Why post-quantum?
Traditional blockchains use signature schemes that are secure today but vulnerable to future quantum computers. A sufficiently powerful quantum computer could recover private keys from public keys — breaking the fundamental security assumption of digital asset custody. Quantum Chain is built from the ground up with quantum-safe cryptography, using a NIST-standardized post-quantum signature scheme. This means:- No migration needed — your keys and transactions are quantum-resistant from day one
- Future-proof — security guarantees hold even as quantum computing advances
- Standards-based — built on algorithms vetted by the global cryptographic community through NIST’s Post-Quantum Cryptography standardization process
What this means for integrators
Signing works the same way
The signing flow is identical to traditional blockchains: you receive a
hash, sign it with your private key, and submit the signature. The
quantum-safe layer is transparent to your integration.
Addresses are compatible
Quantum Chain addresses use the same
0x-prefixed, 20-byte format as
Ethereum. Your existing address handling code works without modification.Larger signatures
Post-quantum signatures are significantly larger than classical ECDSA signatures. This is
the primary trade-off for quantum resistance. Quantum Chain’s network
parameters are tuned to handle this natively.
Key management
Your private keys must be generated using Quantum Chain’s quantum-safe
scheme. Key generation tooling and SDKs are provided during onboarding.
The quantum threat
Quantum computers exploit Shor’s algorithm to solve the mathematical problems that underpin traditional public-key cryptography (ECDSA, RSA, etc.) in polynomial time. While large-scale quantum computers don’t exist yet, the threat is real:- Harvest now, decrypt later — adversaries can record encrypted data and signed transactions today, then break them when quantum computers arrive
- Long-lived assets — digital assets and keys that must remain secure for years or decades are especially at risk
- Regulatory pressure — NIST, NSA, and other bodies are mandating migration timelines for post-quantum readiness
NIST standardization
Quantum Chain’s signature scheme was selected through NIST’s multi-year Post-Quantum Cryptography standardization project:| Phase | Year | Milestone |
|---|---|---|
| Round 1 | 2017 | 69 candidate algorithms submitted |
| Round 2 | 2019 | Narrowed to 26 candidates |
| Round 3 | 2020 | 7 finalists and 8 alternates |
| Standardization | 2024 | Final standards published as FIPS documents |
Security model
What is protected
What is protected
All transaction signatures and wallet key pairs use quantum-safe
cryptography. An attacker with a quantum computer cannot forge signatures or
derive private keys from public keys.
What is not changed
What is not changed
Hash functions (Keccak256/SHA-3) used for address derivation and transaction
hashing are already quantum-resistant. They require Grover’s algorithm,
which only provides a quadratic speedup — easily countered by using
sufficient hash lengths.
Key generation
Key generation
Keys must be generated using Quantum Chain’s quantum-safe tooling. Standard
ECDSA key generation tools will not produce compatible keys. SDKs and
documentation for key generation are provided during onboarding.
Further reading
External signing guide
How to sign transactions with your quantum-safe key — the core integration
flow.
NIST PQC Project
NIST’s official Post-Quantum Cryptography standardization project.