Toppan and the NICT in Japan will develop secure post-quantum data communication, storage, and access technologies for the Healthcare Long-term INtegrity and Confidentiality protection System (H-LINCOS)1 developed by the NICT and its collaborative partners.
Quantum secure cloud technology fuses quantum cryptography and secret sharing technologies to facilitate secure data communication, storage, and use. The establishment of the technology will not only ensure a high level of security that makes tampering and decryption impossible, but also enable the collection, analysis, processing, and use of highly sensitive personal and corporate information accumulated in such fields as medical care, new materials, manufacturing, and finance.
Toppan will use its expertise in smart card security and authentication technology to drive the application of post-quantum public key cryptography and development of authentication systems to facilitate safe and secure management of digital information.
If quantum computing comes into use, it will be possible to decrypt public key cryptography currently used on the Internet. Significant progress has been made in quantum computing technology in recent years. Development and standardization of post-quantum public key cryptography technologies, which are expected to be difficult to crack even in the age of quantum computing, are being advanced in countries around the world.
Access control in H-LINCOS combines an authority matrix based on 26 types of official Japanese healthcare qualification with highly secure user authentication based on post-quantum public key cryptography. However, with the current system, healthcare professionals have to input ID numbers and passwords on dedicated healthcare system terminals.
Based on the information, the terminals control access by verifying identity and cross-checking against a stored post-quantum digital certificate. Going forward, however, there is a need for access control and management that allows healthcare professionals to view the information they need in a way that is simple and secure without touching a terminal. Access control enabled by contactless biometric authentication combined with the reading of ID cards is one