Key Takeaways
- The threat of quantum computing to current encryption standards is an immediate concern, not a future one.
- Harvest now, decrypt later attacks necessitate a proactive migration to post-quantum encryption.
- Developing post-quantum zero-knowledge proofs (ZKPs) is crucial but faces challenges in funding and maturity.
- PLONK is an example of a post-quantum ZKP implementation, though it requires further testing.
- Significant investment and specialized knowledge are needed to accelerate post-quantum ZKP development.
Quantum Computing: A Present Danger to Encryption
Gianluca Di Bella, a researcher focused on smart contracts and zero-knowledge proofs, emphasizes that the threat posed by quantum computing is not a distant possibility but a current reality. He shared these insights during a discussion with Cointelegraph at UN City in Copenhagen.
Di Bella advocates for an immediate transition to post-quantum encryption standards. This urgency stems from harvest now, decrypt later attacks, a strategy where sensitive data is intercepted and stored today, with the expectation that future quantum computers will be able to decrypt it. This poses a significant risk for long-term data security, especially for individuals or groups requiring sustained privacy, such as dissidents in authoritarian regimes.
💡 While practical, commercial-grade quantum computing might still be a decade or more away, Di Bella warns that major corporations like Microsoft and Google could develop decryption solutions much sooner. He also highlighted the issue of quantum washing, where companies make exaggerated or unsubstantiated claims about quantum systems. Furthermore, he expressed concern that if a nation like China were to achieve a breakthrough in breaking current cryptography, they would likely not share this capability with the rest of the world.
The Impact on Zero-Knowledge Proofs
Should quantum computing reach the necessary scale and power, it could compromise the foundational security of traditional encryption and zero-knowledge proofs (ZKPs). This could lead to the decryption of previously secured data and the forging of proofs generated by current ZK systems, potentially undermining verification processes and enabling the falsification of valid statements.
Several post-quantum encryption standards, such as ML-KEM, ML-DSA, and SLH-DSA, have already been approved by the National Institute of Standards and Technology (NIST). However, a comparable, mature standard for post-quantum ZKPs is still under development. Di Bella is actively involved in this research area through Mood Global Services, a smart contract development company he co-founded.
Di Bella mentioned PLONK (Permutations over Lagrange bases for Oecumenical Noninteractive arguments of Knowledge) as a promising implementation of post-quantum ZKPs. However, he noted that these are not yet battle tested and are currently considered experimental research implementations.
💡 The development of ZK-proof systems often involves low-level programming in languages like Rust, demanding a high degree of specialized knowledge and offering little abstraction. This complexity can be compared to the early days of programming, requiring a deep understanding of mathematical principles rather than relying on high-level programming languages.
Challenges and the Path Forward for Post-Quantum ZKPs
Predicting the timeline for PLONK development to reach a stage suitable for widespread adoption is challenging. Di Bella highlighted a significant hurdle: the lack of investment in this specialized field. Due to its niche nature and the complex expertise required, attracting investment and accelerating development is difficult.
If you are a research and development manager of any corporation, you don’t invest in something that you don’t understand, Di Bella explained, illustrating the barrier to entry for potential investors.
He further elaborated that ZK-proof development is heavily reliant on intricate, low-level programming with minimal abstraction. This demanding process requires a deep dive into complex mathematical concepts, making it less accessible compared to modern, high-level programming languages that abstract away much of the underlying complexity.
Expert Summary
Gianluca Di Bella stresses the immediate need to adopt post-quantum encryption due to the threat of harvest now, decrypt later attacks. While progress is being made in post-quantum encryption standards, the development of secure and mature post-quantum zero-knowledge proofs remains a significant challenge, requiring greater investment and research to overcome its complexity and ensure future data security.




