A recent brief from the Bitcoin Policy Institute highlights significant developments in quantum computing that may change the timeline for potential threats to Bitcoin’s cryptographic security. The report, titled “State of Play: Quantum Computing and Bitcoin’s Path Forward,” references two pivotal research papers released on March 31 by intellectual powerhouses Google and the California Institute of Technology. These studies challenge previously held beliefs about the quantum computing capabilities required to breach Bitcoin’s encryption.
Historically, estimates indicated that around 10 million qubits would be necessary for an attacker to utilize Shor’s algorithm effectively against Bitcoin’s security model. However, the analysis by the Bitcoin Policy Institute suggests that this threshold may be lowered to fewer than 500,000 qubits based on Google’s findings. Moreover, a collaborative research effort from Caltech and the University of California, Berkeley, posits that specialized quantum systems could potentially bring this requirement down to between 10,000 and 26,000 qubits.
Despite these advancements, the Bitcoin Policy Institute reassures stakeholders that Bitcoin is not currently facing an immediate threat. Existing quantum technologies still lag substantially behind these theoretical benchmarks. For example, Google’s advanced processor, Willow, operates with slightly over 100 qubits, highlighting a significant gap between current capabilities and the threshold needed for a credible quantum attack. Nevertheless, the Institute underscores that these findings indicate it is crucial to ramp up preparations.
The report shines a light on ongoing efforts in the Bitcoin development community aimed at mitigating long-term risks associated with quantum computing. One crucial initiative mentioned is BIP-360, seen as one of the most vibrant areas of protocol development. This proposal focuses on introducing a new address format that keeps public keys concealed during transactions, thereby removing a critical vulnerability susceptible to quantum-based attacks. A testnet launched in March has already engaged over 50 miners and more than 100 cryptographers, demonstrating robust participation and commitment from the technical community.
The report also considers Bitcoin’s foundational architecture, which allows for flexibility amidst these challenges. The Taproot upgrade, activated in 2021, introduced features that could support quantum-resistant verification methodologies through alternative spending conditions, reiterating Bitcoin’s adaptability.
In a wider policy context, the Bitcoin Policy Institute notes that the National Institute of Standards and Technology has finalized post-quantum cryptographic standards, with a deadline of 2035 for federal agencies to transition to quantum-resistant systems. Google is aiming for its transition by 2029.
However, Bitcoin’s decentralized nature presents unique hurdles. Unlike governmental bodies or corporations, the Bitcoin network cannot enforce upgrades autonomously; any changes must emerge from consensus among network participants. Despite this challenge, historical precedents of successful upgrades suggest that coordination is achievable. The stakeholders in the network have a mutual interest in maintaining system integrity, which could facilitate alignment on necessary upgrades for quantum security.
As the Institute concludes, while the quantum threat is not imminent, the timeline is narrowing. It believes that the technical solutions are beginning to materialize, and the next challenge will be how the network can agree on the implementation of these crucial upgrades. Adding to this discourse, a recent research proposal by StarkWare’s Avihu Levy, termed “Quantum Safe Bitcoin” (QSB), aims to secure Bitcoin transactions against future quantum threats without necessitating modifications to the network’s core protocol. This innovative strategy focuses on transitioning security measures from vulnerable ECDSA signatures to hash-based assumptions, which are designed to withstand attacks from methods like Shor’s algorithm while being congruent with Bitcoin’s architecture.


