Gate News message: as the blockchain industry accelerates its response to the threat of quantum computing, Naoris Protocol has officially launched its post-quantum blockchain mainnet following its initial rollout. From the moment the network was created, it has used post-quantum cryptography technology. The algorithms it uses have been approved by the U.S. National Institute of Standards and Technology (NIST). The goal is to prevent future quantum computers from cracking the elliptic curve digital signature algorithms (ECDSA) that mainstream blockchains such as Bitcoin and Ethereum rely on.
Naoris Chief Growth Officer Nathaniel Szerezla said the project implements a standardized ML-DSA signature—an NIST-approved version of the CRYSTALS-Dilithium algorithm—ensuring the network has quantum-safe properties from the very start. After users bind their post-quantum keys, the system enforces a one-way, irreversible conversion and only accepts post-quantum signed transactions; any transaction that uses only classical ECDSA signatures will be rejected.
At present, the Naoris network is running limited validator nodes, and it has already processed more than 106 million post-quantum transactions on its testnet, while also detecting more than 603 million security threats. Szerezla warned that blockchain assets relying on traditional cryptography cannot automatically gain protection, and that users need to migrate their assets to Naoris in order to enjoy quantum security guarantees.
Meanwhile, Bitcoin and Ethereum developers are also exploring quantum-resistant solutions. Ethereum co-founder Vitalik Buterin has proposed replacing the BLS and ECDSA in the protocol with alternative signature schemes that can withstand quantum attacks. Bitcoin developers are advancing the BIP 360 proposal, which reduces public key exposure through “Pay-to-Merkle-Root,” preparing for the future addition of post-quantum signatures. Because blockchain transaction history is public and permanent, once a quantum computer reaches sufficient capability, attackers may be able to recover private keys from old transaction signatures. Naoris’s strategy is precisely to provide a solution to mitigate this risk.