Using Verkle Trees for Post-Quantum Security