Gate Square “Creator Certification Incentive Program” — Recruiting Outstanding Creators!
Join now, share quality content, and compete for over $10,000 in monthly rewards.
How to Apply:
1️⃣ Open the App → Tap [Square] at the bottom → Click your [avatar] in the top right.
2️⃣ Tap [Get Certified], submit your application, and wait for approval.
Apply Now: https://www.gate.com/questionnaire/7159
Token rewards, exclusive Gate merch, and traffic exposure await you!
Details: https://www.gate.com/announcements/article/47889
Quantum threat in blockchain: distinguishing real priorities from fake urgencies
The real danger: harvest attacks and late decryption
The immediate risk posed by quantum computing is not hypothetical. It is known as “Harvest Now, Decrypt Later” (HNDL): sophisticated adversaries collect encrypted communications today with the intention of decrypting them when they have operational quantum capabilities. For data that must remain confidential for one or several decades — particularly sensitive state-level information — this threat is concrete and requires preventive action now. Systems that require protection for 10-50 years or more should already begin implementing quantum-resistant cryptographic schemes, without waiting for the technology to become fully accessible.
Digital signatures: a threat not so near
Unlike encryption, digital signatures face a different risk horizon. ECDSA and EdDSA signatures, pillars of blockchain security, do not contain private information susceptible to retroactive recovery if quantum algorithms manage to break them in the future. A successful quantum attack would only compromise future transactions and authorizations; it would never invalidate historical signatures or reveal past secrets. For this reason, although these signatures will eventually need to be updated, there is no immediate urgency to perform that migration.
Zero-knowledge proofs: the least of problems
zkSNARKs present a security model entirely different from symmetric or asymmetric encryption. Although many current implementations are based on elliptic curves, their fundamental property — demonstrating knowledge without revealing information — remains shielded against quantum attacks. Since the proofs do not contain private data recoverable by quantum algorithms, the “harvest and late decryption” scenario does not apply. Consequently, systems based on zkSNARKs have the lowest urgency level among all blockchain architectures.
Hierarchy of priorities for quantum migration
The quantum threat does not affect all layers of blockchain technology equally:
Bitcoin: the exception demanding anticipation
Although most of the blockchain ecosystem can afford to wait, Bitcoin represents an anomaly that justifies starting quantum migration planning now. The reasons are multiple and complex.
First, Bitcoin’s protocol experiences extremely slow upgrade cycles. Any change related to consensus or cryptographic logic generates controversy, potentially triggering irreconcilable splits or hard forks. This institutional rigidity means that completing a quantum transition could take a decade or more.
Second, Bitcoin cannot enforce automatic asset migrations. Private keys are exclusively owned by users, and the protocol lacks mechanisms to force updates. It is estimated that millions of BTC remain in inactive, lost, or obsolete wallets, which would remain permanently vulnerable to future quantum attackers once quantum computing becomes viable.
Third, Bitcoin’s origins present a particular risk: the Pay-to-Public-Key (P2PK) structure directly exposes public keys on the blockchain. Shor’s algorithm would allow deriving private keys instantly from these visible public keys. In contrast, modern schemes — based on hashes that hide public keys — only expose these data during transactions, providing a window of time to act before attackers.
The migration of Bitcoin goes beyond mere technical aspects: it involves legal risks (proof of ownership issues), massive social coordination, realistic implementation schedules, and significant costs. Although the quantum threat is distant, Bitcoin must design today an irreversible and executable migration roadmap.
Prudent balance: avoid hasty migration
Paradoxically, although the danger exists, a sudden and comprehensive update of the ecosystem could introduce even greater risks. Current post-quantum algorithms present challenges that should not be underestimated: dramatic growth in signature size, high implementation complexity, and in several historical cases, vulnerabilities discovered years after initial adoption (Rainbow and SIKE are notable examples).
The main emerging post-quantum signatures — ML-DSA and Falcon — require signatures 10 to 100 times larger than current ones. Their implementation is susceptible to side-channel attacks, floating-point precision errors, or misconfigured parameters that can leak keys.
Recommended strategy: gradual and modular adoption
Blockchain should avoid blind migrations to post-quantum schemes. The alternative is a layered, diversified, and replaceable architectural strategy:
This approach ensures that blockchain can adapt without rushing, incorporating post-quantum decryption resistance when safe and necessary, without undermining current stability.