Quantum Computing in US Banking: The Future of Fraud Prevention and Financial Crime Detection

Authors

  • Ashok Ghimire Westcliff University, USA Author

DOI:

https://doi.org/10.70445/gjeac.1.2.2025.31-50

Keywords:

Quantum Computing, Fraud Prevention, Cybersecurity, Financial Crime, Quantum AI, Regulatory Compliance, Real-time Transaction Monitoring

Abstract

As an attempt to fight sophisticated financial crimes, US banks are getting into new technologies on this front, and quantum computing can be viewed as a game changer in this area. Unmatched computational power is available through quantum technology for use in fraud detection that is ahead of its time, real-time transaction monitoring, and quantum resistant encryption. Quantum computing, therefore, offers solutions for financial institutions that are currently facing threats of cyber-attacks, insider fraud, and compliance to various regulations with its quantum enhanced artificial intelligence (QAI) and quantum safe encryption. The adoption of the quantum computing, however, is met with a great number of challenges, such as high implementation costs, a shortage of qualified staff and constantly changing cybersecurity threats. Quantum powered cyber-attacks requires transition from the classical cryptography to the post quantum cryptography to protect sensitive banking data. Regulatory compliance is still a major issue even for banks, and the goal for the industry is to collaborate between banks, tech firms, and government agencies in order to create industry wide security standards. For US banks to prepare for this quantum powered future, they will need to spend in research, develop strategic partnerships, and train their cybersecurity professionals. As quantum technology is adopted at the beginning, quantum fraud prevention technologies 

Downloads

Published

2025-02-28

How to Cite

1.
Ghimire A. Quantum Computing in US Banking: The Future of Fraud Prevention and Financial Crime Detection. Glob. J. Emerg. AI Comput. [Internet]. 2025 Feb. 28 [cited 2025 Mar. 13];1(2):31-50. Available from: https://gjeac.com/index.php/GJEAIC/article/view/10