Hash-Based Zero-Knowledge Technology Quantum-Proof Ethereum – XinXin Fan

Hash-Based Zero-Knowledge Technology Quantum-Proof Ethereum - Xinxin Fan


Dr. XinXin Fan, Head of Cryptography at IoTeX, recently published a research paper titled Enabling Smooth Migration for Ethereum. The research paper won the Best Paper Award from the 2024 International Conference on Blockchain and argues that hash-based zero-knowledge technology is the most user-friendly way to quantum-proof the Ethereum network and other similar cryptosystems.

Dr. Fan explained in an interview with Cointelegraph that the Elliptic Curve Digital Signature Algorithm (ECDSA) currently employed to sign transactions in blockchain systems is quantum vulnerable. However, this vulnerability can be addressed by adding a hash-based zero-knowledge proof—extensible as a zero-knowledge transparent argument of knowledge (ZK-Stark)—to each transaction.

The researcher claims that this method ensures a very convenient transition for users – eliminating the complexity of other proposed quantum protection methods. “The way we implement this allows the user to use their existing wallet, but we associate each transaction with zero-knowledge proof, which is quantum-secure,” said Dr. Fan.

“We have to consider both the safety aspect as well as the usability aspect,” Dr. Fan continued. The researcher stressed that balancing the user experience with security needs is key to ensuring a timely migration to post-quantum standards.

bybit

The ZK authentication service model described in Dr. Fan's paper. Source: Spring Nature

Related: Singapore, French monetary authorities test quantum-proof security

2024 quantum threat

The transition to post-quantum security is critical for end users as the National Institute of Standards and Technology (NIST) recently published the first hard deadline for transitioning to post-quantum signature standards. Measured before 2035.

In October 2024, a South Morning China Post report claimed that Shanghai University researchers had successfully cracked a cryptographic algorithm using a quantum computer.

However, analysis by YouTuber “Mental Outlaw” later revealed that the quantum computer used for the experiment only cracked a 22-bit key. For context, modern encryption standards use keys between 2048 and 4096 bits – meaning that quantum computers have yet to crack the encryption standards.

Other researchers agree that the risks posed by quantum computers are overstated due to the large gap between the current computational capacity of quantum computers and the length of modern encryption keys.

Magazine: Advanced AI systems are already ‘self-aware' – ASI Alliance founder

Pin It on Pinterest