This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy

Technologies and Regulations Shape a Trusted Digital Future

By 2030, technologies such as digital identities, post-quantum cryptography (PQC), digital watermarking, privacy-enhancing computation (PEC), and AI provenance and verification will lay a solid foundation for the sustainable development of digital civilization.

Predictions

 bada icon 11 By 2030, privacy-enhancing computation will account for over 50% of all computations
 cloud computing icon security 100% of ICT systems will have a quantum-safe capacity or the capacity to migrate to quantum-safe solutions

Directions for Exploration

ICT enables digital trust

Snapshot from the future: Intelligent agents with digital identities and trusted identifiers

The explosive development of large language models (LLMs) has increased AI penetration in all sectors. This has led to various AI-based intelligent agents emerging in both the digital and physical worlds, in turn increasing productivity, facilitating creativity, and turbocharging economic development. Digital identities build trust between people and intelligent agents so that they can engage and collaborate in new ways.

Snapshot from the future: AI security to ensure trustworthiness in the digital life

AI systems are increasingly integral to various sectors, and so when they are attacked, the impact can be huge. In the future, AI systems will increasingly need to support AIGC provenance and verification. Meanwhile, stringent technical requirements must be put in place to ensure the security of AI systems and models, as well as the trustworthiness of AI input and output data. This can help mitigate the risk of AI system misuse and safeguard the value generated by AI.

Snapshot from the future: Digital watermarking to support information provenance

In the digital world, data will be the most important asset, positioning it at greater risk of theft and misappropriation. The unprecedented capabilities provided by AIGC and similar technologies, like natural language processing and image generation, are revolutionizing the industry. If the data assets or generated data is illegally embezzled or misused, the potential harm to individuals and companies will be huge. Digital watermarking–based provenance technology is an effective method for addressing this problem.

Snapshot from the future: PEC technologies that improve computing security

PEC technologies are data security technologies used to protect and enhance privacy and security during the collection, storage, search, and analysis of private information. PEC supports efficient, high-quality services by protecting personal data from abuse, while allowing effective use of the data. This allows us to realize the data's full business, scientific, and social value.

Snapshot from the future: Quantum security that ensures trustworthiness in the digital life

Quantum computing is maturing at a tremendous pace, and is expected to be capable of breaking traditional security algorithms by 2030. Therefore, we have no choice but to transition to PQC and quantum key distribution (QKD), which are resistant to quantum computing attacks.

Rules redefine digital trust

Snapshot from the future: Unified rules that enhance data protection and mitigate data monopoly

Digital trust involves many organizations and stakeholders. Notably, in the realm of personal information protection, the EU has enacted the General Data Protection Regulation (GDPR), while other countries and regions have subsequently adopted similar laws, such as China's Personal Information Protection Law. Combating data monopoly is the only way to prevent large platforms from illegally obtaining, abusing, and trading personal privacy data. This will bolster digital security, ensure fair competition, and foster a robust digital credit ecosystem.

Snapshot from the future: Impartial standards that drive healthy ICT industry development

Governments and industry organizations must establish unified cyber security standards that are technology-neutral and equally applicable to all enterprises and all ICT products. These standards will ensure that ICT products can be independently and comprehensively verified and evaluated. As a result, organizations will be able to select products that meet their specific security requirements based on the verification and evaluation results, and foster healthy development within the ICT industry.

Snapshot from the future: A cyber security and privacy assurance system that boosts digital trust

One of Huawei's key strategies is to build and implement an end-to-end global cyber security and privacy assurance system. In compliance with applicable laws and regulations in countries where we operate and international standards, we are continuing to invest in an effective, sustainable, and reliable cyber security and privacy assurance system that addresses the requirements of both regulators and customers, as well as industry best practices. Further still, we actively engage with governments, customers, and industry partners to address cyber security and privacy challenges.

Intelligent World two thousand and thirty

Download the Report