You are on page 1of 26

How Quantum Computing Impacts

Cyber Security And Provides New


Perspectives On Disruptive Innovation
Theory
Module Code: IB3L60
Student Number: U1600116
Word Count: 3979

Table of Contents
Introduction 2

Quantum Computing Overview 3


Quantum Computing Fundamentals 3
The Current Quantum Computing Landscape 3
The Global Quantum Computing Market 4
Quantum Machines: Past to Present 5
Quantum Computing Investment 6
Quantum Computing’s History 9

Disruptive Innovation Literature Review 10


Revolutionary Innovation 11

Quantum Computing’s Development Future 13

Quantum Computing’s Effects On Cyber Security 14


Prime Number Factorisation 14
Quantum Key Distribution (QKD) 15

Post-Quantum Business and Cyber Security 16


Quantum Annealing 16
Quantum as a Service 17
General Post-Quantum Information Systems 18

Challenges to Quantum Computing’s Progress 18

References 20
Introduction
Quantum computing (QC) represents the new technological frontier. Tools are being
created to control entangled quantum states of particles which are so complex that
they can’t be simulated with our best supercomputers. Yoo et al. (2012) defines QC
as a digital innovation because it relies on digital technology platforms to create a
novel computational method. Hitherto considerations don't extend past small,
individual use-cases, despite QC having sizable implications for every industry.
Academically, QC doesn’t conform to the theoretical frameworks surrounding
disruptive digital innovations. These research gaps created the impetus for this
paper, and they will be addressed by augmenting the existing disruptive innovation
frameworks. Using this tool, forecasting the future implications for global markets
becomes more feasible. For example, cyber security’s effects on the development of
QC and its implications in the post-quantum world are overarching and profound. If
delivered at global scale, quantum computing has the potential to provide provably
unbreakable security. Contrastingly, it could empower malicious actors with the
intractable power to hack nearly all existing information systems that use industry
standard cryptographic methods. This paper will outline the fundamentals of
quantum computing, alongside the existing QC landscape. Following this, future
developments of the technology are considered, alongside cyber security as an
example of a use-case that advances quantum computing’s development. Lastly,
this paper analyses the future of quantum computing for global business practices,
especially as they pertain to cyber security, and suggests some challenges to
progress.

2
Quantum Computing Overview

Quantum Computing Fundamentals


Computing systems rely on storing and manipulating information. Classical
computers manipulate individual bits, which store information as binary 0 and 1
states. Contrastingly, quantum computers rely on quantum bits (qubits) to interact
with information. These qubits leverage three quantum mechanical phenomena
(IBM, 2020):
1. Superpositioning: ​Qubits can be a combination of states that are normally
described independently, such as both 1 and 0. A human analogy is playing
two musical notes at once; you hear the notes in superposition.
2. Entanglement: ​The data held in qubits is always affected by data stored in
other qubits, even when the qubits are physically separated from one another
(Holst, 2019).
3. Interference: ​Individual particles can cross their own trajectories and interfere
with the direction of their path.

These phenomena create a computing environment that doesn’t store information as


binary states. It uses qubits, which can be both 1 and 0 at the same time, or a
combination of states, enabling concurrent computations (Holst, 2019). Precisely
because of this, QC is highly applicable to domains where computational costs are a
barrier to progress, such as finance, molecular biology, and cyber security. In fact,
these use-cases are currently the driving force behind its development as a
technology. However, Ladd et al. (2010) argues that QC will only ​replace c​ lassical
computing in specific situations, but will not supersede it in every domain.

The Current Quantum Computing Landscape


Today many companies and countries have recognized the potential of QC in
strategic industries. The main players include start-ups, like D-Wave or Rigetti, and
giant firms like Google or IBM, alongside governments like China and the USA. To
understand the current quantum computing landscape, the global commercial
market, the existing quantum computers, and the investment pipeline will be
analysed.

3
The Global Quantum Computing Market
In 2017 the enterprise cloud computing market was valued at $650m (Lanjudkar,
2019). Forecasts of the global QC market can be unreliable due to the technology’s
infancy, but according to Statista (2019a), who complied multiple market forecasts
(Figure 1), QC will become a billion-dollar industry between 2020 and 2030.

Figure 1: Quantum computing global market projections and forecast


comparison 2017 to 2030 (in million USD)

Statista, 2019a

Tractica (2019a) forecasts enterprise quantum computing revenues to surpass $9bn


by 2030 (Figure 2). This highlights not only the rapid growth of the industry, but its
potential size, representing a comprehensive alteration to the computational
hardware landscape.

4
Figure 2: Size of the enterprise quantum computing market worldwide 2017 to 2030 (in
million USD)

Tractica, 2019a

It is clear from the existing research, limited as it may be in forecasting accuracy,


that quantum computing is poised to become an expansive market. Importantly, this
will create an investment cycle that pushes quantum computing’s development.
Increasing adoption of QC breeds investment in research and development, which
brings the cost per unit of performance down. Consequently, commercialisation of
the technology will increase, completing the cycle.

