1 Department of Computer and Electrical Engineering, University of Delaware, USA.
2 Department of Public Health, University of Health and Allied Sciences, Ghana.
International Journal of Science and Research Archive, 2025, 14(01), 612-622
Article DOI: 10.30574/ijsra.2025.14.1.0127
Received on 02 December 2024; revised on 11 January 2025; accepted on 13 January 2025
Quantum computation bridges the foundations of computer science and quantum mechanics, holding transformative potential for healthcare systems. This paper explores quantum computing's enhancement of cybersecurity in healthcare systems through quantum encryption implementation. Our 12-month study at the Royal Hospital in Ghana, leveraging cloud-based quantum computing services, demonstrates quantitative improvements of 66.67% in data throughput and 71.88% in decryption speed (p < 0.001) compared to traditional encryption systems. Through rigorous performance and security testing using quantum simulation and cloud-based quantum resources, we show that quantum-based encryption algorithms offer statistically significant improvements in both data processing efficiency (p < 0.001) and resistance to advanced cyberattacks (resistant to 98.7% of quantum attacks compared to 45.3% for traditional systems). While implementation costs remain a challenge (estimated at 5,000,000 GHS), the enhanced security and efficiency metrics suggest quantum encryption is a viable solution for securing sensitive healthcare information. This study provides empirical evidence supporting the integration of quantum cryptography with existing healthcare infrastructure, particularly in resource-constrained environments.
Quantum Computing; Healthcare Cybersecurity; Quantum Encryption; Medical Data Security; Quantum Cryptography; QSVM; QNN; Healthcare Informatics
Preview Article PDF
Eric Jhessim and Veronica Anku. Quantum computing for cybersecurity in healthcare systems: A multi-modal approach. International Journal of Science and Research Archive, 2025, 14(01), 612-622. Article DOI: https://doi.org/10.30574/ijsra.2025.14.1.0127.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0