Advancing trusted security for the future quantum world
Sharon Dolmans is leading a new project to develop societally-aligned, trusted security solutions for quantum cryptography of the future.

Our future society looks likely to use quantum technologies to enhance our computing, communication, and sensing capabilities. However, such enhancements come with caveats, in the form of new security threats. How can we prepare society for the age of quantum technologies? And how can we protect and secure our sensitive data in the face of the quantum future? Sharon Dolmans believes that the key to integrating quantum technologies in society is an interdisciplinary approach to ensure that solutions are useful as well as accepted and trusted.
The phrase āquantum technologyā evokes different reactions from people depending on who you talk to. Those in the field may view it as cool technology, while those outside the field and those among the general public may express concerns about what the quantum future might bring.
Quantum technology is an exciting field full of possibilities, but there are a lot of unknowns too, which is what makes it so interesting and challenging.
For Sharon Dolmans, assistant professor at the department of Industrial Engineering and Innovation Sciences at ¹ū¶³“«Ć½, the phrase quantum technology means something else. āItās an exciting field full of possibilities, but there are a lot of unknowns too, which is what makes it so interesting and challenging. Many quantum technology experts are still in the dark as to where it will be used. So, the general public and scientific experts partially agree on this.ā
This potential societal impact is also what makes the field of quantum technology so fascinating to Dolmans, who has a background in business and finance, and a PhD in technology commercialization. āI like working at the intersection of those developing the technology and those in society whoāll end up using the technology. Itās a technology with lots of potential, but weāre still some way from using it our everyday lives.ā

Quantum technology users
But what is quantum technology? Well, quantum technology can be placed in three categories. First, there is the use of quantum computing for super-complex computations. Second is quantum communication for ultra-secure communications. And the third category relates to quantum sensing, which involves sensors that can detect the tiniest of fluctuations, and would be useful in navigation and in the detection of anomalies under the ground that might be associated with earthquakes.
With such varied applications, it means that the first regular users of quantum technologies in society will also be quite varied. āThe first users are of course scientists and researchers, they are the ones developing the technologies and thereafter applying them in various fields such as materials science, chemical engineering, and numerical simulations.ā
Down the line though, there is a plethora of societal actors (such as large corporations, small businesses, and civilians) who will be implementing and managing quantum infrastructure in the future, as Dolmans explains. āAll sorts of sectors will turn to quantum technology in the future such as healthcare and pharma, the energy sector, logistics and automotive, the financial sector, and defense. And civilians and society at large will be users too.ā
āMust haveā versus ānice to haveā
Quantum technology will have lots of potential applications, but Dolmans is quick to highlight that these applications could be categorized as either āmust haveā or ānice to haveā. āFrom the ānice to haveā perspective, quantum technology will enhance a range of industries, while also leading to the establishment of new types of industry. Itās a step into the unknown, an exciting unknown. Quantum tech might not be used in washing machines, but itāll help to solve difficult numerical problems that our current computers might take eons to solve. Quantum computers will add to our current systems, rather than replacing them.ā
But itās the āmust haveā applications that Dolmans has high on the agenda, and for good reason, as these applications can affect the lives of everyone in society. āThe arrival of the quantum computer will pose a threat to societyās safety and security. Suddenly, weāll have computers that are powerful enough to easily hack todayās information systems ā the same information systems that we use to communicate sensitive information in healthcare, the energy sector, the financial sector, and the defense sector. In these sectors, we donāt have the luxury to wait and see what happens. Here, technology experts and societal actors need to take joint action now to avoid massive security breaches in the future.ā
The arrival of the quantum computer will pose a threat to societyās safety and security.
For example, some malicious parties adopt an approach known as āstore now, decrypt laterā. In other words, these parties store private, encrypted data that they have intercepted between communicating parties. These parties donāt have the encryption keys to read the data. Instead, theyāll decrypt this data using a quantum computer once it becomes available. āWith this potential threat to our private data, it is urgent that we can take action now,ā notes Dolmans.
Another ānice to haveā is the development of solutions for and with organizations in society. āThis would make them more useful and effective as the solutions would not be developed in isolation, but based on the needs of potential end-users.ā

