I4P Blog

Leading the way with a quantum-resistant encryption solution

We have started the development of an e-privacy platform that will safeguard sensitive data as we approach the imminent era of quantum computers.

We are proud to announce that we have launched our project called “Development of a post-quantum e-privacy platform in a multi-tenant cloud-based environment”. The project no. 2021-1.1.4-GYORSÍTÓSÁV-2022-00037 has been implemented with the support provided by the Ministry of Culture and Innovation of Hungary from the National Research, Development and Innovation Fund, financed under the 2021-1.1.4-GYORSÍTÓSÁV funding scheme.

An era is approaching in which the encryption methods used today will be completely useless and our secrets and sensitive data might be exposed. The emergence of extremely powerful quantum computers is expected within just a few years, and these devices will be able to crack traditional public key cryptographic algorithms that are currently widespread in minutes. Security and cryptography experts emphasize that it is crucial to start preparing for this “post-quantum era” in time by using advanced encryption methods designed to withstand the capabilities of quantum computers.

We were the first company that built a post-quantum electronic signature algorithm into a hardware security module (HSM), and now we are developing a unique data protection service. The Trident e-privacy platform is protected by post-quantum algorithms that provide a level of security beyond traditional cryptographic applications as well as our specialized multi-party computation (MPC) solutions. The platform will provide users with a very strong control over their protected data, even if their data is stored at the site of the data processors themselves. We are convinced that this is the only way to technically ensure compliance with GDPR requirements, including data processing with permission and for specific purposes, and the right to be forgotten. And all of this is executed in a quantum-resistant manner to ensure protection against quantum computers.

Our platform ensures that organizations that store data can only access a user’s data on their systems if the user gives permission. Even if an employer, webshop, government organization or healthcare provider stores a user’s personal data encrypted (using post-quantum algorithms, of course), they cannot access the data unless the user decides to take part in the decryption. The data will only be transformed into an interpretable and readable state with the user’s explicit consent and active cooperation. This cooperative process constitutes a cryptographic sub-computation that can be performed by a mobile application. With this, users can verify each any attempt to access the data before it happens.

We aim for the platform to attract privacy-conscious users and organizations, creating a critical mass that will make the technical implementation of strong data protection measures an unavoidable necessity. 

Stay tuned for more details about the project as we progress with the development.

Share this POST

Get your free ebook:

Why every company needs HSM modules?

Download this ebook to find out:

  • What is a Hardware Security Module (HSM)?
  • Why do you need an HSM?
  • Why is an HSM beneficial for your company?
  • What type of HSMs are available and what are they useful for?
  • How do you choose the right HSM for your organization?
  • How do you deploy and use an HSM?