Key takeaways
-
Bitcoin’s quantum threat facilities on uncovered public keys and signature safety.
-
BTQ’s testnet explores post-quantum signatures in a Bitcoin-like atmosphere.
-
Submit-quantum signatures considerably improve transaction measurement and block house calls for.
-
“Previous BTC threat” is concentrated in legacy output varieties and deal with reuse patterns.
BTQ Applied sciences mentioned it had launched a Bitcoin Quantum testnet on Jan. 12, 2026, a Bitcoin-like community designed to trial post-quantum signatures with out touching Bitcoin mainnet governance.
The concept is that BTQ would exchange Bitcoin’s present signature scheme with ML-DSA, the module-lattice signature customary formalized by the Nationwide Institute of Requirements and Expertise (NIST) as Federal Info Processing Customary (FIPS) 204, for post-quantum safety assumptions.
It’s value remembering that in most Bitcoin quantum-threat fashions, the important thing precondition is public-key publicity. If a public secret is already seen onchain, a sufficiently succesful future quantum laptop might, in concept, try to recuperate the corresponding personal key offline.
Do you know? BTQ Applied sciences is a research-focused agency engaged on post-quantum cryptography and blockchain safety. Its Bitcoin Quantum testnet is designed to check how quantum-resistant signatures behave in a Bitcoin-like system.
What quantum modifications?
Most Bitcoin quantum-risk discussions give attention to digital signatures, not on Bitcoin’s coin provide or the concept a quantum laptop might magically guess random wallets.
The precise concern is {that a} cryptographically related quantum laptop (CRQC) might run Shor’s algorithm to resolve the discrete logarithm downside effectively sufficient to derive a personal key from a identified public key, undermining each the Elliptic Curve Digital Signature Algorithm (ECDSA) and Schnorr-based signing.
Chaincode Labs frames this because the dominant quantum menace mannequin for Bitcoin as a result of it might allow unauthorized spending by producing legitimate signatures.
The danger could be separated into long-range publicity, the place public keys are already seen onchain for some older script varieties or as a result of reuse, and short-range publicity, the place public keys are revealed when a transaction is broadcast and awaits affirmation, making a slender time window.
After all, no quantum laptop at present poses a right away threat to Bitcoin, and mining-related impacts needs to be handled as a separate and extra constrained dialogue in contrast with signature breakage.
Do you know? Shor’s algorithm already exists as arithmetic, nevertheless it requires a big, fault-tolerant quantum laptop to run. If such machines are constructed, they may very well be used to derive personal keys from uncovered public keys.
What BTQ constructed and why it’s attention-grabbing
BTQ’s Bitcoin Quantum testnet is actually a Bitcoin Core-based fork that swaps out one in all Bitcoin’s most essential primitives, signatures.
In its announcement, BTQ mentioned the testnet replaces ECDSA with ML-DSA, the module-lattice signature scheme standardized by the NIST as FIPS 204 for post-quantum digital signatures.
This variation forces a set of engineering trade-offs. ML-DSA signatures are roughly 38-72 instances bigger than ECDSA, so the testnet raises the block measurement restrict to 64 mebibytes (MiB) to make room for the extra transaction knowledge.
The corporate additionally treats the community as a full lifecycle proving floor, supporting pockets creation, transaction signing and verification, and mining, together with fundamental infrastructure reminiscent of a block explorer and mining pool.
Briefly, the testnet’s sensible worth is that it turns post-quantum Bitcoin right into a efficiency and coordination experiment.
The place outdated BTC threat concentrates
When analysts discuss about “outdated BTC threat” in a post-quantum context, they’re often referring to public keys which are already uncovered onchain.
A future CRQC able to operating Shor’s algorithm might, in concept, use these public keys to derive the corresponding personal keys after which produce legitimate spends.
There are three output varieties instantly susceptible to long-range assaults, particularly as a result of they place elliptic-curve public keys instantly within the locking script (ScriptPubKey): Pay-to-Public-Key (P2PK), Pay-to-Multi-Signature (P2MS) and Pay-to-Taproot (P2TR).
The distribution is uneven:
-
P2PK is a tiny share of at present’s unspent transaction outputs (UTXOs), round 0.025%, nevertheless it locks a disproportionate share of BTC worth, about 8.68% or 1,720,747 Bitcoin (BTC), largely dormant Satoshi-era cash.
