BLOG

Quantum-Resistant Bitcoin: This Is How To Face The Quantum Computer Threat

Tick tock, next block: Quantum FUD is real—but so is Bitcoin’s ability to adapt. We don’t panic, we prepare. BIP 360 opens the door to quantum resistance without a hard fork.

Quantum-Resistant Bitcoin: This Is How To Face The Quantum Computer Threat
April 22, 2025
Ed Prospero

The rumors are true: Bitcoin is not quantum-resistant… but it could be. So, considering how long it takes for the Bitcoin network to achieve consensus and authorize updates, shouldn’t we discuss possible solutions to the quantum threat? Or, on the other hand, is it too soon to start worrying about a danger that might never come? Is a working quantum computer even on the horizon?

Maybe we could all agree that we should make Bitcoin quantum-resistant at some point, sure, but what does that look like? A change of this magnitude implies many challenges, questions, obstacles. It might be beneficial to start the conversation and see how it goes.

For example, the solution will probably imply everyone moving their coins to a quantum-resistant wallet, a process that would take years. What about the coins that cannot be moved, though? What happens with the lost Bitcoin?

Who Can Determine That Bitcoin Is Lost?

The “lost Bitcoin” concept is problematic from an epistemological perspective. Many argue that Bitcoin are never lost, and they might have a point. Even if someone loses access to their private keys, it’s impossible for anyone to validate that the keys are lost. Also, it’s impossible to prove that nobody has the keys. 

What’s the solution? If the plan is to prevent quantum recovery by burning coins, then a proxy must be established. How? We set a deadline and tell all holders to migrate their coins until a specified date - e.g., in 10 years at X blockheight - and after that point, we can consider those coins that have not moved as lost.

The Bitcoin community is hard at work debating these and other fascinating subjects related to quantum resistance, and things are moving. A draft for a Bitcoin Improvement Proposal or BIP is already in circulation; it presents concrete steps and describes how the network could evolve to face the quantum threat.

Join Blink as we explore the different ways to make Bitcoin quantum-resistant; and explain the financial, ethical, and philosophical implications of quantum recovery. Should we burn the lost coins or let them be reclaimed and released into the wild?

Glossary: Quantum-Resistant-Related Terms

Help Blink help you. To understand the problem that the Bitcoin network is about to face, let’s first explore the vocabulary of quantum-resistant Bitcoin and define some concepts. We will need them to explain the situation, the risks, and the implications.

  • Not every quantum computer is a threat to Bitcoin. The technology has to evolve into a powerful and stable machine before it’s possible to break a public key in 10 minutes or less. So, the risk starts with “Cryptoanalytically-Relevant Quantum Computers” or CRQCs. The Bitcoin Improvement Proposal in question, BIP360, defines CRQCs as:

A hardware-agnostic computer supposed to have the architecture to keep coherent a sufficient number of logical qubits to be able to run the Shor algorithm in an efficient fashion. is their potential to break the cryptographic assumptions of Elliptic Curve Cryptography (ECC), which secures Bitcoin's signatures and Taproot commitments.

In 1994, the mathematician Peter Shor published a quantum algorithm that can break the security assumption of the most common algorithms of asymmetric cryptography. This means that anyone with a sufficiently large quantum computer could use this algorithm to derive a private key from its corresponding public key, and thus, falsify any digital signature.

That leads us straight into private and public keys territory, an aspect of Bitcoin we should review to explain its relationship to quantum resistance.

Private Keys And The Ten Minute Window

In Bitcoin, there’s a private key that no one should see and a public key that everyone can freely share. The latter is derived from the former. There’s a “mathematical relation between them,” as Deloitte puts it. “This allows individuals to produce a digital signature (using their private key) that can be verified by anyone who has the corresponding public key. This scheme is very common in the financial industry to prove authenticity and integrity of transactions.

https://x.com/satyanadella/status/1892242895094313420

In that balanced system, it’s easy to prove that a public key matches the private one. However, it’s almost impossible to derive a private key from its public key. Or, should we say, it’s almost impossible until stable and powerful quantum computers arrive. That mixed with the following fact makes for a dangerous combination. Quoting BIP 360

Ordinarily, when a transaction is signed, the public key is explicitly stated in the input script. This means that the public key is exposed on the blockchain when the transaction is spent, making it vulnerable to quantum attack until it's mined.

