Skip to content

Commit 77c8038

Browse files
authored
Merge pull request #11779 from LucasAschenbach/patch-1
Refine post-quantum security section
2 parents cbf3c23 + 558844c commit 77c8038

File tree

1 file changed

+2
-2
lines changed
  • public/content/zero-knowledge-proofs

1 file changed

+2
-2
lines changed

public/content/zero-knowledge-proofs/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -198,9 +198,9 @@ But there’s really no way for users to assess the honesty of participants and
198198

199199
### Quantum computing threats {#quantum-computing-threats}
200200

201-
ZK-SNARK uses elliptic curve cryptography ([ECDSA](/glossary/#ecdsa)) for encryption. While the ECDSA algorithm is secure for now, the development of quantum computers could break its security model in the future.
201+
ZK-SNARK uses elliptic curve cryptography for encryption. While the elliptic curve discrete logarithm problem is assumed to be intractable for now, the development of quantum computers could break this security model in the future.
202202

203-
ZK-STARK is considered immune to the threat of quantum computing, as it uses collision-resistant hashes for encryption. Unlike public-private key pairings used in elliptic curve cryptography, collision-resistant hashing is more difficult for quantum computing algorithms to break.
203+
ZK-STARK is considered immune to the threat of quantum computing, as it only relies on collision-resistant hash functions for its security. Unlike public-private key pairings used in elliptic curve cryptography, collision-resistant hashing is more difficult for quantum computing algorithms to break.
204204

205205
## Further reading {#further-reading}
206206

0 commit comments

Comments
 (0)