Quantum Machines: Past to Present


The first working quantum computer was introduced by Chuang et al. (1998) and the
field has shown strong growth since. In 2018, Google’s “Sycamore” processor solved
a computation in 200 seconds which, they claimed, would have taken the best
classical supercomputer 10,000 years. This marks a point at which QC is able to
complete tasks that classical supercomputers feasibly cannot, referred to as
quantum supremacy (Holst, 2019). Alibaba, however, announced that they had
solved the same problem using classical methods. (CB Insights, 2019). Figure 3
plots important quantum machines from the last 20 years, highlighting the strong
growth in qubit capacity.

5
Figure 3: Number of qubits achieved in quantum computers by organisations from
1998 to 2019

CB Insights, 2019

With this trend forecast to continue, demonstrable quantum supremacy is not far in
the distance (Holst, 2019). Figure 3 also suggests American tech companies have
been responsible for the biggest breakthroughs in achieving high qubit machines
until now.

Another important consideration for the state of existing quantum computers is their
relative cost and complexity to configure. Remote access removes the barriers to
adoption for businesses, giving rise to the Quantum as a Service (QaaS) industry.
The business model has some of the largest players contributing to it, despite being
in the inception phase. For example, in 2019 Rigetti announced that their 32-qubit
hybrid quantum computer chip will be available on AWS Braket (AWS, 2020).
Alibaba released an 11-qubit quantum computer to their cloud service in 2018 (Gao
& Mak, 2018) and IBM released a 28-qubit machine called “Raleigh” in 2020 (Chow
& Gametta, 2020).

Quantum Computing Investment


The investment pipeline for quantum computing shows that governments are
realising the importance of developing quantum capabilities. Whilst it is difficult to
compare commitments with different time periods, figure 4 indicates that China,
USA, and EU will pioneer QC investment over the next 5 years.

6
Figure 4: Government investment into quantum computing technology

Holst, 2019

Given the potential importance of QC for national security, it is unsurprising that


China and the USA have committed the most to development spending. China’s
$10bn investment over 3 years relates to their developments in long-distance
communications via entanglements, which are virtually tamper-proof, and quantum
radar, which threatens US stealth technology (Smith-Goodson, 2019). Western
societies have a private-sector culture which is already investing in QC, with the
majority of the highest equity-funded QC companies being from the Americas
alongside a handful of Europeans (Figure 5).

7
Figure 5: Quantum computing companies ranked by total equity funding as of
October 2019 (in million USD)

Statista, 2018

QC is a legislatively sparse area and therefore the superiority of government planned


investment or private sector investment is difficult to predict. However, it is clear
from Figures 5 & 6 that private sector funding appears to be significantly behind
government investment, possibly due to a lack of commercialised QC applications.

8
Figure 6: Quantum Computing Startup Deals and Funding Worldwide From
2012 to 2019

Statista, 2019b

Figure 6 shows that startup funding deals over the past 8 years has only shown
slight growth, but the financial implications have steadily risen. Most notably, since
2017 YoY investment has broken the $100m barrier. Funding has increased as
technology steadily proves its applicability and comes closer to commercial viability.
Notwithstanding, Figure 6 excludes hidden internal investments made by firms, such
as IBM and Alibaba, potentially worth millions of dollars.

Quantum Computing’s History


Radical transformation comes from social movements, incumbent reconfigurations,
and technological landscape developments. Figure 7 outlines the timeline of
important developments pertaining to QC as a radical transformation.

9
Figure 7: Timeline of Quantum Computing Developments

From the time horizon and interdisciplinary approach of academics and businesses
(Figure 7), it is clear that there was no unilateral coordination of research and
development efforts. Interestingly, unilateral approaches to quantum computing
developments may be possible in future. Tushman et al. (1991) argued that products
should be seen as subsystems, each of which is individually innovated. Today’s
technology firms and governments control enough resources to innovate these
subsystems.

Disruptive Innovation Literature Review


Successful digital innovations are often described as generally disruptive, and
frequently as ​disruptive innovations​. According to Christensen and Bower (1995),
disruptive innovation occurs when an incumbent introduces higher-quality products
or services to satisfy the higher-end market, overshooting the needs of mainstream
and low-end customers. This opens the market for entrants to find footholds in less
profitable segments, with which they can quickly improve the performance of their
offerings and move upmarket. Srivastava et al. (2001) argue that this theory enables
broad market-place contexts to be analysed in parallel to emerging or substitute
products. Interestingly, quantum computing does not fit into this theoretical
framework as it overlooks anything other than incremental technology changes
(Adner, 2002). The lack of an interdisciplinary and unilateral approach to its
development thus far undermines this fundamental assumption of disruptive
innovation. QC represents a fundamental departure from the status quo in
computational physics, and as such is a radical innovation.

