Bitcoin’s Quantum Risk Steals Spotlight At Ethereum Gathering

bitcoinist发布于2026-02-23更新于2026-02-23

文章摘要

Bitcoin's vulnerability to quantum computing emerged as a key topic at the ETH Denver conference. While quantum computers pose only a moderate threat to Bitcoin’s hashing algorithms due to limited speed improvements, the real concern lies with digital signatures. Most wallets rely on elliptic curve cryptography, which Peter Shor’s algorithm could break using a sufficiently powerful quantum computer, allowing attackers to derive private keys from public keys. Current estimates of the qubit requirements for such an attack have decreased, with some studies suggesting six-figure-range machines might eventually pose a risk. However, practical challenges like error rates and stability remain significant barriers. In response, the crypto industry is proactively developing defenses. The Ethereum Foundation has a dedicated research group, and companies like Coinbase are engaged in planning, expressing confidence that the quantum threat is solvable with preparation.

Talk of quantum computers no longer sounds like science fiction at crypto events. At a recent developer gathering, the ETH Denver, engineers and security researchers turned their attention to a simple but unsettling question: what happens to Bitcoin if a powerful quantum machine comes online?

Reports have disclosed that new proposals are being folded into the network’s improvement process, laying early groundwork for defenses before any real crisis appears.

Quantum Computing: Why Hashing Is Not The Main Fear

Hashing—what miners and many parts of the system use—gets faster only a bit with quantum tricks. According to Lov Grover’s work, a quantum search method gives a square-root speedup, which changes safety margins but does not wipe them out.

In plain language: to break hashes at scale would need enormous, maybe unrealistic, machines under current models.

Signatures Face The Real Risk

Reports say the bigger worry is signatures. “What we’re worried about in the next five years are signatures, and that goes over with Shor’s,” Hunter Beast, co-author of BIP 360, said during the ETH Denver gathering.

The math behind most wallets today relies on elliptic curves, and Peter Shor showed a way a quantum machine could reverse that math.

That’s how a public key could reveal a private key once the right hardware exists. A blockchain security firm has been tracking addresses that have already exposed their public keys, and the numbers are not tiny.

Blockchain cybersecurity firm Project Eleven’s list flags millions of coins that, if an attacker had a big enough quantum device, would be at risk.

Bitcoin is now trading at $67,715. Chart: TradingView

How Close Are We?

Estimates have been moving. Older papers put the needed resources in the many millions of qubits. More recent research from groups like Iceberg Quantum suggests the figure could be much lower, perhaps into the six-figure range.

Still, raw qubit counts tell only part of the story. What matters is how many “logical” qubits you can run with acceptable error rates, how long calculations take, and whether the machine can stay stable for that time.

Lab steps by big firms also matter; for example, Google has reported progress in error correction that many found encouraging. That doesn’t mean the break-in is imminent, but it does change risk models.

Where The Industry Stands

Reports note teams are forming to study and build defenses. The Ethereum Foundation has a post-quantum group, and major exchanges and firms are taking part in discussions.

Coinbase set up advisers, and its CEO, Brian Armstrong, has said the problem can be handled with planning. It is “solvable”, he said.

Featured image from Devfolio, chart from TradingView

相关问答

QWhat is the main quantum computing risk to Bitcoin discussed at the ETH Denver gathering?

AThe main quantum risk discussed is to digital signatures, not hashing. A powerful quantum computer using Shor's algorithm could potentially reverse the elliptic curve mathematics used in wallets, exposing private keys from public keys.

QAccording to the article, how does quantum computing affect Bitcoin's proof-of-work hashing?

AQuantum computing offers only a square-root speedup for hashing (per Lov Grover's algorithm), which reduces safety margins but does not eliminate them. Breaking hashes at scale would require enormous, potentially unrealistic machines under current models.

QWhich specific algorithm poses a threat to the elliptic curve cryptography used in Bitcoin wallets?

AShor's algorithm poses the threat to elliptic curve cryptography. It provides a method for a quantum computer to reverse the math, allowing a public key to reveal its corresponding private key.

QWhat recent progress was mentioned that is changing quantum computing risk models?

AGoogle has reported progress in error correction for quantum computers, which many found encouraging. This doesn't mean a break-in is imminent, but it does change the risk models by improving the stability and feasibility of quantum computations.

QHow is the cryptocurrency industry preparing for the potential quantum threat?

AThe industry is forming teams to study and build defenses. The Ethereum Foundation has a post-quantum group, major exchanges like Coinbase have set up advisers, and its CEO Brian Armstrong has stated the problem is 'solvable' with planning.

你可能也喜欢

交易

现货
合约

热门文章

如何购买S

欢迎来到HTX.com!我们已经让购买Sonic(S)变得简单而便捷。跟随我们的逐步指南,放心开始您的加密货币之旅。第一步:创建您的HTX账户使用您的电子邮件、手机号码注册一个免费账户在HTX上。体验无忧的注册过程并解锁所有平台功能。立即注册第二步:前往买币页面,选择您的支付方式信用卡/借记卡购买:使用您的Visa或Mastercard即时购买Sonic(S)。余额购买:使用您HTX账户余额中的资金进行无缝交易。第三方购买:探索诸如Google Pay或Apple Pay等流行支付方法以增加便利性。C2C购买:在HTX平台上直接与其他用户交易。HTX场外交易台(OTC)购买:为大量交易者提供个性化服务和竞争性汇率。第三步:存储您的Sonic(S)购买完您的Sonic(S)后,将其存储在您的HTX账户钱包中。您也可以通过区块链转账将其发送到其他地方或者用于交易其他加密货币。第四步:交易Sonic(S)在HTX的现货市场轻松交易Sonic(S)。访问您的账户,选择您的交易对,执行您的交易,并实时监控。HTX为初学者和经验丰富的交易者提供了友好的用户体验。

2.0k人学过发布于 2025.01.15更新于 2025.03.21

如何购买S

相关讨论

欢迎来到HTX社区。在这里,您可以了解最新的平台发展动态并获得专业的市场意见。以下是用户对S(S)币价的意见。

活动图片