QUANTUM COMPUTING AND LEGAL ASPECTS IN BUILDING INTERNATIONAL DATA PRIVACY LAW
Main Article Content
Abstract
This paper examines the profound data security and privacy implications of quantum computing technologies. With the ability to break current encryption standards, quantum computers pose severe risks of mass data vulnerability. As malicious actors could leverage quantum capabilities to access confidential digital information, this demands urgent evolution of legal frameworks for robust international data protections. Core issues analyzed include technically future-proofing encryption, restrictions around backdoor access, accessibility of quantum-resilient solutions, and coherent alignment of disparate national policies. Collective foresight and action is required to construct rational safeguards that allow ethical progress while preventing exploitative outcomes.
Article Details
References
Akin, D. G., Bacak, N., Mason, R. T., Staples, M., Cary, S., & Arunachalam, V. (2019). Post Quantum Cryptography: Mitigating Quantum Computing Risks to Essential Information Systems. Journal of Strategic Security, 12(3), 1-24. https://doi.org/10.5038/1944-0472.12.3.1727
Berndt, A., & Lantagne, N. S. (2022). Quantum computing and international lawmaking: Why now, and what is to be done?. International Organizations Law Review, 1-35. https://doi.org/10.1007/s41948-021-00232-0
Bernhardt, D. (2022). How to Prepare for a Quantum Computer Breaking Encryption. Harvard Business Review. https://hbr.org/2022/01/how-to-prepare-for-a-quantum-computer-breaking-encryption
Cao, Y., Yang, X., Zohar, D., Lo, H. K., & Zhou, Q. (2022). Quantum cryptography and the governance of quantum technologies: Building international cooperation. Chinese Journal of International Law, 21(1), 29-59. https://doi.org/10.1093/chinesejil/jmaa027
Council of Europe. (2021). Quantum technologies: security implications and good practices. https://pace.coe.int/en/files/29312
European Telecommunications Standards Institute. (2019). Quantum-Safe Cryptography (QSC); Case studies and deployment scenarios. ETSI White Paper No. 27. https://www.etsi.org/images/files/ETSIWhitePapers/QuantumSafeWhitepaper.pdf
Gheorghiu, V., Kashefi, E., & Wallden, P. (2019). Robustness and device independence of verifiable blind quantum computing. New Journal of Physics, 21(8). https://doi.org/10.1088/1367-2630/ab2ec0
Hsu, J. (2021). IBM’s newest quantum computer is now the most powerful in the world. IEEE Spectrum. https://spectrum.ieee.org/ibm-quantum-eagle-processor
Humble, B. (2022). Preparing cryptography standards for the quantum computing age. Microsoft. https://www.microsoft.com/security/blog/2022/02/15/preparing-cryptography-standards-for-the-quantum-computing-age/
Kara, A., & Dayan, M. E. (2022). Vulnerability of AES Algorithm against Quantum Computer Based Attacks. 2022 10th International Conference on Advanced Technologies (ICAT). https://doi.org/10.1109/ICAT54929.2022.00020
Kuang, C. (2022, January 25). Global Collaboration is Key to Navigating the Quantum Era. World Economic Forum. https://www.weforum.org/agenda/2022/01/global-collaboration-key-navigating-quantum-era/
Lantagne, N., & Berndt, A. (2022). Encryption backdoors aren’t just ineffective, they’re legally and politically dangerous. Brookings Institute. https://www.brookings.edu/blog/techtank/2022/07/07/encryption-backdoors-arent-just-ineffective-theyre-legally-and-politically-dangerous/
Lomonaco, S. J., Jr. (2019). Quantum Threat Timeline Report 2019. Global Risk Institute. https://globalriskinstitute.org/publications/quantum-threat-timeline-report-2019/
Mohseni, M., Read, P., Neven, H., Boixo, S., Denchev, V., Babbush, R., Fowler, A., Smelyanskiy, V., & Martinis, J. (2017). Commercialize early quantum technologies. Nature 543(7644), 171-174. https://doi.org/10.1038/543171a
Noorden, R. V. (2022). Hello Quantum World! Nature, 601(7893), 154-157. https://doi.org/10.1038/d41586-022-00128-9
Ragy, S., Adel, I., Abbas, H., Ali, M., & Hassanein, H. S. (2021). Blockchain-based Post-Quantum Authentication Technique. NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium, 1–9. https://doi.org/10.1109/NOMS55038.2022.9795766
Tupper, P., Liu, E., & Wilson, C. (2022). International Alignment in Quantum Technologies. Centre for International Governance Innovation. https://www.cigionline.org/articles/international-alignment-on-quantum-technologies/
Unger, N., Supic, L., & Bošnjaković, M. (2022). Quantum Security, Privacy and Cryptography. Multidisciplinary Digital Publishing Institute Proceedings, 37(1), 12. https://doi.org/10.3390/proceedings2022037012
Zetter, K. (2014). The NSA made a quantum leap with backdoor keys. WIRED. https://www.wired.com/2014/09/nsa-made-crypto-breakthrough