Schmidt and Druehl (2008) likewise critique disruptive innovation theory, arguing that
inaction of incumbents allows new technology to develop into a sufficient alternative
to the existing conditions. Therefore the new technology is only disruptive in the long

10
run. This theory appears more closely aligned with QC’s trajectory, possibly because
disruptive innovation theory is too focused on market niches and supply-side
interactions (McDowall, 2018; Adner, 2002). An alternative trajectory for digital
innovations was suggested by Phaal et al. (2004), who argued that substantial
improvements in performance become impossible over time due to economic or
technical constraints. The slowdown creates a turbulent environment until a new
dominant design emerges. Given that Moore’s law has begun to fail, thanks to the
dimensional limits of atoms themselves, the new dominant design might be quantum
computing (Spender, 2018). Contrastingly, technological competition analysis has
revealed that transitions between technologies are not due to incumbent
technology’s limits (Cooper & Schendel, 1976; Henderson, 1995). In summary,
disruptive innovation theory does not appear to represent quantum computing’s
trajectory into the mass market. Alternative theories look more promising, but a new
conceptualization is required.

Revolutionary Innovation
To advance understanding of QC’s development trajectory, Figure 8 outlines an
augmented version of the disruptive innovation concept by Christensen et al. (2015).

Figure 8: Revolutionary Innovation Lifecycle

Adapted from Christensen et al., 2015

11
As a revolutionary innovation, rather than simply disruptive, quantum computing
begins from the highest price point per unit of performance and slowly becomes
more attractive for mainstream markets. During phase 1, efficient algorithms do not
exist for each use-case and infrastructure experiences decoherence or lacks qubits.
This makes QC applicable to very few practical situations, and progress is mainly
academic or extremely high risk investments. In phase 2, price per performance unit
begins to fall with increasing speed as the innovation develops with iterative help
from the niche use-cases that it now serves. For example, the UK government
announced £1bn in funding for quantum technologies from a mix of private and
public sector. From this, they expect to realise commercial opportunities that
otherwise would not have been met, proving that financial assistance is necessary to
develop at the requisite speed (Department for Business, Energy & Industrial
Strategy, 2019). Such developments in quantum computing may allow it to tip into
phase 3: a mass market forms, sparking continuous funding for product development
on a larger scale, in tandem with new applications of the technology being found.

From QC’s development history, and its current investment and adoption levels, it is
likely that the technology is coming to the end of phase 2 of the revolutionary
innovation lifecycle. It has entered the realm of niche-use cases, as will be later
discussed, but has not quite hit the high end of the market at the end of phase 2.
This is foreseeable in the future, however as it took nearly 50 years to get to this
point in the life cycle, further developments are not expected soon. In conclusion,
augmenting existing disruptive innovation theory appears to be a more accurate
description of where the technology came from and therefore more likely to forecast
its future.

12
Quantum Computing’s Development Future
Funding for QC is relatively small compared to AI and blockchain, as QC is not
advanced enough to present a viable return on investment for short-term equity
funding (Holst, 2019). However, one alternative measure of the development future
is applications for related patents.

Figure 9: Number of patent applications worldwide from 1999 to 2017

Relecura, 2018a

Increases in patent applications (Figure 9) indicate that research and development is


translating into valuable steps towards commercialisation (Holst, 2019). As an entity
advances knowledge in its subsection of quantum computing, it applies for patents to
protect its investment. Continuing on this trajectory provides protection for
commercial quantum activities, pushing technology developments further. Currently,
America is responsible for over ⅓ of quantum computing patent applications from
1999-2017 (Figure 10).

13
Figure 10: Share of quantum computing patent applications worldwide from
1999-2017, by country

Relecura, 2018b

China and Taiwan make up 22% with few other large individual players, further
highlighting the China vs America competition in this field (Figure 10). Impacts of this
are likely to be moulded by the idiosyncratic political landscape and extent to which
key industries adopt the technology in each country, making them hard to predict.
Overall the development future of quantum computing is bright, with research
translating into patentable technological developments.

Quantum Computing’s Effects On Cyber Security


QC’s impact on the cyber security market exemplifies the revolutionary impact that
this technology may have on other industries. Explaining this requires some
understanding of the types of problems that quantum computers help to solve.

Prime Number Factorisation


Prime factoring is the process of determining the set of prime numbers that multiply
together to equal the original integer N. The classical computer approach is to check,
step-by-step, all possible numbers sequentially from 2 to √N , which increases the
number of operations exponentially with the increase of N (Chiang et al., 2016) .
Even slightly more intelligent factoring algorithms, such as Fermat’s, take an
inordinate number of operations on a supercomputer (Lehman, 1974). Factoring
prime numbers is prevalent in information security because it has superpolynomial
time complexity for conventional computers. Therefore knowing the prime number

14
used to encrypt a file (public key) does not pose a security risk because only the
prime factors of that integer can decrypt it (private keys). The public key can be
published, allowing encrypted communications to be sent between parties. However
only authorised parties (those with the private keys) can decrypt the messages.
These difficulties in factoring primes constitute a fundamental cornerstone of modern
cryptography, especially industry standard encryptions like Rivest-Shamir-Adleman
(RSA) or Elliptic Curve Cryptography (ECC) (Rivest et al., 1983; Miller, 1986).

