Bitcoinist
2026-01-07 21:00:09

Bitcoin’s Security Model May Shift As Quantum Computing Moves Forward: Analyst

A Coinbase research lead has warned that advances in quantum computing could pose wider risks to Bitcoin than simple wallet theft. According to David Duong , the company’s global head of investment research, future quantum machines might be able to break the cryptographic signatures that secure transactions and could also give quantum-powered miners a big speed edge — two separate threats that would touch both user funds and Bitcoin’s economic model. Quantum Risk Moves Beyond Keys Duong said about one-third of the Bitcoin supply may be structurally exposed because their public keys are already visible on the blockchain. That figure is close to 33%, or about 6.51 million BTC, held in address types where public keys are revealed and could, in theory, be derived into private keys by a powerful enough quantum computer. Reports have highlighted that this exposure comes mostly from address reuse and older wallet formats. Experts Say Two Main Technical Threats Exist One threat is to signatures. Quantum algorithms such as Shor’s could, at scale, recover private keys from public keys, letting attackers sign transactions and drain funds. The second is a possible mining problem: a sufficiently fast quantum miner might find proofs of work much faster than classic rigs, upsetting incentives and block production. Duong and others stress the signature risk is nearer-term in theory, because it only requires cracking signatures tied to revealed public keys. What The Industry Is Doing Based on reports , the conversation has already reached fund managers and standards bodies. Some institutional filings have started to flag quantum risk, and NIST and other bodies are pushing work on post-quantum cryptography for broader systems. Engineers in the crypto space are looking at migration paths that would swap in quantum-resistant schemes, though any such change to Bitcoin would be complex and would require wide agreement. A Long-Term Problem, Not An Immediate One Duong and other commentators note that today’s quantum machines are far too small and noisy to crack Bitcoin’s cryptography. The warnings are about a possible future point often called “Q-day,” when a machine large and stable enough could run Shor’s and related algorithms at scale. Timelines vary widely among experts; some expect decades, others say the gap is shrinking faster than many predicted. According to industry sources, coins that remain in addresses that have already allowed vulnerability of public keys are the most exposed if a well-architectured quantum machine is deployed. That makes best practices — like avoiding address reuse and moving old balances to fresh, quantum-resistant addresses once those are available — sensible steps. But there is no simple, one-click fix for the whole ecosystem, experts say. Featured image from Peter Hansen/Getty Images, chart from TradingView

获取加密通讯
阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约