This is not a quantum story -- it's about the risks of zk proofs -- but, it begins with a quantum story.
You may recall that Google published some exciting quantum breakthroughs a few weeks ago (#1462657). However, they said the advances were so impressive that they didn't think it was safe to publish how they got them. Instead they published a zkproof that they did what they said they did.
Well, here is a very interesting piece by Trail of Bits about hacking a zkproof, and the implications of using such proofs in vulnerability disclosures:
Today, Trail of Bits is publishing our own zero-knowledge proof that significantly improves Google’s on all metrics. Our result is not due to some quantum breakthrough, but rather the exploitation of multiple subtle memory safety and logic vulnerabilities in Google’s Rust prover code. Google has patched their proof, and their scientific claims are unaffected, but this story reflects the unique attack surface that systems introduce when they use zero-knowledge proofs.
Trail of Bits published this table comparing the proof of their results with Google's:
| Resource Type | Google’s Low-Gate | Google’s Low-Qubit | Our Proof |
| Total Operations | 17,000,000 | 17,000,000 | 8,300,000 |
| Number of Qubits | 1,425 | 1,175 | 1,164 |
| Toffoli Count | 2,100,000 | 2,700,000 | 0 |
This is not because Trail of Bits achieved some exciting breakthrough with a quantum computer. Instead, Trail of Bits figured out a way to make a validating "proof" of something that doesn't exist.
Our proof fully verifies when using Google’s unpatched verification code. It has the same verification key as their original proofs and is cryptographically indistinguishable from a zero-knowledge proof resulting from actual algorithmic improvements to the quantum circuit. We are releasing the code we developed to forge the proof, and a summary of our proof follows.
The whole article is an education in zk proofs, but Trail of Bits also published this paragraph speculating on what the Google quantum circuit actually does:
Google’s circuit does elliptic curve point addition, which requires at least one modular division. In previous circuits, modular inversion is the most expensive step in terms of gate count and qubit count, so that’s where improvements are needed most. Our register-sharing implementation shows that 2.55 field elements of storage is enough for a nonreversible circuit, but prior quantum implementations of Kaliski’s EEA variant require an extra qubit per iteration to preserve reversibility. This adds 512 qubits of overhead to guarantee that modular inversion is invertible, and a circuit based on Kaliski’s method with Google’s qubit counts would need to solve this problem.
Trail of Bits concludes with some thoughts about using zk proofs in this manner:
Zero-knowledge proofs are a transformational new technology with wide-ranging impacts, and their application to vulnerability disclosure is still new. Without knowing the details of their circuit, it’s impossible for me to conclude whether Google’s decision to announce this discovery using a zero-knowledge proof is justified. However, I do have experience with both vulnerability disclosure and academic publishing, and this points to broader implications in the deployment of zero-knowledge technology.
Zero-knowledge systems are an incredible technology with many applications, but their use introduces a different set of risks than traditional approaches. They aren’t a magic wand that eliminates trust; instead, they redistribute trust from an original domain, such as the opinions of scientific experts, to trust in programming languages, compilers, proof systems, and cryptography experts. There are many frontiers that are considering the benefits of zero-knowledge, including electronic voting and age verification, but it’s also critical to consider the risks and make plans for what happens when this technology fails.
Not necessarily. You can use projective coordinates to avoid division.
I love that quote about ZK proofs not being a magic wand.
That particular sentence actually sounds like an LLM wrote it.
So I'm basically too dumb to even think like that, good!
deleted by author
deleted by author
You can have the best cryptography in the world, but if the software running it has a back door, the proof doesn't mean much.