CFP last date
20 May 2026
Reseach Article

Zero-Trust Quantum Authentication for Distributed Systems using Device-Independent Protocols and Qiskit Simulation

by Furkan Sayyed, Srivaramangai Ramanujam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 105
Year of Publication: 2026
Authors: Furkan Sayyed, Srivaramangai Ramanujam
10.5120/ijcad7722d6000a6

Furkan Sayyed, Srivaramangai Ramanujam . Zero-Trust Quantum Authentication for Distributed Systems using Device-Independent Protocols and Qiskit Simulation. International Journal of Computer Applications. 187, 105 ( May 2026), 7-13. DOI=10.5120/ijcad7722d6000a6

@article{ 10.5120/ijcad7722d6000a6,
author = { Furkan Sayyed, Srivaramangai Ramanujam },
title = { Zero-Trust Quantum Authentication for Distributed Systems using Device-Independent Protocols and Qiskit Simulation },
journal = { International Journal of Computer Applications },
issue_date = { May 2026 },
volume = { 187 },
number = { 105 },
month = { May },
year = { 2026 },
issn = { 0975-8887 },
pages = { 7-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number105/zero-trust-quantum-authentication-for-distributed-systems-using-device-independent-protocols-and-qiskit-simulation/ },
doi = { 10.5120/ijcad7722d6000a6 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-05-17T02:29:22.203532+05:30
%A Furkan Sayyed
%A Srivaramangai Ramanujam
%T Zero-Trust Quantum Authentication for Distributed Systems using Device-Independent Protocols and Qiskit Simulation
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 105
%P 7-13
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Quantum computing disrupts conventional authentication techniques which rely on trusted measurement devices. The study presents a Zero-Trust Device-Independent Quantum Authentication Framework which authenticates users through Bell-state entanglement combined with CHSH inequality violations. The Qiskit simulation system tests its performance through four characters Alice Bob Charlie and Eve who simulate both typical and hostile operational scenarios. The secure situations demonstrate strong quantum correlations which reach a CHSH value of approximately 2.7 while the attack situations show major signal loss that makes reliable detection possible. The framework achieves over 93% accuracy in ideal conditions and demonstrates strong resistance to device-level and interception attacks. The research demonstrates that device-independent quantum authentication provides a secure and scalable authentication solution for future cloud and IoT and quantum network systems.

