Tezos lance un prototype de confidentialité post-quantique utilisant des preuves zk-stark

Les développeurs de Tezos ont lancé un prototype de paiements privés résistant aux attaques informatiques quantiques. Le système utilise des preuves zk-stark pour protéger les données chiffrées de la blockchain contre les menaces futures.

Les développeurs de Tezos ont lancé ce prototype de paiements privés post-quantiques alors que les réseaux se préparent aux risques potentiels liés à l'informatique quantique. L'initiative vise à protéger les données chiffrées sur la blockchain contre des attaques avancées qui pourraient émerger dans les années à venir.

Articles connexes

U.S. Treasury report illustration showing holographic tech pillars for crypto compliance: AI monitoring, digital ID, blockchain analytics, and data APIs, with privacy mixer endorsement.
Image générée par IA

U.S. Treasury report proposes AI, digital ID pillars for crypto compliance; endorses lawful mixer privacy

Rapporté par l'IA Image générée par IA

The U.S. Treasury Department submitted a report to Congress on March 9, 2026—commissioned under the GENIUS Act—outlining four technological pillars to enhance transparency in cryptocurrency transactions: artificial intelligence for monitoring, digital identity for onboarding, blockchain analytics for tracing, and interoperable data-sharing APIs. It describes digital assets as key to U.S. innovation leadership while acknowledging lawful users' need for privacy tools like mixers on public blockchains, amid risks from illicit exploitation.

Zcash announced plans to introduce quantum-recoverable wallets within a month and achieve full post-quantum security by 2027. The privacy-focused cryptocurrency also outlined scaling upgrades during an event in Miami.

Rapporté par l'IA

Crypto companies are updating their wallets to guard against potential quantum computing risks to major networks like Bitcoin and Ethereum.

Building on 2026 qubit reductions like Iceberg Quantum's qLDPC breakthrough, recent studies project quantum computers cracking RSA-2048 and ECDLP-256 by 2029. Google and cybersecurity experts warn of imminent Q-Day, pushing post-quantum cryptography to avert a crisis worse than Y2K, with businesses ramping up quantum-safe migrations.

Rapporté par l'IA

Ethereum co-founder Vitalik Buterin has proposed a layered approach to cryptocurrency security that emphasizes redundancy and multi-angle verification to align systems with user intentions. Published on February 22, 2026, his framework acknowledges the impossibility of perfect security due to the complexity of human intent. The strategy aims to protect users from hacks and exploits while preserving usability.

Proton VPN has announced its spring and summer 2026 roadmap, promising faster speeds, enhanced security, and more servers amid rising online censorship. The updates include an improved WireGuard protocol, a redesigned Linux app with Stealth support, and over 20,000 servers across 145 countries. Product lead Antonio Cesarano emphasized making privacy easier in a challenging digital world.

Rapporté par l'IA

Researchers have developed algorithms called phantom codes to make quantum computers less error-prone, potentially allowing them to run complex simulations more efficiently. These codes enable entanglement of logical qubits without physical manipulations, cutting down on error risks. The approach shows promise for tasks requiring extensive entanglement, though it is not a complete solution to quantum computing challenges.

 

 

 

Ce site utilise des cookies

Nous utilisons des cookies pour l'analyse afin d'améliorer notre site. Lisez notre politique de confidentialité pour plus d'informations.
Refuser