechano-driven Maxwell’s displacement current. Nano Energy, 118, 109001. doi:https://doi.org/10.1016/j.nanoen.2023.109001 [Google Scholar] [Crossref]
28. Voldman, L. (2018). Apparatus and method for payment authorization and authentication based tokenization. In: Google Patents. [Google Scholar] [Crossref]
29. Win, M. Z., Pinto, P. C., & Shepp, L. A. (2009). A mathematical theory of network interference and its applications. Proceedings of the IEEE, 97(2), 205-230. [Google Scholar] [Crossref]
Metrics
Views & Downloads
Similar Articles
- The Indirect Effect of Liquidity and Activity on Company Value with Profitability as an Intervening Variable
- Effect of Financial Skills, Knowledge, and Attitude on The Financial Behaviour of Clergy
- A Decade of Review: Trends in Budget Execution and Financial Performance of Development Projects in Tanzania (2014/15-2023/24)
- The Influence of Pre-Project Planning on the Budget Absorption Rate of Public Funded Infrastructure Projects in Kenya a Comparative Case Study of Narok, Migori, and Kisii County Government Projects
- Assessment of Factors Influencing Digital Transformation in Hotels’ Facility Management in Abuja Metropolis, Nigeria