back to top

Report: Potential quantum‑computing threats to Bitcoin are being addressed by network preparations

Bitcoin’s Quantum Risk May Be Real, but the Network Is Preparing: A Summary of Galaxy Digital’s New Report

March 22 2026


Overview

Galaxy Digital, the crypto‑focused investment firm, released a research brief this week that revisits the long‑standing question of whether quantum computing could undermine Bitcoin’s security model. The paper concludes that the threat is genuine, but it is not an imminent crisis. Instead, it is framed as a “long‑term engineering and governance challenge” that will require coordinated upgrades across the entire ecosystem.

The study also catalogs a growing toolbox of technical proposals—ranging from new transaction formats to post‑quantum signature schemes—that aim to safeguard the network before a hypothetical “Q‑day” arrives.


Why Quantum Computing Could Threaten Bitcoin

Bitcoin’s ownership model relies on the Elliptic Curve Digital Signature Algorithm (ECDSA). In a conventional setting, the private key cannot be derived from the public key, securing the holder’s ability to spend coins. A sufficiently powerful quantum computer equipped with Shor’s algorithm, however, could solve the underlying discrete‑logarithm problem, enabling an attacker to reverse‑engineer the private key from a publicly disclosed address.

The moment a quantum machine capable of this feat becomes operational is colloquially known as Q‑day. Industry experts disagree on the timeline; forecasts range from a few years to several decades, and there is no consensus on when—or even if—the required scale of quantum hardware will be achieved. The report emphasizes that this very uncertainty is the primary concern, because Bitcoin’s decentralized governance model typically requires years to deploy protocol changes.


Which Coins Are Exposed?

Not all Bitcoin holdings are equally vulnerable. Most addresses are stored as hashed versions of a public key, meaning the key is revealed only when a transaction is broadcast. Coins that have never been spent remain safely concealed behind their hash.

Two scenarios create exposure:

  1. Public keys already on‑chain – Addresses that have been used in the past and therefore have their public key visible in the blockchain.
  2. Coins in transit – Funds being moved in a pending transaction, where the public key is temporarily revealed to validate the transfer.

Galaxy Digital estimates that millions of BTC fall into the first category, largely representing early‑adopter wallets and long‑dormant balances, including those potentially linked to Satoshi Nakamoto. If a quantum breakthrough occurs before the network can roll out protective measures, these holdings could become attractive targets.

The systemic implications extend beyond individual loss. A sudden unlocking of a large dormant supply could exacerbate price volatility and impair mining incentives—both of which are core to Bitcoin’s security architecture.


Engineering Solutions Under Development

1. Pay‑to‑Merkle‑Root (BIP‑360)

The most visible effort is the proposal to replace the traditional Pay‑to‑Public‑Key‑Hash (P2PKH) output with a Pay‑to‑Merkle‑Root structure. By embedding a Merkle tree root rather than a static public key, the design eliminates the permanent exposure of a public key on the ledger, shrinking the attack surface for a quantum adversary.

2. “Hourglass” Mechanism

Another concept, dubbed Hourglass, seeks to limit how rapidly vulnerable coins could be spent in the event of a quantum breach. Rather than preventing a theft outright, the scheme imposes a throttling period that would give markets time to absorb any shock and allow developers to deploy a more permanent fix.

3. Post‑Quantum Signature Schemes

Researchers are exploring hash‑based signatures such as SPHINCS+. These algorithms rely on the hardness of different mathematical problems that are believed to be resistant to quantum attacks. The trade‑off is larger signature sizes, which would increase transaction weight and potentially stress block space limits.

4. Commit‑and‑Reveal Transactions

A proposal in the “contingency” space introduces a commit‑and‑reveal flow. Senders first post a commitment to a future transaction, then later reveal the necessary data once the network has verified that quantum‑resistant cryptography is available. This two‑step process could protect ongoing transfers even if a quantum breakthrough occurs before the network fully migrates.

5. Zero‑Knowledge Proofs (ZKPs)

Some developers are experimenting with ZKPs that enable proof of ownership without exposing the public key itself. While still in early research stages, ZKPs could provide a privacy‑preserving layer that also reduces quantum exposure.

Overall, the report characterizes these initiatives as a layered defense, where each proposal addresses a different facet of the problem—ranging from preventing public‑key exposure to offering fallback mechanisms if a breach does occur.


Governance and Coordination Hurdles

Unlike conventional software updates, any modification to Bitcoin’s consensus rules requires a broad consensus among developers, miners, exchanges, custodians, and end‑users. Past upgrades—SegWit (2017) and Taproot (2021)—took multiple years to achieve sufficient signaling.

Quantum‑related changes add a philosophical dimension: Should the protocol forcibly disable coins that never migrate to a quantum‑safe format? Some proposals hint at incentivizing or even mandating migration, raising questions about property rights and the immutable nature of the ledger.

Yet the report argues that quantum risk is a shared external threat, unlike many past disputes that centered on economic or ideological divides. This commonality could simplify consensus building, as all stakeholders have a vested interest in preserving the network’s security and market reputation.

The decisive factor, according to Galaxy Digital, will be whether the decentralized community can align fast enough. If the timeline for a quantum breakthrough compresses, the network’s capacity to reach a coordinated upgrade will be tested.


Key Takeaways

Finding Implication
Quantum computers could eventually solve ECDSA Bitcoin’s core signature scheme is not quantum‑proof.
Q‑day timeline is uncertain (years‑to‑decades) Planning must assume a long horizon but cannot ignore near‑term possibilities.
Only a subset of BTC is exposed today Millions of coins, largely dormant or early‑adopter balances, could be at risk if quantum capabilities emerge before mitigations.
Multiple technical proposals are in active development Pay‑to‑Merkle‑Root, Hourglass, hash‑based signatures, commit‑and‑reveal, and ZKPs form a multi‑layered mitigation strategy.
Post‑quantum solutions cost more in bandwidth and storage Larger signatures/transactions could strain block limits; trade‑offs must be weighed.
Governance remains the toughest hurdle Decentralized consensus is slow; however, a universal external threat may ease coordination.
Market impact could be systemic A rapid unlock of dormant supply would pressure price and mining economics, potentially destabilizing the ecosystem.

Outlook

Galaxy Digital’s report does not predict an imminent catastrophe; instead, it paints a picture of a prolonged, coordinated effort to future‑proof Bitcoin. The ongoing development of quantum‑resistant transaction formats, alternative signature algorithms, and contingency protocols suggests that the community is already laying the groundwork for a defensive “toolkit.”

The real test will be timing: if a functional, large‑scale quantum computer appears on a tighter schedule than currently assumed, the pressure to reach consensus could mount sharply. Conversely, if quantum progress remains incremental, the network will have ample opportunity to iterate, test, and deploy the necessary upgrades without destabilizing the market.

For now, the consensus among researchers and developers is that pre‑emptive preparation is prudent, and the industry appears to be moving in that direction.

End of article



Source: https://bitcoinmagazine.com/news/bitcoins-quantum-risk-may-be-real

spot_img

More from this stream

Recomended