Funding solutions
Dolmans is now well-placed to address this urgency thanks to recent from the Societal impact of quantum technology programme of the National Science Agenda (NWA). In a project known as Fieldlab Quantum Cryptograph Solutions for Safe Safety, or FIQCS for short, Dolmans will act as project coordinator as along with her collaborators, they seek to co-develop high-quality security solutions in quantum cryptography with societal stakeholders that will be broadly accepted, implemented, and trusted by society.
āBesides ¹ū¶³“«Ć½, FIQCS will also involve TNO, co-funding organizations Effect Photonics, IDquantique, and Single Quantum, and aims to engage key relevant societal stakeholders such as banks, automotive companies, and defense organizations. At ¹ū¶³“«Ć½, Iāll be working closely with both Chigo Okonkwo and Idelfonso Tafur Monroy from the Centre for Quantum Materials and Technology Eindhoven (QT/e) and the Eindhoven Hendrik Casimir Institute (EHCI),ā says Dolmans.
In broad terms, Dolmans and her collaborators are seeking to mitigate the issues posed by malicious parties such as the aforementioned āstore now, decrypt laterā approach to sensitive and private data. āJust one quantum computer could pose a significant threat to society, so we need security solutions that society can count on. But to develop these solutions, we need to conclusively find out which parties require these security protocols, who are the end-users, and what are their specific needs.ā
Such information will help to guide Dolmans and the researchers in their pursuit of quantum security solutions, and to make sure these are aligned with the needs of society. āWe need to develop these solutions in close consultation with societal stakeholders ā thatās the best way to proceed.ā
The path of quantum key distribution
A promising and viable quantum communication approach for a safe and secure society is known as quantum key distribution (QKD). This approach allows two parties to produce a shared random secret key that is known only to them. This secret key can be used to encrypt and to decrypt messages transmitted over a standard communication channel such as over the internet. The difference with standard encryption in existing communication is that it is based on quantum mechanics.
This approach would allow someone using QKD to detect if a third party were trying to learn something about the key itself, because in measuring the quantum system they would permanently disturb or change it. āWith this approach, an eavesdropper trying to gather information on the quantum key would be immediately noticed as their presence introduces an abnormal high error rate in the communication between sender and receiver,ā notes Dolmans. āHowever, as of yet, there are neither standardized nor certified systems in place for this approachā.
The roadmap will help organizations to align their own security solutions, quantum development processes and technologies, and as a result, reduce development costs and risks.
To achieve the goals of the project, Dolmans and her collaborators will be working on four aspects to further develop quantum key distribution solutions as part of a unique interdisciplinary project. These aspects are roadmapping, the establishment of a fieldlab to develop and test QKD approaches by building on existing regional and national testing facilities for QKD, infrastructure and architecture to support the use of QKD, and launching a central information point to share educational information on QKD.
Dolmans will be mainly working on the roadmapping aspect of the project. āIāve got a number of aims for this part of the project. First up, Iād like to determine a common understanding on the potential impact of quantum computers on security for different groups of stakeholders. Next, Iāll be seeking to identify and prioritize security requirements across these various stakeholders. After that, itāll be important to identify important short-term and long-term technical, economic, and societal enablers and barriers to QKD. And the final goal is to key ways to develop, test, standardize, certify, and implement QKD in society. The roadmap will help organizations to align their own security solutions, quantum development processes and technologies, and as a result, reduce development costs and risks.ā

Right on time
Quantum computers are on the way, thatās for sure and concurrently, itās inevitable that QKD developments will follow suit as QKD will be one of the go-to security approaches for quantum communications. As a result, itās imperative that these developments are steered in the right way.
Given the enormous societal impact, security solutions must be designed in close consultation with those who will use them in the end.
āDevelopments shouldnāt be left to only those working on the technologies,ā says Dolmans. āGiven the enormous societal impact, security solutions must be designed in close consultation with those who will use them in the end. They need to match what society needs, and the solutions need to be trusted. This can only be achieved with an interdisciplinary approach, which is whatās so great about the FIQCS project.ā
But is this project too little, too late in terms of quantum security? Not according to Dolmans: āI would say it is right on time. To properly involve organizations and society at large, there need to be meaningful discussions on real feasible technologies. The technologies are in development, and progressing very quickly. Quantum computers are coming, and we need to plan the right security response as soon as possible, which entices societal stakeholders like companies, governments, and universities to get involved from the outset.ā
Media contact
Quantum Week 2025: Research on quantum in the spotlight
More quantum and photonics research
![[Translate to English:] [Translate to English:]](https://assets.w3.tue.nl/w/fileadmin/_processed_/f/c/csm_1%20Banner%20image%20BvOF_2025_0331_0678%20Rianne%20Lous%20_%20Yuri%20van%20der%20Werf_a462304340.jpg)


Latest news


