Post-Quantum Cryptography for securing Electronic Health Records in the South African Public Healthcare System

Authors

  • Kabelo Given Chuma University of South Africa, South Africa
Pages Icon

DOI:

https://doi.org/10.63158/journalisi.v8i1.1423

Keywords:

Electronic Health Records, Post-Quantum Cryptography, Quantum Computing Threats, Cybersecurity Policy, South African Public Healthcare

Abstract

The growing dependency on Electronic Health Records (EHRs) has intensified the exposure of sensitive patient information to advanced cybersecurity threats, including those posed by quantum computing technologies. South African public hospitals depend on conventional encryption mechanisms to secure EHRs; however, these methods are susceptible to quantum threats. The study explored quantum-resistant cryptography for securing EHRs in South African healthcare. The study adopted a phenomenological approach, employing semi-structured interviews with 12 ICT specialists, policymakers, health information managers and cybersecurity practitioners. The study established a misalignment between national digital health and cybersecurity strategies and future quantum threats, as they prioritise digital transformation, data security and interoperability. Public hospitals were found to be reliant on conventional encryption methods, resulting in structural lock-in and impeding adaptability of post-quantum cryptography. Although stakeholders demonstrated awareness of quantum threats, organisational readiness remains constrained by technical, institutional and capacity barriers. It is concluded that South African public healthcare system remains behind towards post-quantum security transformation. The study recommends the development of a roadmap for post-quantum cryptographic migration, system modernisations and capacity building to strengthen the security of EHRs. The findings provide evidence-based guidance for policymakers to strengthen digital health security and resilience of EHRs in public healthcare systems.

Downloads

Download data is not yet available.

References

[1] M. K. Hossain, J. Sutanto, P. W. Handayani, A. A. Haryanto, J. Bhowmik, and V. Frings-Hessami, “An exploratory study of electronic medical record implementation and recordkeeping culture: The case of hospitals in Indonesia,” BMC Health Services Research, vol. 25, no. 1, pp. 1–20, 2025, doi: 10.1186/s12913-025-12399-0.

[2] R. Margam, “The importance of EHR in revolutionizing healthcare delivery and financial success,” Int. J. Comput. Trends Technol., vol. 71, pp. 52–55, 2023, doi: 10.14445/22312803/IJCTT-V71I7P108.

[3] A. Kuzior, I. Tiutiunyk, A. Zielińska, and R. Kelemen, “Cybersecurity and cybercrime: Current trends and threats,” Journal of International Studies, vol. 17, no. 2, pp. 220–239, 2024, doi: 10.14254/2071-8330.2024/17-2/12.

[4] S. Gupta, M. Kapoor, and S. K. Debnath, “Cybersecurity risks and threats in healthcare,” in Artificial Intelligence-Enabled Security for Healthcare Systems: Safeguarding Patient Data and Improving Services. Cham, Switzerland: Springer Nature, 2025, pp. 39–64, doi: 10.1007/978-3-031-82810-2_3.

[5] O. J. Tiwo et al., “Advancing security in cloud-based patient information systems with quantum-resistant encryption for healthcare data,” Asian Journal of Research in Computer Science, vol. 18, no. 4, pp. 187–208, 2025, doi: 10.9734/ajrcos/2025/v18i4615.

[6] T. Anuradha et al., “Quantum-resilient framework for healthcare data security using multivariate polynomial cryptography,” International Journal of System Assurance Engineering and Management, pp. 1–12, 2025, doi: 10.1007/s13198-025-02954-7.

[7] A. S. Ashour and D. Koundal, “Quantum computing in Healthcare 5.0,” in Quantum Computing for Healthcare Data. Amsterdam, Netherlands: Academic Press, 2025, pp. 43–62, doi: 10.1016/B978-0-443-29297-2.00009-5.

[8] S. Chahar, “Exploring the future trends of cryptography,” in Next Generation Mechanisms for Data Encryption. Boca Raton, FL, USA: CRC Press, 2024, pp. 234–257.

[9] M. SaberiKamarposhti et al., “Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data,” Heliyon, vol. 10, no. 10, 2024.

[10] E. P. Nittala, “Design and evaluation of quantum-resilient cryptographic protocols for national information systems security,” Int. J. Emerging Trends Comput. Sci. Inf. Technol., vol. 5, no. 2, pp. 132–142, 2024, doi: 10.55248/gengpi.6.0425.1586.

[11] A. Alif, K. F. Hasan, J. Laeuchli, and M. J. M. Chowdhury, “Quantum threat in healthcare IoT: Challenges and mitigation strategies,” arXiv preprint, arXiv:2412.05904, 2024, doi: 10.48550/arXiv.2412.05904.