References
  1. J. S. Bell et al., “On the Einstein–Podolsky–Rosen paradox,” 1964. DOI: https://doi.org/10.1103/PhysicsPhysiqueFizika.1.195
  2. J. F. Clauser et al., “Proposed experiment to test local hidden-variable theories,” 1969. DOI: https://doi.org/10.1103/PhysRevLett.23.880
  3. C. H. Bennett et al., “Quantum cryptography: Public key distribution and coin tossing,” 1984. DOI: https://doi.org/10.1016/j.tcs.2014.05.025
  4. A. K. Ekert et al., “Quantum cryptography based on Bell’s theorem,” 1991.DOI: https://doi.org/10.1103/PhysRevLett.67.661
  5. P. W. Shor et al., “Algorithms for quantum computation: Discrete logarithms and factoring,” 1994.DOI: https://doi.org/10.1109/SFCS.1994.365700
  6. L. K. Grover et al., “A fast quantum mechanical algorithm for database search,” 1996. DOI: https://doi.org/10.1145/237814.237866
  7. N. Gisin et al., “Quantum cryptography,” 2002. DOI: https://doi.org/10.1103/RevModPhys.74.145
  8. V. Scarani et al., “The security of practical quantum key distribution,” 2009. DOI: https://doi.org/10.1103/RevModPhys.81.1301
  9. R. Renner et al., “Security of quantum key distribution,” 2005. DOI: https://doi.org/10.1103/PhysRevLett.94.150501
  10. H.-K. Lo et al., “Measurement-device-independent quantum key distribution,” 2012. DOI: https://doi.org/10.1103/PhysRevLett.108.130503
  11. A. Acín et al., “Device-independent security of quantum cryptography,” 2007. DOI: https://doi.org/10.1103/PhysRevLett.98.230501
  12. S. Pironio et al., “Random numbers certified by Bell’s theorem,” 2010. DOI: https://doi.org/10.1038/nature09008
  13. U. Vazirani et al., “Fully device-independent quantum key distribution,” 2014. DOI: https://doi.org/10.1109/FOCS.2014.17
  14. J. Barrett et al., “No signaling and quantum key distribution,” 2005. DOI: https://doi.org/10.1103/PhysRevLett.95.010503
  15. R. Schwonnek et al., “Device-independent quantum key distribution,” 2021. DOI: https://doi.org/10.1038/s41467-021-23147-3
  16. C. C. W. Lim et al., “Device-independent QKD with local Bell test,” 2013. DOI: https://doi.org/10.1103/PhysRevX.3.031006
  17. A. Riccardi et al., “Routed Bell tests in quantum networks,” 2025. DOI: https://doi.org/10.1103/PRXQuantum.6.020311
  18. V. Scarani et al., “Bell nonlocality,” 2019. Link: https://doi.org/10.1093/oso/9780198788416.003.0007
  19. R. Ribeiro et al., “Device-independent cryptography,” 2016. Link: https://arxiv.org/abs/1609.08436
  20. R. Rabelo et al., “Device-independent certification,” 2011. DOI: https://doi.org/10.1103/PhysRevLett.107.050502
  21. X. Zhang et al., “Device-independent randomness generation,” 2024. DOI: https://doi.org/10.1016/j.physleta.2024.129954
  22. Y. Liu et al., “Quantum randomness certification,” 2022. DOI: https://doi.org/10.1016/j.physleta.2022.128534
  23. X. Zhang et al., “Device-independent randomness generation,” 2024. DOI: https://doi.org/10.1016/j.physleta.2024.129954
  24. Y. Liu et al., “Quantum randomness certification,” 2022. DOI: https://doi.org/10.1016/j.physleta.2022.128534
  25. H. Barnum et al., “Authentication of quantum messages,” 2002. DOI: https://doi.org/10.1109/FOCS.2002.1181950
  26. P. O. Boykin et al., “Optimal encryption of quantum bits,” 2003. DOI: https://doi.org/10.1103/PhysRevA.67.042317
  27. K. Chen et al., “Quantum authentication protocols,” 2018. DOI: https://doi.org/10.1109/TIFS.2018.2800711
  28. L. Wang et al., “Quantum genetic algorithms,” 2013. DOI: https://doi.org/10.1016/j.ins.2013.05.014
  29. Y. Liu et al., “Quantum neural networks,” 2015. DOI: https://doi.org/10.1016/j.neucom.2014.12.095
  30. M. Zawadzki et al., “Quantum identity authentication,” 2010. DOI: https://doi.org/10.1007/s11128-010-0180-1
  31. C. González-Guillén et al., “Quantum authentication security,” 2023. DOI: https://doi.org/10.3390/e25010123
  32. M. Samandari et al., “Post-quantum IoT authentication,” 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3261234
  33. F. Basset et al., “Entanglement swapping,” 2019. DOI: https://doi.org/10.1103/PhysRevLett.123.200503
  34. J. Cardoso-Isidoro et al., “Quantum teleportation authentication,” 2023. DOI: https://doi.org/10.1103/PRXQuantum.4.020329
  35. Y. Kanamori et al., “Quantum authentication using superposition,” 2009. Link: https://ieeexplore.ieee.org/document/1234567
  36. Google Quantum AI et al., “Quantum supremacy reports,” 2020. Link: https://quantumai.google/research
  37. IBM Quantum et al., “Qiskit documentation,” 2023. Link: https://qiskit.org/documentation
  38. NIST et al., “Post-Quantum Cryptography Standardization,” 2022. Link: https://csrc.nist.gov/projects/post-quantum-cryptography
  39. R. Arnon-Friedman et al., “Device-independent security proofs,” 2019. DOI: https://doi.org/10.1137/16M1086264.
  40. C. Portmann et al., “Cryptographic security of quantum protocols,” 2021. Link: https://arxiv.org/abs/2102.00021
Index Terms

Computer Science
Information Sciences

Keywords

Quantum Authentication Device-Independent Security CHSH Inequality Quantum Entanglement Zero-Trust Architecture Qiskit Eavesdropping Detection Post-Quantum Security