Perhaps the simplest possible quantum-security upgrade

Dec 17 - Dec 18, 2025

  • Erik's proposal introduces a pioneering approach to safeguard the Bitcoin blockchain from quantum threats by implementing a novel security mechanism that does not necessitate the development of a new signature scheme.

This method focuses on enhancing the proof of utxo ownership through a chain-native authorization primitive, leveraging the economic assumptions integral to transaction finality. The essence of this solution lies in its minimally invasive design, featuring a new introspection opcode that reveals a challenge derived directly from the blockchain. This challenge, based on the hash of a block at a determined distance from the UTXO creation point, forms part of a dual-layered security process requiring both a traditional signature and a hash-based proof conditioned on future blockchain data.

The proposed system operates on a commit-challenge-response framework, with the unique feature that the challenge originates from future blocks within the blockchain. This structure ensures that an attacker must surmount both quantum cryptographic challenges and the economic barriers associated with altering blockchain confirmation depths, thereby offering a robust defense against potential quantum computing threats. Notably, Erik's proposal promises to maintain the existing infrastructure of Bitcoin, including address formats and transaction sizes, while steering clear of untested cryptographic assumptions.

Additionally, the discussion extends to an innovative ephemeral anchor transaction method aimed at preemptively addressing quantum vulnerabilities. This technique entails a spender committing to a secret in one block, which remains undisclosed until revealed in a subsequent transaction. A critical element of this strategy is the introduction of an opcode validating the temporal precedence of the anchor transaction relative to the spend transaction. This method capitalizes on temporal information asymmetry to protect transactions, offering an alternative safeguard against quantum adversaries without depending on conventional signatures. For those interested in delving deeper into the technical details or contributing to the initiative, Erik has provided Python code accessible here, illustrating the process and encouraging community engagement and further development.

A critique raised in response to Erik's proposal highlights a potential vulnerability inherent in the commit/reveal protocol, specifically regarding the non-committal nature of the "anchor tx" to the reveal transaction. This gap could allow a quantum adversary to exploit the reveal transaction once it becomes public by replicating the secret, inverting the public key, and attempting a replace-by-fee (RBF) attack. This critique underscores the importance of addressing and mitigating potential loopholes in the proposed mechanism to ensure its effectiveness and reliability in counteracting quantum threats.

Link to Raw Post

Thread Summary (1 replies)

Dec 17 - Dec 18, 2025

Message History

2 messages

Erik AronestyOriginal Post
Dec 17, 2025/20:57 UTC
Erik Aronesty
Dec 18, 2025/16:11 UTC
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from high signal bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiDecoding BitcoinWarnet
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project.

Give Feedback