March 3, 2026 - Staff
We hear more and more about quantum computing - a new model of computation that leverages quantum-mechanical effects to solve certain classes of mathematical problems far faster than traditional computers. In particular, quantum computing is known to undermine several foundations of the cryptography used to authenticate across digital services (including financial services) and to secure critical infrastructure.
Bitcoin’s security, too, relies on two major cryptographic applications:
In principle, both could be affected by quantum computing - but with very different risks and consequences.
The core issue involves digital signatures. A sufficiently powerful quantum computer could run Shor’s algorithm, which is designed to solve the discrete logarithm problem - the hard problem underlying the elliptic-curve asymmetric cryptography used by Bitcoin and currently impractical for classical computers.
Put simply: if Shor could be implemented at scale, it might become possible to derive a private key from the corresponding public key. At that point, bitcoin tied to already-known public keys (for example, funds associated with addresses publicly attributable to Satoshi Nakamoto) would be more exposed.
This is why users are advised not to reuse the same address: when you spend from an address, some technical details are revealed (including the public key, depending on the output/script type), and reducing long-term exposure is good practice. That said, it remains true that:
The key point is the scale of the required technology. Widely cited estimates suggest that “breaking” elliptic-curve asymmetric cryptography in practice would require enormous numbers of qubits - likely millions of physical qubits (estimates vary, but they remain well beyond today’s state of the art) - and a fault-tolerant quantum computer (with quantum error correction).
That technological threshold pushes the threat to a long-term horizon, plausibly measured in decades, leaving time for an orderly migration to quantum-resistant (also called post-quantum) algorithms.
Mining looks far less dramatic. The relevant quantum algorithm here is Grover’s algorithm, which can speed up the search for inputs to hash functions that produce desired outputs - but only with a quadratic advantage. In other words, it reduces the number of trials needed without turning an impossible problem into an easy one.
Intuitively: even if Grover helped, mining would still require massive hardware capabilities and access to energy and infrastructure. Moreover, the network can respond by adjusting difficulty over time, reducing part of any competitive advantage.
The good news is that research has been active for years. There are already post-quantum cryptography standards and candidates, including signature schemes and operational guidance such as the NIST standards.
Much as with the introduction of Schnorr/Taproot - a Bitcoin upgrade that enabled more efficient and more privacy-friendly signatures and scripts - it is plausible that the Bitcoin community will also play a significant role in selecting, implementing, and standardizing quantum-resistant solutions, given the enormous economic incentives.
Bitcoin has not yet activated quantum-resistant changes at the consensus layer, but the most pragmatic direction currently being discussed is a gradual transition:
The most delicate issue is not purely technical but also one of coordination: how to migrate existing funds without forcing users, and over a very long time horizon. Proposals for “mandatory” migration (hard forks or deadlines) are therefore highly controversial.
This situation resembles the ”millennium bug” more than an abrupt collapse: a potentially serious risk, but one with a timeline that allows audits, standards, upgrades, and migration - if work starts early.
There is also a broader perspective: the “classical” cryptography Bitcoin relies on is the same cryptography that protects online banking, HTTPS, financial systems, and critical infrastructure. A quantum computer capable of genuinely threatening Bitcoin would, by definition, put much of the global digital infrastructure under stress. Bitcoin is not an isolated target: it will evolve alongside the countermeasures adopted across the wider ecosystem.
Today’s concerns about quantum computing as an “immediate” threat to Bitcoin are exaggerated relative to the actual state of the technology. The necessary hardware does not exist, the vulnerability remains theoretical, and post-quantum solutions are already advanced and implementable. Quantum computing is a future challenge for modern cryptography as a whole, but not a reason for panic: above all, it is an invitation to prepare early and methodically.