Introduction

In an increasingly digital world, cybersecurity is paramount. The rapid advancements in quantum computing introduce new challenges threatening the security of encrypted data. Gianluca Di Bella, a smart contract researcher specializing in zero-knowledge proofs, argues that these threats aren't distant possibilities; they are happening now.

'Harvest Now, Decrypt Later' Attacks

Di Bella highlights 'harvest now, decrypt later' attacks as a primary concern. These attacks involve collecting encrypted data and storing it until future technologies can decrypt it. This means sensitive information, such as the data of political dissidents in totalitarian regimes, could be at risk even years after encryption.

A Narrow Window of Opportunity

While practical commercial quantum computing may be 10 to 15 years away, Di Bella cautions that major institutions like Microsoft or Google could find solutions much sooner. This necessitates immediate action to prepare for this challenge.

'Quantum Washing'

Di Bella criticizes 'quantum washing,' where companies make dubious claims about the capabilities of quantum systems. He also expresses concern that if China develops systems capable of breaking modern cryptography, they might not warn the rest of the world of their breakthrough.

Post-Quantum Zero-Knowledge Proofs

Once quantum computing reaches the necessary power and scale, it could undermine the security assumptions of traditional encryption and zero-knowledge proofs. This could lead to the decryption of encrypted data and the forging of proofs generated by traditional ZK-proofs, resulting in false statements or bypassed verification.

Post-Quantum Encryption Standards

Several post-quantum encryption standards already exist, with some approved by the National Institute of Standards and Technology (NIST). However, a comparable post-quantum ZK-proof standard has yet to mature. Di Bella is actively engaged in this area of research through his smart contract development company, Mood Global Services.

Development Challenges

Di Bella points to PLONK (Permutations over Lagrange bases for Oecumenical Noninteractive arguments of Knowledge) as a potential post-quantum ZK-proof implementation, but acknowledges that it's still in the research and development phase and requires further testing and refinement before it's ready for real-world use. He also laments the lack of investment in this field, noting that it's a niche subject requiring significant specialized knowledge, which reduces investment and slows development.

Conclusion

Di Bella concludes by emphasizing that developing post-quantum ZK-proofs is a significant challenge requiring sustained effort and substantial investment. However, he believes this development is essential for protecting sensitive data in a world increasingly threatened by quantum attacks.

Risk Warning: this article represents only the author’s views and is for reference only. It does not constitute investment advice or financial guidance, nor does it represent the stance of the Markets.com platform.When considering shares, indices, forex (foreign exchange) and commodities for trading and price predictions, remember that trading CFDs involves a significant degree of risk and could result in capital loss.Past performance is not indicative of any future results. This information is provided for informative purposes only and should not be construed to be investment advice. Trading cryptocurrency CFDs and spread bets is restricted for all UK retail clients. 

Latest news

Tuesday, 11 November 2025

Indices

Exchange Risk Control Strategies and Manipulation Prevention: An Inside Look

Tuesday, 11 November 2025

Indices

Uniswap's UNIfication Proposal: Fee Switch Activation and UNI Burn

Tuesday, 11 November 2025

Indices

Bitcoin Rebounds as US Government Shutdown Nears End: A Market Analysis