Recent discussions have sparked concern regarding the potential impact of quantum computers on the security of Bitcoin. However, experts clarify that the real threat lies not in the ability of quantum computers to “crack” Bitcoin encryption, but rather in exploiting digital signatures linked to exposed public keys.
It is essential to understand that Bitcoin does not utilize encryption in the traditional sense. Instead, it employs digital signatures and hash-based commitments to establish ownership. This means that while quantum computers may not decrypt data, they could potentially forge authorizations by using Shor”s algorithm against Bitcoin”s elliptic-curve cryptography. Such an attack could allow the derivation of a private key from an exposed public key, enabling the creation of a valid signature for competing transactions.
Adam Back, a prominent developer in the Bitcoin community, emphasized this point succinctly, stating that “Bitcoin does not use encryption.” This clarification highlights a terminology error often propagated in discussions about quantum threats. The blockchain operates as a public ledger, meaning all transactions, amounts, and addresses are visible, and nothing is encrypted.
The core issue revolves around the exposure of public keys, which can become a vulnerability. Bitcoin”s signature systems, namely ECDSA and Schnorr, are critical for proving control over a keypair. Therefore, the risk of public-key exposure is pivotal. Address formats often commit to a hash of a public key, meaning the raw public key is only revealed when a transaction is executed. This design mitigates the risk window for attackers, particularly if address reuse occurs.
Current research, such as the open-source “Bitcoin Risq List” by Project Eleven, tracks the exposure of public keys and their potential vulnerability to quantum attacks. Their findings indicate approximately 6.7 million BTC that may be at risk due to public key exposure.
Furthermore, advancements in technology and protocol upgrades, like Taproot, alter how public keys are exposed. Taproot outputs incorporate a tweaked public key within the output program, altering the exposure landscape depending on future quantum computing capabilities. While these changes do not create immediate vulnerabilities, they may impact the default exposure if quantum key recovery becomes feasible.
As the landscape of quantum computing evolves, the ability to measure risk is crucial, even if such threats are not imminent. Current estimates suggest significant computational resources would be required for a quantum computer to successfully break Bitcoin”s elliptic-curve cryptography, with estimates ranging in the millions of physical qubits necessary for effective attacks.
Consequently, the focus should be on behavioral and protocol-level strategies to mitigate exposure. Address reuse can heighten risk, and wallet designs can be improved to reduce vulnerability. While the narrative surrounding quantum threats often emphasizes urgency, the reality is that many factors contribute to the overall security of Bitcoin, including user behavior and protocol resilience.
In conclusion, while the quantum computing landscape is evolving, and preparations for potential future threats are underway, the immediate risk to Bitcoin is less about encryption and more about the exposure of public keys and the actions users take with their wallets.












































