New post-quantum signatures are 40x larger, threatening to crush network throughput and user costs

0
2
New post-quantum signatures are 40x larger, threatening to crush network throughput and user costs


Ethereum elevated post-quantum cryptography to a top strategic priority this month, forming a dedicated PQ team led by Thomas Coratger and announcing $1 million in prizes to harden hash-based primitives.

The announcement came one day before a16z crypto published a roadmap arguing that quantum threats are frequently overstated and premature migrations risk trading known security for speculative protection.

Both positions are defensible, and the apparent tension reveals where the real battle lies.

The Ethereum Foundation’s announcement frames PQ security as an inflection point. Multi-client consensus devnets are live, bi-weekly All Core Devs calls start next month to coordinate precompiles and account abstraction paths, and a comprehensive roadmap promises “zero loss of funds and zero downtime” during a multi-year transition.

Coinbase launched an independent quantum advisory board on Jan. 21, including Ethereum researcher Justin Drake, signaling cross-industry alignment around long-horizon planning.

Solana ran PQ signature experiments on testnet in December under Project Eleven, explicitly branding the work as “proactive” rather than emergency-driven.

Solana co-founder urges need for Bitcoin to adopt quantum resistance for future securitySolana co-founder urges need for Bitcoin to adopt quantum resistance for future security
Related Reading

Solana co-founder urges need for Bitcoin to adopt quantum resistance for future security

Yakovenko praised Bitcoin’s decentralized nature and proof-of-work system but warned that quantum compting poses threats.

Sep 19, 2025 · Oluwapelumi Adejumo

Polkadot’s JAM proposal outlines ML-DSA and Falcon deployment alongside SNARK-based migration proofs.

Bitcoin’s conservative BIP-360 proposal for pay-to-quantum-resistant-hash represents an incremental first step constrained by governance realities.

The pattern resembles an arms race, but not one driven by an imminent threat.

This is a competition in institutional readiness, where the winner preserves fee economics, consensus efficiency, and wallet UX while upgrading cryptographic foundations before external pressure forces rushed coordination.

The harvest paradox

a16z’s core argument hinges on distinguishing harvest-now-decrypt-later risk from signature vulnerability. HNDL attacks matter when adversaries can intercept encrypted data today and decrypt it once quantum computers achieve sufficient scale.

That threat maps cleanly to TLS, VPNs, and data-at-rest encryption. Less so to blockchain signatures, which authenticate transactions in real time and leave no encrypted payload to store for future cracking.

Ethereum’s response implicitly accepts this framing but argues operational urgency remains high because changing signature schemes touches everything: wallets, account formats, hardware signers, custody infrastructure, mempools, fee markets, consensus messages, and L2 settlement proofs.

Migration requires years of lead time, not because quantum computers are imminent, but because the engineering surface is vast and failure modes are catastrophic.

NIST finalized its first post-quantum standards in 2024, FIPS 203, 204, and 205, and selected HQC as a backup key encapsulation mechanism while advancing Falcon and FN-DSA toward draft stages.

The EU issued a coordinated PQC transition roadmap in June 2025. These developments reduce “which algorithms?” uncertainty and make migration planning concrete, even if cryptographically relevant quantum computing remains distant.

Citi’s January 2026 report cites probability ranges for widespread breaking of public key encryption by 2034 and 2044, though many experts view CRQC in the 2020s as highly unlikely.

Quantum probabilities
Kalshi data shows 50% of respondents expect the first useful quantum computer before 2035, with 59% predicting arrival before 2030.

The timeline ambiguity doesn’t eliminate the planning imperative: it amplifies it, because chains that wait until threat signals are unambiguous will face compressed timelines and coordination chaos.

Signature bloat as the base-layer bottleneck

The immediate technical challenge is signature size.

ECDSA signatures consume roughly 65 bytes, which translates to approximately 1,040 gas under Ethereum’s calldata pricing model at 16 gas per non-zero byte.

ML-DSA candidates produce signatures in the 2-3 KB range, with Dilithium variants likely to see wide adoption. A 2,420-byte signature consumes roughly 38,720 gas just for the signature bytes, a 37,680-gas delta versus ECDSA.

That overhead is material enough to affect throughput and fees unless chains compress or aggregate signatures at the protocol level.

This is where Ethereum’s bet on hash-based cryptography and the $1 million Poseidon Prize becomes strategic. Hash-based signatures avoid the algebraic structure that quantum algorithms exploit, and hash functions integrate naturally with zero-knowledge proof systems.

If Ethereum can make STARK-based signature aggregation practical, it preserves fee economics while upgrading security assumptions. The challenge is that no practical post-quantum analogue to BLS aggregation exists yet, and zk-based aggregation introduce real performance constraints.

Consensus efficiency depends on this problem.

Ethereum’s consensus layer relies heavily on BLS signature aggregation today. Validators sign attestations and sync committee messages, and the protocol aggregates thousands of signatures into compact proofs.

Losing that capability without a replacement would force dramatic changes to consensus participation economics or liveness assumptions.

EF’s public emphasis on “lean” cryptographic foundations and interop calls coordinating multi-client PQ devnets suggests the organization understands aggregation is the hidden cliff.

Signature scheme Signature size (bytes) Calldata gas @ 16 gas / non-zero byte Delta vs ECDSA (gas) Implication
ECDSA (secp256k1, r||s||v) 65 1,040 0 Baseline today
ML-DSA-44 2,420 38,720 +37,680 Fee + throughput shock
ML-DSA-65 3,309 52,944 +51,904 Aggregation becomes mandatory
ML-DSA-87 4,627 74,032 +72,992 L1 scaling pressure spikes
Vitalik proposes ‘Lean Ethereum' to achieve quantum security, simpler validator operationsVitalik proposes ‘Lean Ethereum' to achieve quantum security, simpler validator operations
Related Reading

Vitalik proposes ‘Lean Ethereum’ to achieve quantum security, simpler validator operations

The concept already has four research tracks already under review, which are connected to existing efforts in the Ethereum ecosystem.

Jun 12, 2025 · Gino Matos

Wallet UX as the social layer of cryptography

Protocol support alone doesn’t complete the migration.

Externally owned accounts can’t rotate keys cleanly under Ethereum’s current design. Users need one-click migration flows that don’t require deep technical knowledge. Hardware wallets must ship firmware updates. Custodians need a safe bulk migration tooling.

Ethereum researchers have explored key-recovery-friendly proof systems and seed-based migration approaches precisely to reduce coordination risk and UX friction.

a16z warns that premature migration introduces fragility, including immature implementations, shifting standards after deployment, and bugs in new cryptographic libraries.

The organization argues that current security issues, such as governance failures and software bugs, pose a greater immediate risk than quantum computers.

CryptoSlate Daily Brief

Daily signals, zero noise.

Market-moving headlines and context delivered every morning in one tight read.