Quantum computing’s advantages derive from super-positioned qubits doing


calculations in parallel, rather than a classic sequential process. As a result, factoring
primes is trivial for a quantum computer, as proved by Shor’s algorithm (1999).
Quantum computers can, theoretically, make encryptions based on prime number
factorisation redundant by factoring prime integers in polynomial-time (Bermudo
Mera et al., 2019; Wang et al., 2018; Grosshands et al., 2017; Kerner, 2017).
However, Preskill (2018) claims that any meaningful factoring via any variation of
Shor’s algorithm is beyond today’s quantum capabilities because of their noisy and
intermediate-scale (50-200 qubits). Thus, it remains the case that quantum
computing could in the future undermine the fundamental algorithmic principles that
our cyberspace security is based on.

Quantum Key Distribution (QKD)


QKD is a technique which ensures secure distribution of private keys for encryptions.
It uses single photons to transfer information, and generates truly random numbers
to be used as keys to authenticate messages (Yang et al., 2019). Using QKD means
any attempt at eavesdropping on communications will introduce abnormally high
qubit error rates in transmission, and thus warn users of interception (Ekert, 1991).
Using this application of Heisenberg’s uncertainty principle means that QKD provides
provable s​ ecurity, without excessive delay in transmission (Mayers, 2001; Yang et
al., 2019). Demonstration of security is paramount for governments, particularly
military personnel, and therefore explains the interest in patenting quantum
cryptography technologies from specific countries (Figure 11). The patents protect
their investments thus far, and encourage future investments to further the
technology. There is clear cryptographic leadership from China and America, who
combined have more patents than the rest of the world.

15
Figure 11: Number of quantum cryptography patent applications worldwide, as
of 2015, by country

The Economist, 2017

However, QKD is only feasible with fault-tolerant quantum computers which are still
decades away from being available. The quantum cryptography patents (Figure 11)
show that progress is being made, but QKDs are not in the foreseeable future.

Post-Quantum Business and Cyber Security


Quantum computing has made increasing progress towards mass market adoption
and phase 3 of the revolutionary innovation lifecycle. Therefore, it is worth
considering what the potential impacts of QC could be on business environments,
and specifically cyber security, in a future where it is ubiquitous: the post-quantum
world.

Quantum Annealing
Quantum annealing is metaheuristic for finding the minimum of a given function over
a set of finite possible solutions (Stollenwerk et al., 2020). It is best used in
optimisation problems for researchers to find absolute minimum sizes, lengths,
costs, and distances (CB Insights, 2019). For example, Stollenwerk et al. (2020)

16
found optimal trajectories for air traffic management. Alternatively, Google and
D-Wave partnered with Volkswagen to optimise Beijing’s traffic flows (Neukart et al.,
2017). Quantum annealing found ideal paths for each individual vehicle, resulting in
the average congested routes falling from 140 to 58. This is a clear example of
quantum supremacy, but hypothetical applications are even more impressive. For
example, state and topology attacks are two cyber attacks in which a malicious actor
seeks to change the meter or network data, enabling them to interfere with state or
topology estimates, and thus operations (Liu et al., 2009; Kim & Tong, 2013a). To
find the optimal countermeasure to these attacks is equivalent to finding the
minimum vertex cover of the sub-network’s topology (Kim & Tong, 2013b).
Therefore, Javad-Kalbasi et al. (2019) argued that quantum annealing is the
strongest defence mechanism against such attacks, suggesting that in a
post-quantum world we may have even stronger cyber security measures. Equally,
CB Insights (2019) suggest using quantum annealing to optimize aircraft routing
according to weather, airport schedules, passenger information and fuel costs.
Classical computers would take thousands of years to solve this problem.
Summarily, widespread quantum annealing may optimise many practical scenarios
alongside offering improvements to cyber security.

