Bitcoinist
2026-01-07 21:00:09

Bitcoin’s Security Model May Shift As Quantum Computing Moves Forward: Analyst

A Coinbase research lead has warned that advances in quantum computing could pose wider risks to Bitcoin than simple wallet theft. According to David Duong , the company’s global head of investment research, future quantum machines might be able to break the cryptographic signatures that secure transactions and could also give quantum-powered miners a big speed edge — two separate threats that would touch both user funds and Bitcoin’s economic model. Quantum Risk Moves Beyond Keys Duong said about one-third of the Bitcoin supply may be structurally exposed because their public keys are already visible on the blockchain. That figure is close to 33%, or about 6.51 million BTC, held in address types where public keys are revealed and could, in theory, be derived into private keys by a powerful enough quantum computer. Reports have highlighted that this exposure comes mostly from address reuse and older wallet formats. Experts Say Two Main Technical Threats Exist One threat is to signatures. Quantum algorithms such as Shor’s could, at scale, recover private keys from public keys, letting attackers sign transactions and drain funds. The second is a possible mining problem: a sufficiently fast quantum miner might find proofs of work much faster than classic rigs, upsetting incentives and block production. Duong and others stress the signature risk is nearer-term in theory, because it only requires cracking signatures tied to revealed public keys. What The Industry Is Doing Based on reports , the conversation has already reached fund managers and standards bodies. Some institutional filings have started to flag quantum risk, and NIST and other bodies are pushing work on post-quantum cryptography for broader systems. Engineers in the crypto space are looking at migration paths that would swap in quantum-resistant schemes, though any such change to Bitcoin would be complex and would require wide agreement. A Long-Term Problem, Not An Immediate One Duong and other commentators note that today’s quantum machines are far too small and noisy to crack Bitcoin’s cryptography. The warnings are about a possible future point often called “Q-day,” when a machine large and stable enough could run Shor’s and related algorithms at scale. Timelines vary widely among experts; some expect decades, others say the gap is shrinking faster than many predicted. According to industry sources, coins that remain in addresses that have already allowed vulnerability of public keys are the most exposed if a well-architectured quantum machine is deployed. That makes best practices — like avoiding address reuse and moving old balances to fresh, quantum-resistant addresses once those are available — sensible steps. But there is no simple, one-click fix for the whole ecosystem, experts say. Featured image from Peter Hansen/Getty Images, chart from TradingView

Get Crypto Newsletter
Read the Disclaimer : All content provided herein our website, hyperlinked sites, associated applications, forums, blogs, social media accounts and other platforms (“Site”) is for your general information only, procured from third party sources. We make no warranties of any kind in relation to our content, including but not limited to accuracy and updatedness. No part of the content that we provide constitutes financial advice, legal advice or any other form of advice meant for your specific reliance for any purpose. Any use or reliance on our content is solely at your own risk and discretion. You should conduct your own research, review, analyse and verify our content before relying on them. Trading is a highly risky activity that can lead to major losses, please therefore consult your financial advisor before making any decision. No content on our Site is meant to be a solicitation or offer.