Quantum Threat Looms for Bitcoin: Is Taproot the Answer?

Published 2 months ago4 minute read
David Isong
David Isong
Quantum Threat Looms for Bitcoin: Is Taproot the Answer?

A significant portion of Bitcoin, approximately one quarter, is susceptible to quantum attacks, primarily due to public keys already exposed on the blockchain. This vulnerability sparks a critical discussion about the fundamental security model of Bitcoin itself. The nightmare scenario involves a silent, coordinated attack by a state-level actor or a self-incentivized entity, draining millions of unspent transaction outputs (UTXOs) from wallets, thereby undermining trust and potentially causing widespread chaos or quietly siphoning funds from inactive addresses. Such an event would signify that the underlying cryptographic assumptions securing Bitcoin are no longer valid in a post-quantum era.

Quantum computers are not merely faster versions of current machines; they represent a fundamentally different computational paradigm. While not universally faster, they excel at specific problems, particularly those underpinning Bitcoin's digital signatures like Schnorr and ECDSA. These signatures rely on the 'discrete logarithm problem,' a mathematical one-way function where it's easy to generate a public key from a private key, but practically impossible to reverse the process. This asymmetry ensures that public keys can be safely shared on the blockchain. However, a sufficiently large quantum computer, utilizing Shor's algorithm, could solve the discrete logarithm problem, effectively breaking this one-way street and allowing an attacker to derive a private key from a public key.

Addressing this imminent threat presents complex challenges and significant trade-offs, both technical and social. One proposed solution involves introducing new output types that exclusively use post-quantum (PQ) signatures. These schemes would lock coins using cryptography resistant to quantum attacks from the outset. A major drawback of PQ signatures is their size, often measured in kilobytes, making them 40-600 times larger than current Bitcoin signatures. This increased data burden impacts broadcast costs, blockchain storage, and complicates existing functionalities like HD wallets, multisig setups, and basic key management. The implementation of threshold signatures with PQ algorithms also remains an active area of research. An aggressive approach, suggested by Jameson Lopp, proposes a fixed four-year migration window after the introduction of PQ signatures, after which un-migrated coins would be considered lost. While drastic, this sets a clear deadline for network adaptation.

Rather than adopting entirely new and unproven cryptographic assumptions, Bitcoin may already possess a built-in starting point for post-quantum safety: Taproot. Introduced in 2021 primarily for privacy and efficiency enhancements, Taproot also offers a pathway for a smoother transition to a quantum-safe future. Its design allows for hidden alternative spending conditions. Although most Taproot coins are currently spent using Schnorr signatures, these hidden script paths can incorporate almost any spending condition, including post-quantum signature checks. This concept was initially proposed by Matt Corallo, and its security has been more recently validated by Tim Ruffing of Blockstream Research, demonstrating that Taproot's fallback paths can remain trusted even if Schnorr and ECDSA are compromised.

This insight paves the way for a simple yet powerful upgrade path:

Step 1: Add Post-Quantum Opcodes. The initial step involves integrating support for post-quantum signatures into Bitcoin Script by introducing new opcodes. These opcodes would enable Taproot scripts to verify PQ signatures using standardized and evaluated algorithms. Users could then create Taproot outputs with two distinct spending paths: a key-path utilizing efficient Schnorr signatures for regular transactions, and a script-path containing a post-quantum fallback, only to be revealed if necessary. This approach ensures no immediate changes to coin behavior.

Step 2: Flip the Kill Switch. If a powerful quantum computer is developed and the threat becomes imminent, Bitcoin could implement a 'kill switch' to disable Schnorr and ECDSA spending. This measure would protect the network by preventing coins in vulnerable outputs from being stolen. Provided users have already migrated their funds to upgraded Taproot outputs with post-quantum fallbacks, their coins would remain secure and spendable. While some friction is inevitable, this phased approach is designed to be less disruptive than a last-minute emergency scramble, with much of the foundational work happening discreetly in advance thanks to Taproot's hidden script paths.

The timeline for a cryptographically relevant quantum computer remains unknown, ranging from years to decades. There are still open questions regarding the optimal post-quantum algorithms, their efficiency for Bitcoin, and the preservation of crucial features like threshold multisig and key derivation. However, proactive preparation is paramount. By enabling post-quantum signature support within Bitcoin Script now, users gain ample time for gradual education and migration, averting panic-driven, rushed upgrades. Tim Ruffing's research outlines a viable path forward, leveraging existing Bitcoin tools. This is a guest post by Kiara Bickers from Blockstream.

Recommended Articles

Loading...

You may also like...