Quantum as a Service
Due to QC’s installation and maintenance costs, QaaS is the only pragmatic delivery
model for global scale quantum computing. Many firms will see no benefit to
developing in-house quantum capabilities, especially if QaaS offers a cost-effective
alternative. Therefore, it is foreseeable that QaaS will be responsible for the majority
of enterprise quantum computing’s $5.8bn market in 2025 (Lanjudkar, 2019). In this
event, global monopoly powers are likely to have condensed into the handful of
companies that offer QaaS. This questions whether a global monopoly on the best
computational technology, especially one with QC’s cyber security implications,
should be controlled by private companies. However, in a future where quantum
computing is available to the mass market, there are benefits to be realised. One
example is Grover’s algorithm (1998) which searches unstructured datasets with
time complexity O(√n) instead of O(n) like classical computers (Wichert, 2016). This
is hyper-efficient for applications like web searches or processing high-scale IoT data
streams, both of which will become more important in future. Alternatively, QaaS
could improve training of AI models because quantum-enabled AI can ingest large
volumes of unstructured data at high velocity (Zhaokai et al., 2014). Simultaneously,
QaaS may empower malicious actors with the tools to undermine the cryptographic
principles upon which our cyber security is based. This is however counterbalanced
by the few entities who own quantum computers, and therefore have usage
oversight. Summarily, the advent of QaaS has huge ethical implications for global

17
monopoly powers, with both the potential to improve our information systems and to
destroy their security.

General Post-Quantum Information Systems


Almost all information systems in the post-quantum world will need to make
alterations to their cyber security measures. Most systems adopt the datagram
transport layer security (DTLS) as the security protocol. Here, industry standard
security is based on RSA or elliptic-curves, and therefore vulnerable to quantum
computing attacks, as discussed earlier. Post-quantum cryptography (PQC) is an
emerging field which attempts to create quantum-resistant systems through
conventional cryptography (Anderson, 2019). One example of PQC’s application is
e-voting security systems that use steganography with cryptography to add sufficient
complexity (Arome et al., 2019). It would be expedient to make integrating
post-quantum security, such as lattice-based cryptosystems, hash functions, or
commutative encryption, mandatory in future (Bermudo Mera et al., 2019; Moldovyan
et al., 2019; Chen et al., 2019). This is because nearly all systems are vulnerable to
quantum information sciences, representing an emerging threat (U.S Government
Accountability Office, 2018). Progress has already been made towards this, such as
evaluating algorithms that withstand quantum-enabled attacks (National Institute of
Standards and Technology, 2017). Consequently, enterprises that want to lead
industries with strong cyber security requirements - which is increasingly becoming
all industries - need a PQC strategy.

Challenges to Quantum Computing’s Progress


A critical consideration for existing quantum computers is that while in use, the
internal operations must be isolated from the outside universe. This is because tiny
leaks of information can disturb fragile quantum waves, which causes the process
called decoherence (Ladd et al., 2010). Resultantly, QCs are difficult to build and
maintain, requiring a laboratory-style environment alongside expertise in computing
and physics (Preskill, 2018). Thanks to these requirements, developments are slow
and fault-tolerant quantum computers remain distant. The criteria for such machines,
set out by DiVincenzo (2000), also creates friction. Subsystems to control the
computer, to measure qubits, and to preserve isolation require different states, thus
fundamentally conflicting with each other (Ladd et al., 2010). Overall, quantum
computers are still, and will remain for the foreseeable future, highly complex to
configure. To overcome this challenge, it is recommendable to invest in the physical
infrastructure and education of individuals who can advance the technology.

18
Furthermore, existing legislative infrastructure needs to be addressed. Under Article
32 of the EU’s General Data Protection Regulation (2018), there is a clause requiring
“state of the art” technical measures to ensure cyber security is appropriate to risks.
Similarly, the FTC requires “reasonable safeguards” under the Federal Trade
Commission Act Section 5 (The US Federal Reserve, 2017). The question of how to
decide what constitutes “state of the art” or “reasonable safeguards” becomes more
salient over time, considering QC’s forecasted growth in the most important
consumer markets in the world (Figure 12).

Figure 12: Size of the enterprise quantum computing market by industry from
2017 to 2030 (in million USD)

Tractica, 2019b

Aerospace, Agriculture, Life Sciences, and Automotive industries have the highest
forecasted quantum computing growth according to Figure 12. These industries
require some of the most stringent regulatory standards, necessitating progressive
legislation in the face of quantum supremacy and its impacts on cyber security.
Currently, law-making ignores the advent of quantum computing, creating a
potentially uncertain environment in which future businesses can operate. The risk of
retrospective legislation undermining existing commercial practices also reduces risk
taking and therefore investment in QC. As such, the legislative environment is
currently a barrier to progress for quantum computing and clarification is required as
to whether citizens have a right to quantum-resistant products and services in the
future.

19
References
AWS (2020) Amazon Braket Hardware Providers. ​Amazon Web Services [online].​
Available at: ​https://aws.amazon.com/braket/hardware-providers/​ [Accessed 19
February 2020]

Adner, R. (2002) When are technologies disruptive? A demand-based view of the


​ 3, pp. 667-688. DOI:
emergence of competition. ​Strategic Management Journal, 2
10.1002/smj.246

Anderson, M. (2019) Quantum cryptography needs a reboot: A failed security


product could someday power large-scale quantum computing - [News], ​IEEE
Spectrum,​ 56(10), pp. 9–10. doi: 10.1109/MSPEC.2019.8847578.

