tl;dr: “All is well. All is well.” – Ranchoddas Shamaldas Chanchad
I tend to get the “Is Aptos post-quantum (PQ) secure?” or “Can Aptos be made PQ-secure?” questions very often.
This post should serve as a good, initial answer. (I will evolve it in time.)
Post-quantum (PQ) Aptos
Like all other blockchains that I know of, Aptos is currently not PQ-secure: it simply does not make sense to pay the cost of doing PQ crypto given what we know about scalable quantum computing.
The quantum threat is evolving though. I am tracking that evolution separately1.
Nonetheless, upgradeable chains like Aptos can be easily made almost-fully PQ-secure.
How? In a few phases:
- Patch consensus to be PQ secure and give users the option to rotate their accounts to be PQ safe.
- Add mandatory PQ fallbacks to all Aptos account types (to the extent possible).
- Quantum-proof Aptos’s differentiating features
Phase 1: Consensus and account signatures
The goal here is to patch only the core blockchain functionality so that users, should they be proactive, can remain safe against quantum attacks.
Hash functions
Difficulty: Zero.
Assuming the BHT attack on hash functions does not actually scale in practice2, hash function length can be kept the same.
PQ consensus
Difficulty: Medium-high.
Consensus BLS3 multi-signatures can be changed to a PQ variant via a simple protocol upgrade. The Ethereum Foundation has done a lot of great work on this lately4.
Another path is to simply swap consensus signatures with 128-bit MACs: with 250 validators, a validator’s message will now be “signed” by MAC’ing it for all 250 validators: 250 $\times$ 16 bytes $=$ 4,000 bytes per “signature.”
Add a PQ digital signature scheme
Difficulty: Low; already-implemented and deployed on mainnet in AIP-1375. Not enabled yet.
We already added support for users to proactively migrate their funds to a PQ account, based on their own assessment of the quantum threat.
We chose the recently NIST-standardized SLH-DSA-SHA2-128s as the PQ signature scheme. See AIP-1375 for why, as well as some of my preliminary research into the PQ signature landscape6.
Account key rotation
Difficulty: Easy: just remove support for non-private-entry key rotation functions.
Some (but not all) key rotation functionality in Aptos requires a ZKPoK of the new secret key being rotated to. This can also be done using a post-quantum zkSNARK.
I would more simply preclude the problem by removing this functionality and only keeping the entry-function-based key rotation.
Phase 2: Graceful fallbacks for account signatures
The goal here is to patch all Aptos user account types to be post-quantum safe, without requiring users to be proactive.
This will be needed if the quantum threat materializes before all users have had a chance to proactively migrate. At that point, classic schemes must be disabled, or else their accounts would be instantly drained by the quantum adversary. Then, the PQ fallback mechanism would be enabled, restoring user access while preventing quantum adversaries from stealing.
Ed25519 Aptos accounts can fall back to post-quantum security
Difficulty: High. Requires a custom PQ zkSNARK solution.
Chaum et al.7 showed how some classical signature schemes can be made PQ-ready with a small change. Specifically, they change ECDSA’s key generation, obtaining a new ECDSA scheme that admits a post-quantum secure fallback mechanism via Winternitz one-time signatures (W-OTS+)8. Specifically, once a quantum adversary reveals the ECDSA SK, the fallback mechanism treats this as a new public key, whose corresponding SK is a W-OTS+ one, which the quantum adversary cannot get.
Their techniques could be applied to the Ed255199 $\sk$, which is derived from some secret bits $b$ via a hash function as $\sk = H(b)$. Crucially, this is conceptually simpler than Chaum et al.’s approach: Ed25519’s key generation need not be changed. Instead, one can use a PQ zkSNARK to bootstrap a PQ signature scheme that proves knowledge of the secret bits $b$ under the new fallback PK $H(b)$ and, in the process, signs a message.
This idea was sketched by Vitalik Buterin10, additionally discussing how to hard-fork to undo any missed quantum thefts.
