China Accelerates Post-Quantum Cryptography Drive with National Standards Plan

March 19, 2026
China Accelerates Post-Quantum Cryptography Drive with National Standards Plan
  • Beyond PQC, China is advancing the quantum ecosystem with an open-source OS for quantum computers to support development.

  • China’s move is part of a global trend, with the United States and South Korea advancing quantum-resistant encryption, signaling international competition and alignment on post-quantum standards.

  • The emphasis on structureless lattice cryptography reflects a deliberate divergence from Western standards rooted in structured algebraic lattices.

  • Experts frame quantum computers as a realistic threat to current encryption, accelerating governments’ push toward post-quantum cryptography.

  • China released a homegrown quantum computing operating system as open-source software, marking a milestone in its broader quantum ecosystem push.

  • China has issued a global call for contributions to its post-quantum standards, signaling a challenge to existing international frameworks.

  • China plans to establish national standards for post-quantum cryptography within three years, backed by increased funding and a five-year plan that prioritizes quantum technologies.

  • China favors structureless lattice cryptography as a distinct approach, saying it offers stronger security resistance even if it comes at the cost of efficiency.

  • Wang Xiaoyun of Tsinghua University urges prioritizing the migration of financial and energy sectors to post-quantum cryptography due to data sensitivity and security needs.

  • Chinese researchers are prioritizing structureless lattice algorithms, such as S-Cloud+, over algebraic lattice methods, arguing these have fewer security weaknesses.

  • Global industry momentum includes major players urging faster adoption of post-quantum cryptography, with pilots and deployments planned by 2035.

  • The global race to standardize and deploy PQC is speeding up as governments seek to secure critical sectors and defend against store-now, decrypt-later risks.

Summary based on 6 sources


Get a daily email with more Tech stories

Sources

More Stories