Arome, G., Kayode, A. B., Olusola, A. A., Sunday, A. O., Abimbola, S. O. (2019)
Post-Quantum Crystography System for Secure Electronic Voting, ​Open Computer
Science,​ 9(1), p. 292. doi: 10.1515/comp-2019-0018.

Bermudo Mera, J. M., Liu, S., Sepulveda, J. (2019) Post-Quantum Enabled Cyber
Physical Systems. ​IEEE Embedded Systems Letters, 1 ​ 1(4), pp. 106–110. doi:
10.1109/LES.2019.2895392.

Chen, J., He, D., Peng, C., Zeadally, S. (2019) Isogeny-Based Cryptography: A
Promising Post-Quantum Technique. ​IT Professional, ​21(6), pp. 27–32. doi:
10.1109/MITP.2019.2943136.

Chiang, H., Filimonov, Y., Gutierrez, D., Khitun, A., Khivintsev, Y., Kozhevnikov, A.,
Ranjbar, M. (2016) Prime factorization using magnonic holographic devices, ​Journal
of Applied Physics,​ 120(12), pp. 123901–1.

Chow, J., Gambetta, J. (2020) Quantum Takes Flight: Moving from Laboratory
​ vailable at:
DEmonstrations to Building Systems. ​IBM [online] A
https://www.ibm.com/blogs/research/2020/01/quantum-volume-32/​ [Accessed 19
February 2020]

Christensen, C. M., Bower, J. L. (1995). Disruptive Technologies: Catching the


Wave. ​Harvard Business Review,​ 73(1), pp. 43-43.

Christensen, C. M., Raynor, M., McDonald, R. (2015). What is disruptive innovation?


Harvard Business Review, ​93(12), pp. 44-53.

20
Chuang, I. L., Gersenfeld, N., Kubinec, M. (1998). Experimental Implementation of
Fast Quantum Searching. ​Physical Review Letters, 8 ​ 0(15), pp. 3408-3411.

Cooper. A., Schendel D. (1976). Strategic responses to technological threats.


Business Horizons​ 19(1) pp. 61–69

Department for Business, Energy & Industrial Strategy (2019). ​£1 billion investment
makes UK a frontrunner in quantum technologies.​ [press release] 13 June 2019.
Available at:
https://www.gov.uk/government/news/1-billion-investment-makes-uk-a-frontrunner-in
-quantum-technologies​ [Accessed 23 February 2020]

DiVincenzo, D. P. (2000) The physical implementation of quantum computation.


Fortschritte der Physik (Progress of Physics)​, 48(9), pp. 771–783.

Ekert, A. K. (1991) Quantum cryptography based on Bell’s theorem, ​Physical Review


Letters.​ , 67(6), pp. 661–663

Gao, F., Mak, L. (2018) Alibaba Cloud and CAS Launch One of the World’s Most
Powerful Public Quantum Computing Services. ​Alibaba Cloud [online]​ Available at:
https://www.alibabacloud.com/press-room/alibaba-cloud-and-cas-launch-one-of-the-
worlds-most​ [Accessed 19 February 2020]

General Data Protection Regulation (GDPR). (2018). ​General Data Protection


Regulation (GDPR) of the European Union​ [online] Available at:
https://gdpr-info.eu/art-32-gdpr/ [Accessed 9 May 2018]

Grosshans, F., Lawson, T., Morain, F., Smith, B., (2015). Factoring safe semiprimes
with a single quantum query. ​arXiv preprint arXiv:1511.04385​.​ [Accessed: 15
February 2020]

Grover, L. K. (1998) A framework for fast quantum mechanical algorithms, ​In:​​ACM,


STOC ‘98: Proceedings of the Thirtieth Annual ACM Symposium on Theory of
Computing.​ Dallas, Texas, 24-26 May 1998. New York, USA: ACM.

Henderson R. (1995). Of life cycles real and imaginary: the unexpectedly long old
age of optical lithography. ​Research Policy​ 24(4), pp. 631–643.
10.1016/S0048-7333(94)00790-X

Holst, A. (2019). Quantum Computing: A dossierplus on the state and outlook of the
5th generation of computing.​Statista.​ Statista Inc.. Available at:

21
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/study/61640/quantum-computi
ng/​ [Accessed: 13 February 2020]

IBM (2020) What is Quantum Computing. ​International Business Machines (IBM).


