As I write this article, Google has just announced its breakthrough in quantum computing with the arrival of Willow, a quantum chip that can perform operations in minutes that would take regular computers almost an eternity. This development has sparked a mix of excitement and fear in the technology industry.

The Risks of Quantum Computing

Many experts have warned about the potential risks of quantum computing, particularly its impact on cryptography. Cryptographic building blocks, such as elliptic curve cryptography (ECC), are used to secure transactions, wallets, and private keys. However, these algorithms can be broken by a sufficiently advanced quantum computer with enough qubits.

A Decent Solution: Zero-Knowledge Proofs

Fortunately, there is already a decent solution to this problem in the form of zero-knowledge (ZK) proofs. ZK-proofs have been used in blockchain projects to enhance users’ privacy protections and make transactions faster and cheaper. What’s more, some ZK-proofs have a bonus feature that might become blockchain’s saving grace: they are post-quantum secure.

The Myth of Quantum Computers as Master Keys

There’s a widespread perception that when the first quantum computer is plugged in, its owner will possess the master key to every code and password in the universe. While this is an exaggeration, it captures the essence of the fear surrounding quantum computing. However, it misses the point.

Security Systems Will Evolve

Just like cars have become more secure with features like electronic ignition and immobilizers, future security systems will look very different from those of today. In our area of interest, crypto, we have already spent years kicking the tires of ZK technology. We have the potential to prepare well and face the challenges and opportunities of quantum computing head-on.

Why STARKs Are Ready for Quantum Computers

STARKs rely on a much thinner or more bare-bones cryptographic primitive: hash functions. These should remain resilient against quantum computers. In contrast, popular encryption schemes like RSA or elliptic curve-based encryptions are no longer safe against quantum adversaries.

A Different Type of Cryptography

Think of it like this: today’s passwords are like needles hidden in the most enormous haystack you’ve ever seen. You don’t know my password because neither you nor your computer can work through the haystack. Quantum computers, on the other hand, are like mega-magnets that can instantly find that needle.

Cryptographic Primitives Will Evolve

However, there is cryptography that is fundamentally different. Instead of looking for a specific needle in a haystack, you’re searching for a specific piece of hay in a massive haystack. No magnet will help you, and no quantum computer will find it.

A Clear Route to Solutions

As with anything in the blockchain space, I expect to see growing discussion and alternative solutions to the post-quantum challenge. We don’t yet need fully-baked solutions or quantum-secure chains, but we do need pathways to solutions. Starknet, our permissionless L2 based on STARKs, is not ready for quantum computing tomorrow, but there is a clear route to make the necessary changes.

Realizing the Vision of Cryptography

Realizing that ZK technology offers a solution to a large part of quantum computing’s challenge doesn’t just mean that blockchain is ‘saved’ from being compromised. It means something more profound for all who came to crypto for the beauty of the vision: cryptography can be a source of truth and integrity, helping to answer humanity’s most contemporary challenges.

Conclusion

The arrival of Willow marks the beginning of a new era in quantum computing. While there are risks involved, we have already taken steps to address them with ZK technology. As experts in the field, it’s our responsibility to continue exploring alternative solutions and pathways to make cryptography an even more secure and reliable source of truth.

About the Author

Eli Ben-Sasson is the CEO and co-founder of StarkWare. A former academic, he got into blockchain via theoretical computer science. He has been researching cryptographic and zero knowledge proofs, which are today used to power blockchain scaling protocols, ever since he received his Ph.D. in Theoretical Computer Science from the Hebrew University in 2001.

This article is for general information purposes only and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Explore More Articles Like This

Subscribe to our Crypto Biz newsletter for a weekly snapshot of key business trends in blockchain and crypto, from startup buzz to regulatory shifts. Gain valuable insights to navigate the market and spot financial opportunities.

Delivered Every Thursday

By subscribing, you agree to our Terms of Service and Privacy Policy.