{"id":"https://openalex.org/W7139105903","doi":"https://doi.org/10.48550/arxiv.2603.15668","title":"Quantum-Secure-By-Construction (QSC): A Paradigm Shift For Post-Quantum Agentic Intelligence","display_name":"Quantum-Secure-By-Construction (QSC): A Paradigm Shift For Post-Quantum Agentic Intelligence","publication_year":2026,"publication_date":"2026-03-12","ids":{"openalex":"https://openalex.org/W7139105903","doi":"https://doi.org/10.48550/arxiv.2603.15668"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.15668","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.15668","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.15668","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083907005","display_name":"Arit Kumar Bishwas","orcid":"https://orcid.org/0000-0001-8064-2035"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bishwas, Arit Kumar","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129970103","display_name":"Mousumi Sen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sen, Mousumi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130140871","display_name":"Albert Nieto-Morales","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nieto-Morales, Albert","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129832702","display_name":"Joel Jacob Varghese","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Varghese, Joel Jacob","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5083907005"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.43790000677108765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.43790000677108765,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.11110000312328339,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.07090000063180923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.49230000376701355},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4221999943256378},{"id":"https://openalex.org/keywords/orchestration","display_name":"Orchestration","score":0.41280001401901245},{"id":"https://openalex.org/keywords/quantum-pseudo-telepathy","display_name":"Quantum pseudo-telepathy","score":0.37959998846054077},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.37689998745918274},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.3756999969482422},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.3720000088214874},{"id":"https://openalex.org/keywords/paradigm-shift","display_name":"Paradigm shift","score":0.33709999918937683}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.707099974155426},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.49230000376701355},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4221999943256378},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.41280001401901245},{"id":"https://openalex.org/C147323434","wikidata":"https://www.wikidata.org/wiki/Q7269086","display_name":"Quantum pseudo-telepathy","level":5,"score":0.37959998846054077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37929999828338623},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.37689998745918274},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3756999969482422},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.3720000088214874},{"id":"https://openalex.org/C43540301","wikidata":"https://www.wikidata.org/wiki/Q689971","display_name":"Paradigm shift","level":2,"score":0.33709999918937683},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.33230000734329224},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.3199000060558319},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.29249998927116394},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28940001130104065},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28369998931884766},{"id":"https://openalex.org/C78203541","wikidata":"https://www.wikidata.org/wiki/Q2566969","display_name":"BB84","level":5,"score":0.2734000086784363},{"id":"https://openalex.org/C5320026","wikidata":"https://www.wikidata.org/wiki/Q2122216","display_name":"Quantum information science","level":4,"score":0.2612000107765198},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.25699999928474426},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.2549999952316284},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2547000050544739},{"id":"https://openalex.org/C15706264","wikidata":"https://www.wikidata.org/wiki/Q230883","display_name":"Quantum state","level":3,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.15668","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.15668","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.15668","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.15668","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"score":0.627576470375061,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"As":[0],"agentic":[1,73,211,225],"artificial":[2],"intelligence":[3,226],"systems":[4,21,75],"scale":[5],"across":[6,111,160],"globally":[7,234],"distributed":[8],"and":[9,14,100,115,124,142,154,173,180,190,194,203,227,237],"long":[10],"lived":[11],"infrastructures,":[12],"secure":[13,53,65,105,192],"policy":[15],"compliant":[16],"communication":[17,66],"becomes":[18],"a":[19,59,68,86,147,219,229],"fundamental":[20],"challenge.":[22],"This":[23],"challenge":[24],"grows":[25],"more":[26],"serious":[27],"in":[28],"the":[29,33,129,161,185,200],"quantum":[30,52,64,94,96,101,191,207,224],"era,":[31],"where":[32],"cryptographic":[34,158],"assumptions":[35],"built":[36],"into":[37,209],"today's":[38],"AI":[39,74,212],"deployments":[40],"may":[41],"not":[42],"remain":[43],"valid":[44],"over":[45],"their":[46],"operational":[47,201],"lifetime.":[48],"Here,":[49],"we":[50,183],"introduce":[51],"by":[54,126],"construction,":[55],"or":[56],"QSC,":[57],"as":[58,67,218],"design":[60],"paradigm":[61,221],"that":[62,91,152,196],"treats":[63],"core":[69],"architectural":[70],"property":[71],"of":[72,205],"rather":[76],"than":[77],"an":[78],"upgrade":[79],"added":[80],"later.":[81],"We":[82],"realize":[83],"QSC":[84,145,197,217],"through":[85],"runtime":[87],"adaptive":[88],"security":[89,134,208],"model":[90],"combines":[92,155],"post":[93,223],"cryptography,":[95],"random":[97],"number":[98],"generation,":[99],"key":[102],"distribution":[103],"to":[104,131,137],"interactions":[106],"among":[107],"autonomous":[108],"agents":[109],"operating":[110],"heterogeneous":[112],"cloud,":[113],"edge,":[114],"inter":[116,168],"organizational":[117],"environments.":[118],"The":[119],"approach":[120],"is":[121],"cryptographically":[122],"pluggable":[123],"guided":[125],"policy,":[127],"allowing":[128],"system":[130,177],"adjust":[132],"its":[133],"posture":[135],"according":[136],"infrastructure":[138],"availability,":[139],"regulatory":[140],"constraints,":[141],"performance":[143],"needs.":[144],"contributes":[146],"governance":[148],"aware":[149],"orchestration":[150],"layer":[151],"selects":[153],"link":[156],"specific":[157],"protections":[159],"full":[162],"agent":[163,169],"lifecycle,":[164],"including":[165],"session":[166],"bootstrap,":[167],"coordination,":[170],"tool":[171],"invocation,":[172],"memory":[174],"access.":[175],"Through":[176],"level":[178],"analysis":[179],"empirical":[181],"evaluation,":[182],"examine":[184],"trade":[186],"offs":[187],"between":[188],"classical":[189],"mechanisms":[193],"show":[195],"can":[198],"reduce":[199],"complexity":[202],"cost":[204],"introducing":[206],"deployed":[210],"systems.":[213,241],"These":[214],"results":[215],"position":[216],"foundational":[220],"for":[222,232],"establish":[228],"principled":[230],"pathway":[231],"designing":[233],"interoperable,":[235],"resilient,":[236],"future":[238],"ready":[239],"intelligent":[240]},"counts_by_year":[],"updated_date":"2026-03-20T20:54:20.808490","created_date":"2026-03-20T00:00:00"}