[12] C. K. Gitonga, “The impact of quantum computing on cryptographic systems: Urgency of quantum-resistant algorithms and practical applications in cryptography,” European Journal of Information Technologies and Computer Science, vol. 5, no. 1, pp. 1–10, 2025, doi: 10.24018/ejcompute.2025.5.1.146.

[13] B. Kwame and M. Isabella, “Advancing secure communications: The role of post-quantum cryptography in a digital era,” International Journal of Informatics and Data Science Research, vol. 1, no. 11, pp. 30–50, 2024.

[14] K. Csenkey and A. Graver, “Canada’s national quantum strategy one year on,” Canadian Foreign Policy Journal, vol. 30, no. 3, pp. 295–306, 2024, doi: 10.1080/11926422.2024.2397970.

[15] A. R. Olatunde and O. I. Olope, “Exploring the evolving threats and future directions of cyber security in the age of technologies,” Int. J. Advances Eng. Manage., vol. 6, no. 1, pp. 489–498, 2024, doi: 10.35629/5252-0609489498.

[16] G. Dogbanya et al., “Quantum health policy readiness: Anticipating the next digital disruption in public health,” Journal of Life Science and Public Health, vol. 1, no. 2, pp. 1–7, 2025, doi: 10.69739/jlsph.v1i2.966.

[17] Z. Lin, “Implementation of de novo FAIRification in relational legacy systems: The case of the electronic medical record system for maternal health in Afya.ke,” FAIR Data, FAIR Africa, FAIR World, p. 429, 2025, doi: 10.5281/zenodo.15382966.

[18] T. Okasha, N. M. Shaker, and D. A. El-Gabry, “Mental health services in Egypt, the Middle East, and North Africa,” International Review of Psychiatry, vol. 37, nos. 3–4, pp. 306–314, 2025, doi: 10.1080/09540261.2024.2400143.

[19] K. G. Chuma, “Legacy electronic health record systems as culprit behind cybersecurity risks in public healthcare facilities of South Africa,” Global Security: Health, Science and Policy, vol. 10, no. 1, p. 2532556, 2025, doi: 10.1080/23779497.2025.2532556.

[20] M. H. Khumalo and T. S. Moloi, “Barriers to digital transformation in Gauteng’s municipal health clinics,” Journal of Local Government Research and Innovation, vol. 6, p. 282, 2025, doi: 10.4102/jolgri.v6i0.282.

[21] K. G. Chuma and M. Ngoepe, “Data interoperability of health information systems in public hospitals in the Gauteng province of South Africa,” Insights into Regional Development, vol. 7, no. 4, pp. 84–101, 2025, doi: 10.70132/z6986464949.

[22] V. Braun and V. Clarke, “Conceptual and design thinking for thematic analysis,” Qualitative Psychology, vol. 9, no. 1, pp. 3–26, 2022, doi: 10.1037/qup0000196.

[23] R. H. Adler, “Trustworthiness in qualitative research,” Journal of Human Lactation, vol. 38, no. 4, pp. 598–602, 2022, doi: 10.1177/08903344221116620.

[24] G. S. Lawal, “Post-quantum cryptography for protecting long-term medical data archives,” 2020, doi: 10.13140/RG.2.2.31914.89281.

[25] M. Adil et al., “Quantum computing and the future of healthcare internet of things security: Challenges and opportunities,” IEEE Internet of Things Journal, vol. 12, no. 22, 2025, doi: 10.1109/JIOT.2025.3605040.

[26] A. O. Ezeogu, “Post-quantum cryptography for healthcare: Future-proofing population health databases against quantum computing threats,” Research Corridor Journal of Engineering Science, vol. 2, no. 1, pp. 29–56, 2025.

[27] M. P. Singh et al., “Impact and implications of quantum computing on blockchain-based electronic health record systems,” The Open Bioinformatics Journal, vol. 17, no. 1, pp. 1–15, 2024, doi: 10.2174/0118750362316814240820051945.

[28] H. Joshi, “Quantum computing in health informatics: Enhancing disaster preparedness,” in The Rise of Quantum Computing in Industry 6.0 Towards Sustainability. Cham, Switzerland: Springer, 2024, pp. 101–121, doi: 10.1007/978-3-031-73350-5_7.

Downloads

Published

2026-03-07

Issue

Section

Articles

How to Cite

[1]
K. G. Chuma, “Post-Quantum Cryptography for securing Electronic Health Records in the South African Public Healthcare System”, journalisi, vol. 8, no. 1, pp. 1241–1263, Mar. 2026, doi: 10.63158/journalisi.v8i1.1423.