[Online] Available at:
https://www.ibm.com/quantum-computing/learn/what-is-quantum-computing/
[Accessed: 30 January 2020]

Javad-Kalbasi, M., Dabiri, K., Valaee S., Sheikholeslami, A. (2019) Digitally


Annealed Solution for the Vertex Cover Problem with Application in Cyber Security,
2019 IEEE International Conference on Acoustics, Speech and Signal Processing
(ICASSP),​ Brighton, United Kingdom, 12-17 May 2019, New York: IEEE

Kerner, S. M. (2017) Quantum Computing Poses Risks to Cryptography and


Bitcoin?, ​eWeek,​ [Online] Available at:
http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db
=bth&AN=125198565&site=eds-live [Accessed: 15 January 2020]

Kim, J., Tong, L. (2013a) On Topology Attack of a Smart Grid: Undetectable Attacks
and Countermeasures. ​IEEE Journal on Selected Areas in Communications,​ 31(7),
pp. 1294-1305

Kim, J., Tong, L. (2013b) On phasor measurement unit placement against state and
topology attacks. ​IEEE International Conference on Smart Grid Communications.​
Vancouver, Canada, 21-24 October 2013, New York: IEEE

Ladd, T. D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., O’Brien, J. L.
(2010) Quantum computers, ​Nature,​ 464(7285), pp. 45-53.

Lanjudkar, P. (2019). Enterprise Quantum Computing Market Outlook: 2025. ​Allied


Market Research ​[online]. Available at:
https://www.alliedmarketresearch.com/enterprise-quantum-computing-market
[Accessed: 22 February 2020]

Lehman, R. S. (1974) Factoring Large Integers, ​Mathematics of Computation​,


28(126), p. 637. doi: 10.2307/2005940.

Liu, Y., Ning, P., Reiter, M. K. (2009) False data injection attacks against state
estimation in electric power grids. ​Proceedings of the 16th ACM conference on
Computer and communications security​, Chicago, USA, 9-13 November 2009. New
York: IEEE.

22
Mayers, D. (2001) Unconditional Security in Quantum Cryptography, ​Journal of
Association for Computing Machinery​, 48(3), pp. 351–406,
McDowall, W. (2018) Disruptive innovation and energy transitions: Is Chirstensen’s
theory helpful? ​Energy Research & Social Science, 37 pp. 243-246. ​Doi:
10.1016/j.erss.2017.10.049

Miller, V. S. (1986) Use of Elliptic Curves in Cryptography. ​In​: Williams H.C. (eds)
Advances in Cryptology: CRYPTO ’85 Proceedings​. Berlin, Springer. Pp.416-426.

Moldovyan, A. A., Moldovyan, D. N., Moldovyan, N.A., (2019). Post-quantum


commutative encryption algorithm, ​Computer Science Journal of Moldova,​ 27(3), pp.
299-317. Available at:
http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db
=edsdoj&AN=edsdoj.0835f79b7caf44bda6240c26011f6821&site=eds-live
[Accessed: 22 February 2020]

National Institute of Standards and Technology (2017). Candidate


Quantum-Resistant Cryptographic Algorithms Publicly Available. ​Nist.gov [online].
Available at:
https://www.nist.gov/newsevents/news/2017/12/candidate-quantum-resistant-cryptog
raphic-algorithms-publicly-available [Accessed: 16 February 2020]

Neukart, F., Compostella, G., Seidel, C., von Dollen, D., Yarkoni, S., Parney, B.
​ , p 26.
(2017) Traffic flow optimization using a quantum annealer. ​Frontiers in ICT, 4
https://doi.org/10.3389/fict.2017.00029

Phaal, R., Farrukh, C. J. O, Probert, D. R. (2004) Technology roadmapping - A


planning framework for evolution and revolution. ​Technological Forecasting and
Social Change​, 71(1), pp. 5-26. Doi: ​https://doi.org/10.1016/S0040-1625(03)00072-6

Preskill, J., (2018). Quantum Computing in the NISQ era and beyond. ​Quantum,​ ​2,​
p.79. DOI: ​https://doi.org/10.22331/q-2018-08-06-79

Relecura. (2018a). Number of quantum computing patent applications worldwide


from 1999 to 2017. ​Statista.​ Statista Inc.. Available at:
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/947914/quantum-co
mputing-patent-applications-worldwide/​ [Accessed: 15 February 2020]

Relecura. (2018b).​ Share of quantum computing patent applications worldwide from


1999 to 2017, by country/geography*.​ ​Statista.​ Statista Inc.. Available at:

23
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/947927/quantum-co
mputing-patent-applications-share-by-country/​ [Accessed: 22 February 2020]

Rivest, R. L., Shamir, A., Adleman, L. (1983) A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems, ​Communications of the ACM​, 26(1),
p.96. Available at:
http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db
=edb&AN=5221774&site=eds-live [Accessed: 28 February 2020]

Schmidt, G. M., Druehl, C. T. (2008) When is a Disruptive Innovation Disruptive?


The Journal of Product Innovation Management,​ 25(4), pp. 347-369.

