0age
@0age
imagine ECDSA is demonstrated to be broken by quantum computing tomorrow now everyone’s scrambling to move funds into a smart wallet with quantum-resistant signature verification ASAP what’s the best implementation of this currently out there? does one even exist?
11 replies
42 recasts
150 reactions
Dan Romero
@dwr.eth
curious if @vitalik.eth has thought about this
4 replies
31 recasts
96 reactions
EulerLagrange.eth
@eulerlagrange.eth
Sha256 and similar hash functions are considered quantum safe. STARKs use hash functions heavily and so are also considered quantum safe. So in a pinch you could hard fork an upgrade where everyone switches to a new key, and a zk proof of knowledge is used for the new private key instead of normal signatures.
2 replies
0 recast
10 reactions
0age
@0age
i'm thinking no time for hard fork, like literally being blindsided and seeing coins start moving out of big accounts granted, everything likely goes to zero in this scenario but my point is what could one individual do to protect themselves from falling victim before social coordination can step in
3 replies
0 recast
2 reactions
EulerLagrange.eth
@eulerlagrange.eth
There’s nothing you can do. Ethereum POS and most wallets are secured by elliptical curves over finite fields. So if someone gets a QC tomorrow that can break it we’re pretty much fucked. You can compute a private key pretty quickly. There’s no good way to distinguish real owner from attacker. —- To protect yourself you can use a smart contract wallet with an auth mechanism that’s quantum safe. Would be alot of gas.
2 replies
0 recast
4 reactions
EulerLagrange.eth
@eulerlagrange.eth
The problems with QCs is managing errors. Naively, If there’s an error you have to start computation over again. There are methods where you use extra qBits to help manage errors more cleanly. But then those extra qBits could have errors so you need more qBits…
1 reply
0 recast
1 reaction
EulerLagrange.eth
@eulerlagrange.eth
There was a paper that grabbed headlines where some scientists factored a prime on a QC to break RC. Would be huge, except they used a program to specifically factor 21. Which is useless.
0 reply
0 recast
1 reaction