Since the bitcoin network produces a block every ten minutes on average, there’s a ten-minute window that a quantum computer would have to beat to be considered a Cryptoanalytically-Relevant Quantum Computer. This is not easy. According to the research article “The impact of hardware specifications on reaching quantum advantage in the fault tolerant regime”:

In this window, transactions wait in the “mem pool” for an amount of time dependent on the fee paid; the time taken for this process is on average 10 min, but it can often take much longer. Gidney and Ekerå estimated that it would require 20 × 106 noisy qubits and 8 h to break the 2048 Rivest-Shamir-Adleman (RSA) encryption, which is of a comparable difficulty to the EC encryption of Bitcoin.

That’s right, that theoretical quantum computer that doesn’t exist yet would take eight hours to break Bitcoin.

Quantum-Resistant Bitcoin And Sha-256

A sufficiently powerful quantum computer would pose another risk. By attacking SHA-256, it could disrupt the mining process and the proof-of-work consensus mechanism. According to the research article quoted in the previous section:

A quantum computer may achieve a quadratic speedup on the hashing of the SHA256 protocol with the Grover's algorithm. The algorithmic sp for the considerably slower clock cycle times relative to state of the art classical computing for the foreseeable future. 

It’s unlikely. Plus, let’s get something straight, the BIP 360 emphasizes: “The practical impact of quantum attacks on SHA-256 remains theoretical since quantum circuits for SHA-256 are still theoretical.

The research article quoted in the previous section continues:

The second and more serious threat would be an attack on the elliptic curve encryption of signatures.

We’re focusing on that second threat: the possibility of deriving the private key from the public key, or “an attack on the elliptic curve encryption of signatures.

BIP 360, A Way To Quantum-Resistance 

To achieve quantum-resistance, the Bitcoin network has to change its signatures. The first Bitcoin Improvement Proposal that tackles the subject, BIP 360, proposes:

To implement a Pay to Quantum Resistant Hash (P2QRH) output type that relies on a PQC signature algorithm. This new output type protects transactions submitted to the mempool and helps preserve the free market by preventing the need for private, out-of-band mempool transactions.”

Authors Surmount Systems’ main selling point is that “this approach for adding a post-quantum secure output type does not require a hard fork or block size increase.” Which is a lot. However, they ask for an increase in the witness discount. This is not trivial, and it should be noted that the authors acknowledge it: “An increase in the witness discount must not be taken lightly. It must be resistant to applications that might take advantage of this discount (e.g., storage of arbitrary data as seen with "inscriptions") without a corresponding increase in economic activity.” 

So, What Happens To Satoshi’s Coins?

In Bitcoin circles, the debate around quantum-resistance is heating up. The original agitator was Jameson Lopp and his “Against Allowing Quantum Recovery of Bitcoin” article. In it, Lopp analyzes the quantum threat and tries to argue for and against quantum recovery. What should the Bitcoin network do about the so-called lost coins?

According to Lopp, we should burn them. 

Five Crucial Points Of Reflection To Comprehend Lopp’s Point

  • There isn’t a correct way to handle the situation, there are only tradeoffs. “If quantum computing becomes a threat to Bitcoin's elliptic curve cryptography, an inviolable property of Bitcoin will be violated one way or another.” The network will face a breach, the question is how to handle it: freezing funds or letting them loose?
  • Do quantum computer manufacturers deserve this treasure? Did they earn it? “Allowing quantum recovery of bitcoin is tantamount to wealth redistribution. What we'd be allowing is for bitcoin to be redistributed from those who are ignorant of quantum computers to those who have won the technological race to acquire quantum computers.
  • This isn’t Bitcoin’s first rodeo. If we check the receipts and precedents, the answer is clear. “Previous protocol vulnerabilities weren’t celebrated as "fair game" but rather were treated as failures to be remediated. Treating quantum theft differently risks rewriting Bitcoin’s history as a free-for-all rather than a system that seeks to protect its users.
  • The Bitcoin network could turn this crisis into an opportunity to evolve. “If Bitcoiners are given a "drop dead date" after which they know vulnerable funds will be burned, this pressure accelerates the adoption of post-quantum cryptography and strengthens Bitcoin long-term.
  • Some people tend to think that it’s important to have Bitcoin’s total supply in circulation. However, the fact is the system works exactly the same without Satoshi’s coins. “The 21M number in and of itself is not a particularly important detail - it's not even mentioned in the whitepaper. What's important is that the supply is well known and not subject to change.

