Skip to content

Commit 02b949f

Browse files
Refine post-quantum security section
1 parent e7a33bf commit 02b949f

File tree

1 file changed

+2
-2
lines changed
  • src/content/zero-knowledge-proofs

1 file changed

+2
-2
lines changed

src/content/zero-knowledge-proofs/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -196,9 +196,9 @@ But there’s really no way for users to assess the honesty of participants and
196196

197197
### Quantum computing threats {#quantum-computing-threats}
198198

199-
ZK-SNARK uses elliptic curve cryptography ([ECDSA](/glossary/#ecdsa)) for encryption. While the ECDSA algorithm is secure for now, the development of quantum computers could break its security model in the future.
199+
ZK-SNARK uses elliptic curve cryptography for encryption. While the elliptic curve discrete logarithm problem is assumed to be intractable for now, the development of quantum computers could break this security model in the future.
200200

201-
ZK-STARK is considered immune to the threat of quantum computing, as it uses collision-resistant hashes for encryption. Unlike public-private key pairings used in elliptic curve cryptography, collision-resistant hashing is more difficult for quantum computing algorithms to break.
201+
ZK-STARK is considered immune to the threat of quantum computing, as it only relies on collision-resistant hash functions for its security. Unlike public-private key pairings used in elliptic curve cryptography, collision-resistant hashing is more difficult for quantum computing algorithms to break.
202202

203203
## Further reading {#further-reading}
204204

0 commit comments

Comments
 (0)