Protection of personal data in the age of quantum computing and its legal challenges

Main Article Content

Barzola-Plúas, Yorly Geomar
Samaniego-Quiguiri, Delia Paulina
Núñez-Ribadeneyra, Ronny Alejandro
Bonilla-Morejón, Diego Marcelo

Abstract

The article addresses the emerging challenges that quantum computing poses for the protection of personal data, highlighting its disruptive capacity over current cryptographic systems. Through a systematic literature review based on recent academic sources and institutional documents from agencies such as NIST and ENISA, it critically examines how quantum algorithms, such as Shor's, can breach traditional cryptographic methods such as RSA and ECC. Among the main findings, two central risks are identified: the obsolescence of current cryptography and the threat of massive leaks of sensitive data, even those encrypted today with standards considered secure. The study also reveals legal loopholes and an alarming lack of technical criteria in current regulations, which weakens the legal capacity to anticipate these risks. It concludes that there is an urgent need for a proactive and technologically informed regulatory reform that incorporates post-quantum cryptographic standards and promotes international cooperation. The article highlights the need for interdisciplinary responses to preserve privacy as a fundamental right in the new digital environment transformed by quantum technologies.

Downloads

Download data is not yet available.

Article Details

Section

Artículos

Author Biographies

Barzola-Plúas, Yorly Geomar, Universidad Estatal de Guayaquil

Lawyer of the Courts and Tribunals of the Republic of Ecuador, specialized in family law with a solid background in legal sciences and an outstanding trajectory in the defense of rights. His specialization in family law allows him to approach cases with sensitivity and precision, ensuring the best interest of the families and minors involved.

Samaniego-Quiguiri, Delia Paulina, Fiscalía General del Estado

Lawyer of the Courts and Tribunals of the Republic of Ecuador, Licensed in Secretarial Management, Master's Degree in Human Rights of Vulnerable Populations at UASB, Master's Degree in Criminal Procedural Law at UNEMI, researcher and writer. I have worked for more than 15 years in the Public Sector, 11 years for the Attorney General's Office in Sucumbíos and Bolívar. I have made several publications on research topics, such as Civil Responsibilities for the mismanagement of public funds; Double taxation and its legal effects in Ecuador; The right to freedom of opinion and expression and its violation as a fundamental right; La explotación sexual comercial infantil, una realidad poco observada en el Estado ecuatoriano, How in constitutional protection, the right to helathy environmente can be guaranteed, Causas que determinan la ineficacia del Código Orgánico de la Niñez y adolescencia en la consecución del objetivo del interés superior de los NNA en la legislación ecuatoriana, Los derechos humanos desde la perspectiva de las poblaciones vulnerables.

Núñez-Ribadeneyra, Ronny Alejandro, Universidad Estatal de Bolívar

As a lawyer enrolled in the Courts and Tribunals of the Republic, I obtained my degree from Bolivar State University in 2019. In addition, in the year 2022, I successfully completed the Master of Laws program with specialization in Criminal Litigation. During my professional career, I have had the opportunity to serve as a teacher at the Institutional Level from 2019 to 2022. Currently, I hold the position of University Professor at the State University of Bolívarde in the Faculty of Jurisprudence, teaching the subjects of Criminal Law II and III, as well as Criminal Procedure Law II. During my career, I have conducted relevant research in the legal field. Some of my contributions include dogmatic-legal studies entitled "The Conventionality of Criminal Law in Ecuador" and "The Crime of Intimidation as a Private Action in the Ecuadorian Organic Integral Criminal Code". In addition, I have had the honor of publishing an academic article entitled "Bibliographical Review of the Crime of Intimidation versus the Substantiation of the Process in the Private Criminal Action" in the prestigious editorial Journal of Science and Research in the year 2023.

Bonilla-Morejón, Diego Marcelo, Consejo de la Judicatura

Professional, who has been formed in the undergraduate as a lawyer, Master in National Prosecution (UNIR), Master in Criminal Procedure Law (UNEMI), and Trainer of Trainers, which has allowed me to achieve knowledge to grow as a person and professional. As a student I worked as a legal assistant working with excellent legal professionals, and then I took a big step to the public sphere, working in the Provincial Prosecutor's Office of Sucumbíos, as well as in the Provincial Prosecutor's Office of Bolivar, and currently I perform my duties in the Judiciary Council in Bolivar. My desire is to collaborate with the future professionals of the country, where their training must be of quality with warmth, promoting a true education, since the only way in which we can achieve a society of excellence, is through knowledge that must be imparted in the classroom as I have been doing as a university professor at the State University of Bolivar in the different branches of public law, and as an active member of the Ecuadorian Institute of Tax Law.