However, not everything is black and white. 

Counterpoint: Who Gives A Fork?

Even though Lopp seems to be for burning lost coins and getting it over with, he acknowledges the difficulties this decision might bring. 

  • Letting the quantum companies plunder through the lost coins will affect every single user economically. On the other hand, “burning vulnerable funds requires centralized decision-making - a soft fork to invalidate certain transactions. This sets a dangerous precedent for future interventions, eroding Bitcoin’s decentralization.” 
  • Make no mistake, there will not be an absolute consensus about the decision. There’s a very high possibility making Bitcoin quantum-resistant could create a new coin. “A soft fork to burn vulnerable bitcoin could certainly result in a hard fork if there are enough miners who reject the soft fork and continue including transactions.

A Few Benefits Of Making Bitcoin Quantum-Resistant

To finish with Lopp’s thesis, he would “expect a neutral proposal to burn all funds in locking script types that are known to be quantum vulnerable. Thus, we could eliminate any subjectivity from the code.” A seemingly minor change that could have gargantuan implications. No pressure, but this decision could be as defining to Bitcoin’s ethos as the Blocksize War.

And there are no right answers…

https://x.com/bitschmidty/status/1909651431386128858

Be that as it may, there are silver linings all around. “On the plus side, burning all quantum vulnerable bitcoin would allow us to prune all of those UTXOs out of the UTXO set, which would also clean up a lot of dust. Dust UTXOs are a bit of an annoyance and there has even been a recent proposal for how to incentivize cleaning them up.

Is It Time To Tackle The Quantum-Resistance Problem?

Quantum computers might be evolving, even evolving fast, but Cryptoanalytically-Relevant Quantum Computers might still be far away. Even the optimistic article “The impact of hardware specifications on reaching quantum advantage in the fault tolerant regime” theorizes they are a decade away.

The authors ran the numbers and the results are clear. “We quantify the number of physical qubits required to break the encryption in one hour as a function of code cycle time and the base physical error rate. It would require approximately 317 × 106 physical qubits to break the encryption within one hour.” That’s a lot of qubits.

The previous information might be too technical for most of us, but the author’s conclusion is clear: “This large physical qubit requirement implies that the Bitcoin network will be secure from quantum computing attacks for many years (potentially over a decade).

Are we jumping the gun by discussing all of this a decade early? Or does it signal a healthy and proactive Bitcoin network?

The Ten-Year Timeframe

Let’s return to BIP 360 to see how the US government is dealing with quantum-resistance:

The Commercial National Security Algorithm Suite (CNSA) 2.0 has a timeline for software and networking equipment to be upgraded by 2030, with browsers and operating systems fully upgraded by 2033. According to NIST IR 8547, Elliptic Curve Cryptography is planned to be disallowed within the US federal government after 2035.

The US government is also working on a 10-year timeframe, how about that? Considering they’re a centralized entity and can make unilateral decisions, it might be crucial for the Bitcoin network to start discussing the issue early. Especially considering how divided the community is.

In a recent Stacker News pool titled “What should be done about Satoshi's coins when ECC is broken?,” 50% voted for “Nothing, let the attacker have them” and the other half floated among options like “burn them,” “disalow p2p transactions in memepool,” and others. 

The game is afoot. The debate is just starting. The discussion about how to make Bitcoin quantum-resistant and the debate around quantum recovery will go on for years. Thanks for starting your journey into it with Blink.

Social Share Component

Download Blink

Start receiving and sending bitcoin now

Follow us