ECDSA signatures: the bane of my existence
Difficulty: High. Requires not only carefully-crafted zkSNARK, but also potentially proving in ZK the PBKDF2 derivation from BIP-39.
ECDSA signatures11 are more challenging, since their secret keys are not (necessarily) derived in an Ed25519-like manner. As a result, the full secret key would be known to a quantum adversary, unlike in Ed25519.
Nonetheless, as explained above, ECDSA accounts can be manually rotated to a PQ-secure account by their owners, once it is well-known that a quantum computer exists.
Unfortunately, not everyone will be aware of the quantum threat. As a result, some inactive users will likely have their accounts stolen.
Luckily, as hinted before, there is light at the end of the tunnel10$^,$12:
The BIP-3913 and BIP-3214 key derivation mechanism (from a 12-word or 24-word mnemonic down to an ECDSA secret key) can be leveraged to provide fallback PQ security for ECDSA accounts as well, in a similar manner to Ed25519. This assumes that most ECDSA SKs are derived using a mnemonic or are derived using BIP-32. One difficulty will be the large # of PB-KDF2 iterations in BIP-39.
Perhaps we can avoid it by “stopping earlier” and using the BIP-32 child keys as the PQ SK?
Hardware wallet-protected accounts
Difficulty: High.
In theory, all of the mechanisms discussed above for Ed25519 and ECDSA would work in a hardware wallet setting too.
In practice, there are many difficulties:
- Hardware wallets have slow compute and low memory; computing a zkSNARK proof in most of them will be virtually impossible
- Even if we could compute a zkSNARK proof there, convincing popular hardware wallets to adopt and implement our zkSNARK-based PQ signature scheme(s) will be an uphill battle.
I think therein may lie a great business opportunity: build post-quantum hardware wallets!
Keyless accounts
Difficulty: High, for two reasons. First, needs OIDC providers like Google and Apple to transition from RSA-2048 to a PQ secure signature scheme. Second, needs PQ zkSNARK with fast verification that can efficiently wrap these new OIDC PQ signatures.
Once OIDC providers adopt PQ signatures, Keyless ZKPs15 can be transitioned to a PQ-secure zkSNARK (lattices, code-based, sumcheck, etc.)
For example, the Spartan framework instantiated with a PQ MLE PCS would yield such a PQ secure zkSNARK.
The difficulty will be in reducing the verifier time (priority #1) and the proof size (priority #2).
Phase 3: Privacy features and more
The goal here is to quantum-proof Aptos’s differentiating features: randomness, encrypted pending TXNs and confidential assets.
Aptos randomness
Difficulty: High, because 1-round, threshold VRFs that are post-quantum secure are not here yet, AFAIK.
One way to get Aptos randomness16 is via:
Another way would be via post-quantum SMURFs, but those would imply efficient $n$-party non-interactive key exchange, so they are extremely unlikely without strong assumptions like multilinear maps or indistinguishability-obfuscation (iO).
Encrypted pending transactions
Difficulty: High. Relies on batch threshold encryption.
Batch threshold encryption24 is a new cryptographic primitive that Aptos is about to deploy to temporarily encrypt TXNs before they are executed, so as to mitigate maximal extractable value (MEV) attacks.
Unfortunately, a quantum adversary can break the threshold PK that changes and is published on chain every 2 hours. We’d either have to assume slow quantum adversaries, or patch the feature.
Like Aptos randomness, this feature also requires a post-quantum DKG.
But, unlike Aptos randomness, this feature is more exotic: it relies on a newer primitive for which we have barely begun exploring lattice-based (plausibily PQ) instantiations25.
Confidential transfers
Difficulty: High.
Confidential assets (CFAs)26 is a new feature on Aptos that lets users maintain secret balances and transfer secret amounts. (However, it does not maintain secrecy of the sender’s address, nor of the recipient’s.)
