QUANTUM COMPUTING AND LEGAL ASPECTS IN BUILDING INTERNATIONAL DATA PRIVACY LAW

Main Article Content

Islombek Abdikhakimov

Abstract

This paper examines the profound data security and privacy implications of quantum computing technologies. With the ability to break current encryption standards, quantum computers pose severe risks of mass data vulnerability. As malicious actors could leverage quantum capabilities to access confidential digital information, this demands urgent evolution of legal frameworks for robust international data protections. Core issues analyzed include technically future-proofing encryption, restrictions around backdoor access, accessibility of quantum-resilient solutions, and coherent alignment of disparate national policies. Collective foresight and action is required to construct rational safeguards that allow ethical progress while preventing exploitative outcomes.


 


 

Article Details

Section
Articles

References

Akin, D. G., Bacak, N., Mason, R. T., Staples, M., Cary, S., & Arunachalam, V. (2019). Post Quantum Cryptography: Mitigating Quantum Computing Risks to Essential Information Systems. Journal of Strategic Security, 12(3), 1-24. https://doi.org/10.5038/1944-0472.12.3.1727

Berndt, A., & Lantagne, N. S. (2022). Quantum computing and international lawmaking: Why now, and what is to be done?. International Organizations Law Review, 1-35. https://doi.org/10.1007/s41948-021-00232-0

Bernhardt, D. (2022). How to Prepare for a Quantum Computer Breaking Encryption. Harvard Business Review. https://hbr.org/2022/01/how-to-prepare-for-a-quantum-computer-breaking-encryption

Cao, Y., Yang, X., Zohar, D., Lo, H. K., & Zhou, Q. (2022). Quantum cryptography and the governance of quantum technologies: Building international cooperation. Chinese Journal of International Law, 21(1), 29-59. https://doi.org/10.1093/chinesejil/jmaa027

Council of Europe. (2021). Quantum technologies: security implications and good practices. https://pace.coe.int/en/files/29312

European Telecommunications Standards Institute. (2019). Quantum-Safe Cryptography (QSC); Case studies and deployment scenarios. ETSI White Paper No. 27. https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf

Gheorghiu, V., Kashefi, E., & Wallden, P. (2019). Robustness and device independence of verifiable blind quantum computing. New Journal of Physics, 21(8). https://doi.org/10.1088/1367-2630/ab2ec0

Hsu, J. (2021). IBM’s newest quantum computer is now the most powerful in the world. IEEE Spectrum. https://spectrum.ieee.org/ibm-quantum-eagle-processor

Humble, B. (2022). Preparing cryptography standards for the quantum computing age. Microsoft. https://www.microsoft.com/security/blog/2022/02/15/preparing-cryptography-standards-for-the-quantum-computing-age/

Kara, A., & Dayan, M. E. (2022). Vulnerability of AES Algorithm against Quantum Computer Based Attacks. 2022 10th International Conference on Advanced Technologies (ICAT). https://doi.org/10.1109/ICAT54929.2022.00020

Kuang, C. (2022, January 25). Global Collaboration is Key to Navigating the Quantum Era. World Economic Forum. https://www.weforum.org/agenda/2022/01/global-collaboration-key-navigating-quantum-era/

Lantagne, N., & Berndt, A. (2022). Encryption backdoors aren’t just ineffective, they’re legally and politically dangerous. Brookings Institute. https://www.brookings.edu/blog/techtank/2022/07/07/encryption-backdoors-arent-just-ineffective-theyre-legally-and-politically-dangerous/

Lomonaco, S. J., Jr. (2019). Quantum Threat Timeline Report 2019. Global Risk Institute. https://globalriskinstitute.org/publications/quantum-threat-timeline-report-2019/

Mohseni, M., Read, P., Neven, H., Boixo, S., Denchev, V., Babbush, R., Fowler, A., Smelyanskiy, V., & Martinis, J. (2017). Commercialize early quantum technologies. Nature 543(7644), 171-174. https://doi.org/10.1038/543171a

Noorden, R. V. (2022). Hello Quantum World! Nature, 601(7893), 154-157. https://doi.org/10.1038/d41586-022-00128-9

Ragy, S., Adel, I., Abbas, H., Ali, M., & Hassanein, H. S. (2021). Blockchain-based Post-Quantum Authentication Technique. NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium, 1–9. https://doi.org/10.1109/NOMS55038.2022.9795766

Tupper, P., Liu, E., & Wilson, C. (2022). International Alignment in Quantum Technologies. Centre for International Governance Innovation. https://www.cigionline.org/articles/international-alignment-on-quantum-technologies/

Unger, N., Supic, L., & Bošnjaković, M. (2022). Quantum Security, Privacy and Cryptography. Multidisciplinary Digital Publishing Institute Proceedings, 37(1), 12. https://doi.org/10.3390/proceedings2022037012

Zetter, K. (2014). The NSA made a quantum leap with backdoor keys. WIRED. https://www.wired.com/2014/09/nsa-made-crypto-breakthrough