Shor, P. (1999) Polynomial-Time Algorithms for Prime Factorization and Discrete


Logarithms on a Quantum Computer. ​SIAM Review.​ 41(2), pp. 303-332

Smith-Goodson, P. (2019) Quantum USA Vs. Quantum China: The World’s Most
Important Technology Race. ​Forbes.com [​ online]. Available at:
https://www.forbes.com/sites/moorinsights/2019/10/10/quantum-usa-vs-quantum-chi
na-the-worlds-most-important-technology-race/#4415c4ff72de​ [Accessed: 16
February 2020]

Spender, M. (2018). The End of Moore’s Law. ​US Black Engineer and Information
​ 1(1), p.76.
Technology, 4

Srivastava, R. K., Fahey, L., Christensen, H. L. (2001) The resource-based view and
marketing: The role of market-based assets in gaining competitive advantage.
Journal of Management, 2 ​ 7, pp. 777-802​. D
​ oi​: ​10.1177/014920630102700610

Statista. (2018). ​Quantum computing companies ranked by total equity funding as of


October 2019 (in million U.S. dollars)*.​ ​Statista.​ Statista Inc.. Available at:
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/948545/quantum-co
mputing-companies-by-funding-worldwide/​ [Accessed: 13 February 2020]

Statista. (2019a). Quantum computing global market projections and forecast


comparison 2017 to 2030 (in million U.S. dollars). Statista. ​Statista Inc..​ Available at:
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/936010/quantum-co
mputing-future-market-outlook-forecast/​ [Accessed: 15 February 2020]

Statista. (2019b). Quantum computing startup deals and funding worldwide from
2012 to 2019. Statista. Statista Inc.. Available at:

24
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/950790/quantum-co
mputing-equity-funding-worldwide/​ [Accessed: 15 February 2020]

Stollenwerk, T., O’Gorman, B., Venturelli, D., MAndra, S., Rodionova, O., Ng, H.,
Sridhar, B., Rieffel, E. G., Biswas, R​.​ (2020) Quantum Annealing Applied to
De-Conflicting Optimal Trajectories for Air Traffic Management, ​IEEE Transactions
on Intelligent Transportation Systems, ​21(1), pp. 285–297. doi:
10.1109/TITS.2019.2891235.

The Economist. (2017). Number of quantum cryptography patent applications


worldwide, as of 2015, by country. Statista. ​Statista Inc​.. Available at:
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/693636/worldwide-q
uantum-cryptography-patent-applications-by-country/​ [Accessed: 15 February 2020]

The US Federal Reserve (2017) ​Federal Trade Commission Act Section 5: Unfair or
Deceptive Acts or Practices.​ The US Federal Reserve [online]. Chapter 311, Statute
719. Available at: ​ https://www.federalreserve.gov/boarddocs/supmanual/cch/ftca.pdf
[Accessed 22 February 2020]

Tractica. (2019a). Size of the enterprise quantum computing market worldwide from
2017 to 2030 (in million U.S. dollars). Statista. ​Statista Inc​.. Available at:
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/962845/global-enter
prise-quantum-computing-market/​ [Accessed: 15 February 2020]

Tractica. (2019b). ​Size of the enterprise quantum computing market by industry from
2017 to 2030 (in million U.S. dollars)*​. ​Statista​. Statista Inc.. Available at:
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/962882/global-enter
prise-quantum-computing-market-by-industry/​ [Accessed: 22 February 2020]

Tushman, M. L., Anderson, P. C., O’Reilly, C. (1991). Technology cycles, innovation


streams, ambidextrous organizations: organizational renewal through innovation
streams and strategic change, ​In​: Tushman, M.L. Anderson, P.C. (eds) (1997)
Managing Strategic Innovation and Change, O ​ xford University Press: New York.

U.S. Government Accountability Office (2018)​ National Security: Long-Range


Emerging Threats Facing the United States as Identified by Federal Agencies,​
[online] Dallas, USA: U.S. Government Accountability Office. Available at:
https://www.gao.gov/products/GAO-19-204SP [Accessed: 16 February 2020]

Wang, H., Wang, Y., Zhang, H. (2018) Quantum Polynomial-Time Fixed-Point Attack
for RSA. ​China Communications,​ 15(2), pp. 25-32. DOI: 10.1109/CC.2018.8300269

25
Wichert, A. (2016). Artificial Intelligence and a Universal Quantum Computer. ​AI
Communications. 2 ​ 9(4) pp. 537-545. DOI 10.3233/AIC-160699

Yang, W., Peisong, Y., Qianchuan, Z. (2019) Industry Trusted Network


Communication Based on Quantum Encryption. ​2019 Chinese Control Conference
(CCC)​ pp. 7016–7022. doi: 10.23919/ChiCC.2019.8865710.

Yoo, Y., Boland, Jr R.J., Lyytinen, K., Majchrzak, A. (2012) Organizing for innovation
in the digitized world. ​Organization Science​ 23(5), pp.1398–1408

Zhaokai, L., Xiaomei, L., Nanyang, X., jiangfeng, D. (2014) Experimental Realization
of Quantum Artificial Intelligence. ​Physical Review Letters​ 114(14) doi:
10.1103/PhysRevLett.114.140504.

26

You might also like