As encrypted assets are widely accepted in society, the legitimate compliance of their social attributes is actively promoted, while the secure development of their technical attributes is increasingly emphasized. This article features an interview conducted by Cointelegraph with Dr. Xinxin Fan, R&D Director of IoTeX, on the latest research findings regarding 'Post-Quantum Era' encryption security guarantees, proposing a technically secure and smooth migration plan. The following is the original content:
According to Cointelgraph, Dr. Xinxin Fan, R&D Director of IoTeX, recently co-authored a research paper titled 'Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum.' The paper won the Best Paper Award at the 2024 International Blockchain Conference (ICBC 2024), proposing hash-based zero-knowledge technology as the most user-friendly way to make the Ethereum network and other similar cryptographic systems quantum secure.
In an interview with Cointelegraph, Dr. Fan explained that the Elliptic Curve Digital Signature Algorithm (ECDSA) used for signing transactions in current blockchain systems has quantum vulnerabilities. However, this vulnerability can be addressed by attaching hash-based zero-knowledge proofs — such as Zero-Knowledge Scalable Transparent Argument of Knowledge (zk-STARK) — to each transaction.
Researchers stated that this method also ensures a smooth transition for users, avoiding the complex operations required by other quantum-resistant methods. Dr. Fan said: 'The way we implement it allows users to continue using their current wallets as they did in the past, only needing to attach a quantum-safe zero-knowledge proof to each transaction.' Dr. Fan pointed out: 'We need to consider both security and usability.' Researchers emphasized that balancing user experience with security needs is key to ensuring timely migration to post-quantum standards.
Quantum Panic of 2024
For users, a smooth transition to post-quantum security is crucial, as the National Institute of Standards and Technology (NIST) recently issued the first hard deadline for legacy systems to migrate to post-quantum signature standards — advising agencies to take quantum-resistant measures by 2035.
In October 2024, (South China Morning Post) reported that researchers at Shanghai University successfully used quantum computers to break encryption algorithms.
However, the analysis by YouTube blogger 'Mental Outlaw' subsequently revealed that the quantum computer used in the experiment only broke a 22-bit key. In contrast, the key lengths used in modern encryption standards range from 2048 to 4096 bits — this means that quantum computers have not yet cracked encryption standards.
Other researchers also agree that the threats posed by quantum computers are exaggerated, as there is a significant gap between the current capabilities of quantum computers in factoring numbers and the length of modern encryption keys.
References: https://github.com/pqcee/EIPs/blob/master/EIPS/eip-7693.md