CFAs need two kinds of protections:
- Post-quantum soundness: This ensures that a quantum adversary cannot inflate the CFA supply and thus cannot steal the underlying Aptos fungible assets deposited in the confidential pool.
- Post-quantum privacy: This ensures that a quantum adversary cannot decrypt the CFA balances nor the transferred amounts.
For post-quantum soundness, the migration away from our quantum-vulnerable Bulletproof ZK range proof is already in the works27 and may make it to mainnet before the feature is enabled.
For post-quantum privacy, there are two routes
- A PQ-secure additively-homomorphic encryption scheme that is efficient and ZK-friendly. Some are in the works, but not performant enough28.
- Avoid the need for a (more?) expensive PQ-secure additively-homomorphic scheme by building a UTXO-like confidential asset feature inside our Aptos Move framework
- It would seem that most post-quantum PKEs that we’d use are LWE-based and admit some form of homomorphism. So it’s not clear that non-homomorphic schemes would be that much cheaper.
Conclusion
“Keep calm and deploy cutting-edge cryptography.”
Of course, this post does not address many fascinating questions:
- How hard are some of these research problems?
- PQ zkSNARKs with sufficiently-fast verifier and small-enough proofs for on-chain verification
- e.g., TXN signatures if based on such SNARKs need to kept as part of the TXN history
- PQ 1-round threshold VRFs?
- PQ batch threshold encryption?
- SNARK-friendly PQ PKEs (for confidential assets)
- PQ zkSNARKs with sufficiently-fast verifier and small-enough proofs for on-chain verification
- How efficient would a post-quantum Aptos be?
- How much time it would take to make these changes?
- Perhaps this is not as interesting to discuss: it really depends on engineering resources allocated.
Plus, my sense is that there would be more than enough time:We’d see how fast quantum computers improve,We’d predict the date by which we’d need to be ready,We’d allocate all resources to ensure we are ready.
Not even a year passed and it’s so clear how naive my thinking there was… Turns out, nobody agrees on how fast quantum computers are improving. Some folks think it’s ridiculous to even talk about PQ safety so early. All in all, it’s a madhouse out there and there’s a real risk that, due to how hard it is to judge progress in the quantum field, blockchains will be caught by surprise.
Acknowledgements
Thanks to Dan Boneh for encouraging me to write this.
Your thoughts or comments are welcome on this thread32.
References
For cited works, see below 👇👇
-
Quantum computing, Alin Tomescu, April 3rd, 2026 ↩
-
Cost analysis of hash collisions : will quantum computers make SHARCS obsolete?, by Daniel J. Bernstein, 2009, [URL] ↩
-
Scalable BLS Threshold Signatures, Alin Tomescu, March 12th, 2020 ↩
-
Hash-Based Multi-Signatures for Post-Quantum Ethereum, by Justin Drake and Dmitry Khovratovich and Mikhail Kudinov and Benedikt Wagner, in Cryptology {ePrint} Archive, Paper 2025/055, 2025, [URL] ↩
-
AIP-137: Post-quantum Aptos accounts via SLH-DSA-SHA2-128s signatures, Alin Tomescu, December 9th, 2025 ↩ ↩2
-
Post-quantum signature schemes, Alin Tomescu, December 8th, 2025 ↩
-
W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets, by David Chaum and Mario Larangeira and Mario Yaksetig and William Carter, in Cryptology ePrint Archive, Paper 2021/872, 2021, [URL] ↩
