Solo researcher announces breakthrough in shielding Bitcoin from quantum computing vulnerabilities

In a significant breakthrough, independent developer Avihu Levy has unveiled a novel approach to shield Bitcoin transactions from the looming threat of quantum computers, all without necessitating a protocol overhaul. This innovative solution sidesteps the need for a soft fork or network-wide consensus, setting it apart from the long-debated post-quantum updates that have been touted as a years-long endeavor. Levy's method cleverly harnesses the power of hash-based cryptography, leveraging the RIPEMD-160 algorithm that has been an integral part of Bitcoin's infrastructure since its inception.
The recent resurgence of concerns surrounding quantum computers' potential to disrupt cryptographic systems has sparked renewed interest in mitigating the so-called "quantum threat." A study by Google revealed that the threshold for quantum processing power required to compromise Bitcoin's cryptographic framework could be substantially lower than previously thought, reigniting fears of a "Q-Day" scenario where quantum computers could potentially dismantle existing encryption systems. The Bitcoin network's reliance on the Elliptic Curve Digital Signature Algorithm (ECDSA) renders it theoretically vulnerable to attack by a sufficiently powerful quantum computer, which could exploit Shor's Algorithm to gain access to private keys from public keys.
Current proposals for post-quantum upgrades, such as BIP 360, require extensive network consensus, making them protracted and complex to implement. In contrast, Levy's approach offers a more streamlined solution by abandoning elliptic curves in favor of a hash-based structure. By utilizing a signing methodology grounded in hash functions, specifically the RIPEMD-160 algorithm, transactions can be verified using one-time signatures generated from these hash functions. This methodology also incorporates the Hash-based One-time Signature (HORS) system, which theoretically provides a robust framework for withstanding quantum attacks, given the assumption that quantum computers are ineffective at reversing hash functions.
Experts note that while quantum computers can target elliptic curves using the Shor algorithm, their capabilities against hash functions are limited to methods like Grover's Algorithm, which, although less effective, still pose a significant challenge. Although this approach may reduce the security level, it renders it extremely difficult to breach in practice. Notably, Levy's solution operates entirely within the existing boundaries of Bitcoin's protocol, adhering to the network's script limits without requiring a new opcode or protocol change.
The study, currently considered a "proof of concept," highlights the potential for Bitcoin to be more resilient to quantum threats than initially thought, sparking a dichotomy of opinions within the community. While some view such concerns as "FUD" (Fear, Uncertainty, and Doubt), others argue that precautions should be taken to mitigate potential risks. However, the solution's feasibility is hindered by large transaction sizes and costs, which range from $75 to $150 per transaction using cloud GPUs, making it challenging to deploy over a standard network. Moreover, large-scale on-chain testing has yet to be conducted, leaving room for further development and refinement.