Ethereum outlines plan to counter threats from quantum computing.
- Ethereum prepares defense against quantum computing attacks.
- Vitalik proposes post-quantum signatures and STARK proofs.
- The future security of cryptocurrencies is becoming a focus of the network.
Ethereum co-founder Vitalik Buterin has presented a technical roadmap aimed at protecting the network against potential quantum computing threats. While large-scale attacks are still considered theoretical, the plan seeks to prepare the infrastructure for a long-term scenario.
Now, the quantum resistance roadmap.
Today, four things in Ethereum are quantum-vulnerable:
* consensus-layer BLS signatures
* data availability (KZG commitments+proofs)
* EOA signatures (ECDSA)
* Application-layer ZK proofs (KZG or groth16)We can tackle these step by step:…
- vitalik.eth (@VitalikButerin) February 26, 2026
In the published analysis, Buterin highlighted four critical areas that could be affected by quantum computers: consensus layer BLS signatures, KZG commitment-based data availability systems, external account signatures (EOAs) using ECDSA, and zero-knowledge proof systems used in applications.
If sufficiently powerful quantum machines become viable, algorithms like Shor's could break elliptic curve cryptography. This would open the possibility of forging digital signatures and unauthorized access to wallets, posing a direct risk to users and protocols.
To mitigate this threat, the roadmap proposes a gradual transition to quantum-resistant cryptographic methods. At the consensus layer, hash-based signatures or alternative structures could replace the current BLS model, with aggregation support via STARK proofs to maintain efficiency.
In the case of user accounts, Buterin points to account abstraction as a central element of adaptation. The proposal linked to EIP-8141 would allow wallets to adopt new post-quantum signature schemes as soon as optimized versions are available.
The change, however, brings significant technical challenges. Signatures resistant to quantum computing tend to be larger and require more processing power. To avoid a significant increase in transaction costs, the plan suggests using recursive proof aggregation at the protocol level, allowing multiple verifications to be compacted into a single STARK proof.
The data availability infrastructure can also evolve. The ecosystem is exploring replacing KZG commitments with STARK-based constructs, although this transition requires further development and extensive testing.
Furthermore, zero-knowledge proof systems widely used today, such as Groth16, are also on the radar for future upgrades as post-quantum alternatives mature.
The roadmap does not represent an immediate update, but a plan for a gradual transition. The approach reflects the ecosystem's strategy of anticipating technological changes and ensuring that the security of cryptocurrencies and decentralized applications remains robust in an eventual post-quantum environment.
Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.
You may also like
What To Expect From Cadre's (CDRE) Q4 Earnings

Jeffs' Brands: KeepZone AI Enters into Channel Partner Agreement for 4G/5G Infrastructure

ARS Pharmaceuticals, Inc. (SPRY) Posts Fourth Quarter Loss, Surpasses Revenue Projections

