- Quantum computing poses an immediate risk to encryption through “harvest now, decrypt later” attacks.
- Migration to post-quantum encryption standards is advised to protect sensitive data over long periods.
- Post-quantum zero-knowledge proof (ZK-proof) standards are still experimental and lack widespread adoption.
- Development in post-quantum cryptography faces slow progress due to complexity and limited investment.
Gianluca Di Bella, a researcher in smart contracts and zero-knowledge proofs, highlighted the present danger of quantum computing to current encryption methods. Speaking from UN City in Copenhagen, he urged immediate transition to post-quantum encryption standards to prevent “harvest now, decrypt later” attacks, where encrypted data is stored now for future decryption once quantum technology matures.
Di Bella emphasized scenarios like protecting dissidents in authoritarian regimes, where encrypted information must remain secure for 10 to 20 years or more. Although practical quantum computers may be 10 to 15 years away, he cautioned that major tech companies like Microsoft and Google might develop powerful solutions sooner. He also criticized “quantum washing,” a practice where firms exaggerate quantum capabilities, and expressed concerns that countries like China could secretly develop advanced quantum cryptographic-breaking capabilities without alerting others.
Quantum computers threaten current encryption and zero-knowledge proofs (ZK-proofs), a cryptographic method allowing one party to prove knowledge of information without revealing it. Such computing power could decrypt information and forge traditional ZK-proofs, compromising verification processes.
Several post-quantum encryption standards have been approved by the National Institute of Standards and Technology (NIST), including ML-KEM, ML-DSA, and SLH-DSA. However, there is no mature post-quantum ZK-proof standard yet. Di Bella works on this challenge through his company, Mood Global Services. He pointed to a post-quantum ZK-proof approach called PLONK (Permutations over Lagrange bases for Oecumenical Noninteractive arguments of Knowledge), yet described it as unproven and still in research phases.
The path toward usable post-quantum ZK-proof systems is complex and slow. Di Bella noted the field demands specialized mathematical knowledge and advanced low-level programming, mainly in Rust, lacking high-level language abstractions. Investment remains limited since corporations often avoid funding projects they do not fully understand.
This ongoing work is crucial to preparing cryptographic tools for a future with practical quantum threats.
✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.
Previous Articles:
- Dubai Penthouses Ignite $24M Bidding Wars Among Ultra-Rich
- Crypto Market Sinks to $3.6T as $373M in Leveraged Bets Liquidated
- Bitcoin at $105K, Ether at $3,580 Amid Market Consolidation
- India, South Africa Lead BRICS Gold Reserves Growth Oct 2025
- SoftBank Sells Nvidia Stake for $5.8B Despite AI Ambitions, Stock Slips