-
P2MS accounts for about 1.037% of UTXOs, however reviews estimate that it secures solely round 57 BTC.
-
P2TR is frequent by rely, round 32.5% of UTXOs, but small by worth in the identical snapshot, about 0.74% or 146,715 BTC. Its publicity is tied to Taproot’s key-path design, the place a tweaked public secret is seen onchain.
Handle reuse can even flip what would in any other case be “spend-time” publicity into long-range publicity as a result of as soon as a public key seems onchain, it stays seen.
BTQ’s personal messaging makes use of this exposed-key framing to argue that the doubtless affected pool is massive. It cites 6.26 million BTC as uncovered, which is a part of why the corporate says testing post-quantum signatures in a Bitcoin-like atmosphere is value doing now.
What’s subsequent for Bitcoin?
Within the close to time period, probably the most concrete work is observability and preparedness.
As explored, the signature menace mannequin is pushed by public-key publicity. That is why discussions typically middle on how Bitcoin’s present pockets and scripting practices both reveal public keys early, as with some legacy script varieties, or cut back publicity by default, as with frequent pockets conduct that avoids reuse.
“Previous BTC threat” is subsequently largely a property of historic output varieties and reuse patterns and never one thing that out of the blue applies evenly to each coin.
The second, extra sensible constraint is capability. Even when a post-quantum migration have been socially agreed upon, it could nonetheless be a blockspace and coordination downside.
River’s explainer summarizes tutorial estimates exhibiting how delicate timelines are to assumptions. A theoretical situation wherein all transactions are migrations can compress timelines dramatically, whereas extra reasonable blockspace allocation stretches a transition into years, even earlier than accounting for governance and adoption.
BTQ’s testnet suits into that bucket. It lets engineers observe the operational prices of post-quantum signatures, together with bigger knowledge sizes and completely different limits, in a Bitcoin-like setting, with out claiming that Bitcoin is imminently breakable.
Do you know? The largest issue holding quantum computer systems again is noise, or errors. At this time’s qubits make errors continuously, so fault-tolerant error correction is required. This implies utilizing many bodily qubits to supply a small variety of dependable “logical” qubits earlier than operating the lengthy computations wanted to interrupt real-world cryptography.
What Bitcoin-level mitigation would possibly seem like
On the protocol stage, quantum preparedness is usually mentioned as a sequenced path.
Submit-quantum signature schemes are usually a lot bigger than elliptic-curve signatures, which have knock-on results for transaction measurement, bandwidth and verification prices; the identical sorts of trade-offs BTQ is surfacing by experimenting with ML-DSA.
That’s the reason some Bitcoin proposals focus first on decreasing probably the most structural publicity inside present script designs, with out committing the community to a selected post-quantum signature algorithm instantly.
A current instance is Bitcoin Enchancment Proposal (BIP) 360, which proposes a brand new output sort referred to as Pay-to-Tapscript-Hash (P2TSH). P2TSH is sort of an identical to Taproot however removes the key-path spend, the trail that depends on elliptic-curve signatures, leaving a tapscript-native route that can be utilized in methods meant to keep away from that key-path dependency.
Associated concepts have circulated on the Bitcoin developer mailing checklist underneath the broader “hash-only” or “script-spend” Taproot household, typically mentioned as Pay-to-Quantum-Resistant-Hash (P2QRH)-style constructions. These proposals once more purpose to reuse Taproot’s construction whereas skipping the quantum-vulnerable key spend.
Importantly, none of that is settled. The principle level is that Bitcoin’s possible response, if it strikes, is debated as an incremental coordination downside that balances conservatism, compatibility and the price of altering the transaction format.
The BTQ testnet is sort of revealing
BTQ’s Bitcoin Quantum testnet doesn’t settle the quantum debate, nevertheless it does make two factors more durable to disregard.
First, most credible menace fashions give attention to the place public keys are already uncovered, which is why “outdated coin” patterns maintain showing in analyses.
Second, post-quantum Bitcoin is an engineering and coordination downside. BTQ Applied sciences’ personal design decisions, reminiscent of transferring to ML-DSA and lifting block limits to accommodate a lot bigger signatures, illustrate these trade-offs.
In the end, the testnet is a sandbox for measuring prices and constraints and shouldn’t be seen as proof that Bitcoin is imminently breakable.
Cointelegraph maintains full editorial independence. The choice, commissioning and publication of Options and Journal content material aren’t influenced by advertisers, companions or business relationships.