-
WOTS+ – Shorter Signatures for Hash-Based Signature Schemes, by Andreas Hülsing, in Cryptology ePrint Archive, Paper 2017/965, 2017, [URL] ↩
-
Schnorr Signatures: EdDSA and Ed25519, Alin Tomescu, May 31st, 2024 ↩
-
How to hard-fork to save most users’ funds in a quantum emergency, Vitalik Buterin, March 9th, 2024 ↩ ↩2
-
ECDSA Signatures, Alin Tomescu, June 1st, 2024 ↩
-
Post-Quantum Readiness for EdDSA Chains and a Possible Solution for Some ECDSA Wallets: Part 1, Conor Deegan, August 12th, 2025 ↩
-
BIP-39: Mnemonic code for generating deterministic keys, Marek Palatinus, Pavol Rusnak, Aaron Voisine, and Sean Bowe, 2013 ↩
-
BIP-32: Hierarchical Deterministic Wallets, Pieter Wuille, February 11th, 2012 ↩
-
Keyless Blockchain Accounts on Aptos, Alin Tomescu, June 13th, 2024 ↩
-
Roll with Move: Instant Randomness on Aptos, Aptos Labs, June 26th, 2024 ↩
-
Resilience-Optimal Lightweight High-threshold Asynchronous Verifiable Secret Sharing, by Hao Cheng and Jiliang Li and Yizhong Liu and Yuan Lu and Weizhi Meng and Zhenfeng Zhang, in Cryptology {ePrint} Archive, Paper 2024/1761, 2024, [URL] ↩
-
Asynchronous Consensus without Trusted Setup or Public-Key Cryptography, by Sourav Das and Sisi Duan and Shengqi Liu and Atsuki Momose and Ling Ren and Victor Shoup, in Cryptology {ePrint} Archive, Paper 2024/677, 2024, [URL] ↩
-
Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience, by Victor Shoup and Nigel P. Smart, in Cryptology ePrint Archive, Paper 2023/536, 2023, [URL] ↩
-
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and {VRFs, by Muhammed F. Esgin and Ron Steinfeld and Dongxi Liu and Sushmita Ruj, in Cryptology {ePrint} Archive, Paper 2022/141, 2022, [URL] ↩
-
Quantum Disruption: An SOK of How Post-Quantum Attackers Reshape Blockchain Security and Performance, by Tushin Mallick and Maya Zeldin and Murat Cenk and Cristina Nita-Rotaru, 2025, [URL] ↩
-
Key Homomorphic PRFs and Their Applications, by Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan, in Cryptology ePrint Archive, Paper 2015/220, 2015, [URL] ↩
-
D-KODE: Mechanism to Generate and Maintain a Billion Keys, by Easwar Vivek Mangipudi and Aniket Kate, in Cryptology ePrint Archive, Paper 2022/161, 2022, [URL] ↩
-
TrX}: Encrypted Mempools in High Performance {BFT} Protocols, by Rex Fernando and Guru-Vamsi Policharla and Andrei Tonkikh and Zhuolun Xiang, in Cryptology {ePrint} Archive, Paper 2025/2032, 2025, [URL] ↩
-
Batch Decryption without Epochs and its Application to Encrypted Mempools, by Dan Boneh and Evan Laufer and Ertem Nusret Tas, in Cryptology {ePrint} Archive, Paper 2025/1254, 2025, [URL] ↩
-
Confidential assets on Aptos, Alin Tomescu, August 8th, 2025 ↩
-
Fiat, Shamir and Shor walk into a bar… 🍺, Alin Tomescu, March 26th, 2026 ↩
-
Lether: Practical Post-Quantum Account-Based Private Blockchain Payments, by Hongxiao Wang and Muhammed F. Esgin and Ron Steinfeld and Siu-Ming Yiu, in Cryptology {ePrint} Archive, Paper 2026/076, 2026, [URL] ↩
-
WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification, by Gal Arnon and Alessandro Chiesa and Giacomo Fenzi and Eylon Yogev, in Cryptology {ePrint} Archive, Paper 2024/1586, 2024, [URL] ↩
-
Merkle-hashing with the Ajtai hash function, 0xAlbertG, May 20th, 2025 ↩
-
ML-DSA signature verification benchmarks, Conor Deegan, 2025 ↩
-
Discussion thread for this post, Alin Tomescu, May 28th, 2025 ↩