How to Cite

Barzola-Plúas, Y. G., Samaniego-Quiguiri, D. P., Núñez-Ribadeneyra, R. A., & Bonilla-Morejón, D. M. (2023). Protection of personal data in the age of quantum computing and its legal challenges. Scientific Journal Science and Method, 1(3), 45-57. https://doi.org/10.55813/gaea/rcym/v1/n3/19

References

Arute, F., Arya, K., Babbush, R., Bacon, D., Bardin, J. C., Barends, R., ... & Martinis, J. M. (2019). Quantum supremacy using a programmable superconducting processor. Nature, 574(7779), 505–510. https://doi.org/10.1038/s41586-019-1666-5 DOI: https://doi.org/10.1038/s41586-019-1666-5

Chen, L., Jordan, S., Liu, Y. K., Moody, D., Peralta, R., Perlner, R., & Smith-Tone, D. (2016). Report on Post-Quantum Cryptography (NISTIR 8105). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.IR.8105 DOI: https://doi.org/10.6028/NIST.IR.8105

De Hert, P., & Papakonstantinou, V. (2016). The new General Data Protection Regulation: Still a sound system for the protection of individuals? Computer Law & Security Review, 34(2), 179–194. https://doi.org/10.1016/j.clsr.2016.02.006 DOI: https://doi.org/10.1016/j.clsr.2016.02.006

ENISA. (2021). Post-Quantum Cryptography: Current state and quantum mitigation. European Union Agency for Cybersecurity.

Galarza-Sánchez, P. C. (2023). Adopción de Tecnologías de la Información en las PYMEs Ecuatorianas: Factores y Desafíos. Revista Científica Zambos, 2(1), 21-40. https://doi.org/10.69484/rcz/v2/n1/36 DOI: https://doi.org/10.69484/rcz/v2/n1/36

Galarza-Sánchez, P. C., Agualongo-Yazuma, J. C., & Jumbo-Martínez, M. N. (2022). Innovación tecnológica en la industria de restaurantes del Cantón Pedro Vicente Maldonado. Journal of Economic and Social Science Research, 2(1), 31–43. https://doi.org/10.55813/gaea/jessr/v2/n1/45 DOI: https://doi.org/10.55813/gaea/jessr/v2/n1/45

Gambetta, J. M., Chow, J. M., & Steffen, M. (2021). Building quantum computers: Progress and prospects. Nature, 595(7865), 383–390.

Grover, L. K. (1996). A fast quantum mechanical algorithm for database search. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, 212–219. https://doi.org/10.1145/237814.237866 DOI: https://doi.org/10.1145/237814.237866

Hiller, J. S., & Russell, R. S. (2023). Privacy in the age of big data: Recognizing threats, defending your rights, and protecting your family (3rd ed.). Rowman & Littlefield.

Krenn, M., Aspuru-Guzik, A., & Zeilinger, A. (2020). Quantum cryptography and the future of secure communication. Nature Reviews Physics, 2(11), 709–722. DOI: https://doi.org/10.1038/s42254-020-0230-4

Lanza, C., & Ziccardi, G. (2020). Data protection in Latin America: Regulatory challenges and regional developments. Computer Law & Security Review, 36, 105385.

Mosca, M. (2018). Cybersecurity in an era with quantum computers: Will we be ready? IEEE Security & Privacy, 16(5), 38–41. https://doi.org/10.1109/MSP.2018.3761723 DOI: https://doi.org/10.1109/MSP.2018.3761723

NIST. (2022). Post-Quantum Cryptography Standardization. National Institute of Standards and Technology. https://csrc.nist.gov/Projects/post-quantum-cryptography

Picoy-Gonzales, J. A., Huarcaya-Taype, R., Contreras-Canto, O. H., Omonte-Vilca, A., Contreras-De La Cruz, C., & Gaspar-Quispe, J. C. (2023). Sabores Conectados: Transformando la Gastronomía a través de las Tecnologías de la Información y Comunicación. Editorial Grupo AEA. https://doi.org/10.55813/egaea.l.2022.58 DOI: https://doi.org/10.55813/egaea.l.2022.58

Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo de 27 de abril de 2016 relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos. Diario Oficial de la Unión Europea, L 119, 1–88.

Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484–1509. https://doi.org/10.1137/S0097539795293172 DOI: https://doi.org/10.1137/S0097539795293172

Wang, J., & Wang, H. (2022). The Quantum Race and Global Cybersecurity Governance: Challenges and Policy Responses. Journal of Cyber Policy, 7(2), 289–308.

Zuboff, S. (2023). The age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs.