A more efficient implementation of Shor's algorithm

· security · Source ↗

TLDR

  • Paper from Google/UC Berkeley/Ethereum Foundation/Stanford cuts qubits needed to attack 256-bit elliptic-curve cryptography by 20x, but withholds the circuit using a zero-knowledge proof.

Key Takeaways

  • New quantum circuit factors 256-bit elliptic-curve signatures using fewer than 1,200 logical qubits and 90 million gates, down from prior 1,098-qubit but 2^38-gate approaches.
  • ~500,000 physical qubits required; IBM Condor has 1,121, so practical attack is still roughly 500x away in memory alone.
  • Researchers used SP1 (a RISC-V zero-knowledge VM producing STARKs) to prove circuit correctness without releasing the circuit, then compressed via Groth16 SNARKs for efficient verification.
  • The zero-knowledge proof uses SHA-256-seeded PRNG to prevent cherry-picking test inputs, then folding/FRI-style polynomial commitments to certify the simulation results.
  • This is the first quantum-computing paper to use this style of zero-knowledge proof in place of publishing the actual artifact.

Hacker News Comment Review

  • No substantive HN discussion yet; only observation is that withholding a cryptographic breakthrough via ZK proof is a novel and clever precedent for responsible disclosure in quantum research.

Original | Discuss on HN