Hash-based zero-knowledge tech can quantum-proof Ethereum — XinXin Fan

As a seasoned analyst with over two decades of experience in the field of cybersecurity and blockchain technology, I find Dr. XinXin Fan’s research to be both timely and significant. The smooth transition towards post-quantum security is a crucial step for any cryptographic system, especially Ethereum, given the impending deadline set by NIST.


Dr. XinXin Fan, who leads cryptography at IoTeX, recently collaborated on a research paper titled “Facilitating a Seamless Transition Towards Quantum-Resistant Security for Ethereum.” This scholarly work was honored with the Best Paper award at the 2024 International Conference for Blockchain. The paper suggests that hash-based zero-knowledge technology is the most accessible method for safeguarding Ethereum’s network and similar cryptographic systems against quantum computing threats.

During an interview with CryptoMoon, Dr. Fan pointed out that the digital signature techniques (ECDSA) used in modern blockchain systems to verify transactions are susceptible to attacks by quantum computers. To mitigate this issue, he suggested adding a proof of knowledge – specifically a zero-knowledge scalable transparent argument of knowledge (ZK-Stark) – to each transaction.

Dr. Fan emphasized the importance of addressing both the ease of use and the safety concerns, as finding a harmony between user-friendly features and robust security measures is crucial for a smooth transition towards post-quantum standards.

The quantum scare of 2024

A smooth transition to post-quantum security for end users is paramount, as the National Institute of Standards and Technology (NIST) recently published the first hard deadline for legacy systems to migrate to post-quantum signature standards — advising institutions to adopt quantum-resistant measures before 2035.

In October 2024, a report by the South China Morning Post stated that scientists at Shanghai University managed to crack encrypted data using a quantum computer, according to their findings.

To put it another way, an investigation by YouTuber “Mental Outlaw” found out that the quantum computer employed in the study was only capable of breaking a key with 22 digits. For clarification, current encryption protocols utilize keys ranging from 2048 to 4096 digits – implying that quantum computers have yet to breach these encryption standards.

Many other experts share the view that the danger from quantum computers is currently overstated, as there’s a significant gap between what quantum computers can do now in terms of number factoring and the strength of today’s encryption keys.

Read More

2024-11-23 23:10