Antigravity Q&A
Could a blockchain network fork to enforce quantum-resistant signatures before attackers gain the ability to decrypt harvested transactions?
Answered by claude-haiku-4-5 · 10 May 2026
Answer
Yes, a blockchain network could fork to adopt quantum-resistant signatures before attackers decrypt harvested transactions—but timing is the critical constraint.
The threat: "harvest now, decrypt later"
Quantum computers running Shor's algorithm can break the elliptic-curve and RSA signatures that currently secure Bitcoin and similar blockchains [AG-2024.03-2172]. An adversary could record signed transactions today, then decrypt them once a sufficiently powerful quantum computer exists. This creates a race: how much time does the blockchain have to migrate before such machines appear?
The fork solution
A blockchain fork to enforce post-quantum signatures (like lattice-based schemes such as Kyber or Dilithium [AG-2024.05-2225]) is technically feasible. The network would simply update its consensus rules to reject any transaction signed with classical cryptography, forcing all participants to re-sign with quantum-resistant algorithms [AG-2024.02-1291]. This is operationally similar to past upgrades (like Segwit on Bitcoin), though more disruptive since it invalidates existing key pairs.
The timing problem
The vulnerability window depends on three factors:
1. When quantum computers arrive. The literature suggests "a couple of years" for machines powerful enough to threaten current systems [AG-2024.05-2225], though estimates vary widely and technological breakthroughs could accelerate or delay this.
2. How long transactions remain sensitive. A payment from 2025 may be economically irrelevant by 2035, but state secrets, intellectual property, or legal evidence could retain value indefinitely.
3. How fast the migration completes. A coordinated fork can happen within months (Bitcoin or Ethereum could technically switch within one hard fork), but coordinating all wallets, exchanges, and users to migrate is messier.
The practical answer: a fork is fast enough for *most* transaction history to lose sensitivity before decryption becomes viable, but early adopters of post-quantum migration (like governments and financial institutions) should move sooner rather than later.
The preprints don't directly address the fork-timing economics, so I can't quantify the risk window more precisely from this archive.
Sources · 8
- 66%cs.CRTowards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacksAG-2024.02-1291
- 59%quant-ph51% Attack via Difficulty Increase with a Small Quantum MinerAG-2024.03-1707
- 57%cs.CRPost-Quantum Security: Origin, Fundamentals, and AdoptionAG-2024.05-2225
- 55%cs.NIThe Future of QKD NetworksAG-2024.07-1542
- 52%quant-phStrategies for the Integration of quantum networks for a future quantum internetAG-2024.01-1542
- 52%cs.CRQPP and HPPK: Unifying Non-Commutativity for Quantum-Secure Cryptography with Galois Permutation GroupAG-2024.02-1337
- 52%cs.CRCybersecurity in Critical Infrastructures: A Post-Quantum Cryptography PerspectiveAG-2024.01-1401
- 51%cs.CRModelling the Impact of Quantum Circuit Imperfections on Networks and Computer ApplicationsAG-2024.03-2172
Keep exploring
- How would exchanges and custodians handle the fork without losing access to user funds stored under old signatures?
- Why do lattice-based signatures like Dilithium require larger transaction sizes, and could that bloat limit adoption speed?
- If quantum computers arrive in five years, would a fork completed in year three still protect transactions from year one?
This is a research aid — not a peer review. Verify sources before citing.