Bitcoin Forum
January 01, 2026, 07:49:17 PM *
News: Latest Bitcoin Core release: 30.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: First Quantum resistant wallet and transaction in the world!!!  (Read 377 times)
harmani21 (OP)
Member
**
Offline Offline

Activity: 102
Merit: 13


View Profile
November 22, 2025, 06:42:27 PM
Merited by Mia Chloe (2), stwenhao (1)
 #1

# First Quantum-Resistant Bitcoin Transaction Using mask512 Derivation

I've successfully broadcast the first quantum-resistant Bitcoin transaction
to mainnet using a novel dual-signature scheme.

Transaction: https://blockstream.info/tx/143d47830c1d757583f9685396b2fb89778c47b9fc1c0d640b27bf01a366ded4

## How It Works
- Dual-lock P2SH: ECDSA signature + SHA256 hash preimage
- Even if quantum computers break ECDSA, hash preimage remains secure
- Requires 2^128 operations to break (impossible for quantum computers)
- Works on Bitcoin TODAY - no consensus changes needed

## Technical Details
- Transaction size: 510 bytes (vs normal ~190 bytes)
- Uses mask512 derivation: single seed → ECDSA key + unlock secret
- Script: <pubkey> OP_CHECKSIGVERIFY OP_HASH256 <commitment> OP_EQUAL

## Code
Link to GitHub repo coming soon

Thoughts? Feedback welcome!
```
stwenhao
Hero Member
*****
Offline Offline

Activity: 574
Merit: 1363


View Profile
November 23, 2025, 09:44:37 AM
Merited by d5000 (2), Mia Chloe (2)
 #2

Quote
Thoughts? Feedback welcome!
You should put the hash first, and the public key second, because then, OP_CODESEPARATOR can be used, to split public key from additional conditions, so then old wallets could sign it properly. For example:
Code:
OP_HASH256 <commitment> OP_EQUALVERIFY
OP_CODESEPARATOR
<pubkey> OP_CHECKSIG
And then, it is spendable by "<signature> <data>", where signature can be correctly generated by many existing wallets, if you give them "<pubkey> OP_CHECKSIG" as a Script, and then, data can be attached even by manually inserting it into transaction HEX in any text editor.

Quote
Even if quantum computers break ECDSA, hash preimage remains secure
Wrong, because a malicious miner will know the solution, when your transaction will be flying as unconfirmed in mempools. You should think about something, which will require some effort, even if miners will know everything. For example: https://bitcointalk.org/index.php?topic=5557305.0

Quote
Requires 2^128 operations to break (impossible for quantum computers)
It requires only getting the private key, and making a successful double-spend with higher fees. And if it has a single confirmation, then it requires reorging a single block, which is currently something around 2^80, rather than 2^128.

Quote
Transaction size: 510 bytes (vs normal ~190 bytes)
It is more expensive, than it could be, because you didn't use Segwit.

Proof of Work puzzle in mainnet, testnet4 and signet.
harmani21 (OP)
Member
**
Offline Offline

Activity: 102
Merit: 13


View Profile
November 23, 2025, 08:36:47 PM
 #3

# First Quantum-Resistant Bitcoin Transaction Using mask512 Derivation

I've successfully broadcast the first quantum-resistant Bitcoin transaction
to mainnet using a novel dual-signature scheme.

Transaction: https://blockstream.info/tx/143d47830c1d757583f9685396b2fb89778c47b9fc1c0d640b27bf01a366ded4

## How It Works
- Dual-lock P2SH: ECDSA signature + SHA256 hash preimage
- Even if quantum computers break ECDSA, hash preimage remains secure
- Requires 2^128 operations to break (impossible for quantum computers)
- Works on Bitcoin TODAY - no consensus changes needed

## Technical Details
- Transaction size: 510 bytes (vs normal ~190 bytes)
- Uses mask512 derivation: single seed → ECDSA key + unlock secret
- Script: <pubkey> OP_CHECKSIGVERIFY OP_HASH256 <commitment> OP_EQUAL

## Code
Link to GitHub repo coming soon

Thoughts? Feedback welcome!
```
   SCENARIO: Two Quantum Holders Battle
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Time 0: You broadcast tx (1 BTC, 0.001 fee)

Time +30s:
Attacker quantum extracts key
Broadcasts double-spend (1 BTC, 0.01 fee)

Time +60s:
You quantum extract attacker's key 
Broadcast triple-spend (1 BTC, 0.1 fee)

Time +90s:
Attacker: quadruple-spend (0.5 fee)

Time +120s:
You: quintuple-spend (0.8 fee)

Time +150s:
Attacker: sextuple-spend (0.95 fee)

Time +180s:
You: septuple-spend (0.99 fee)

Time +200s:
Attacker: octuple-spend (0.999 fee)

Time +210s:
Mempool has 50 versions of same tx
All from same two quantum computers
Each outbidding the other
Final fee: 0.99999 BTC

Miner: "Thanks for the 1 BTC fee guys!" 🤑

NOBODY GETS THE BITCOIN! 😂😂😂
ABCbits
Legendary
*
Offline Offline

Activity: 3472
Merit: 9533



View Profile
November 24, 2025, 09:48:16 AM
Merited by stwenhao (1)
 #4

- Dual-lock P2SH: ECDSA signature + SHA256 hash preimage
- Requires 2^128 operations to break (impossible for quantum computers)

FWIW, P2SH vulnerable to birthday attack/paradox that reduce P2SH security to 2^80 towards collision attack.

stwenhao
Hero Member
*****
Offline Offline

Activity: 574
Merit: 1363


View Profile
November 24, 2025, 11:13:50 AM
Merited by vapourminer (1), Mia Chloe (1)
 #5

Quote
P2SH vulnerable to birthday attack/paradox that reduce P2SH security to 2^80 towards collision attack.
Well, 2^160 for preimage, and 2^80 for collisions. But the first collision will raise some panic, because then, someone could lock things on "<pubkey> OP_CHECKSIG" and "<pubkey> OP_CHECKSIGVERIFY OP_HASH256 <commitment> OP_EQUAL", leading to the same address.

Also, if anyone will move coins from 3KyiQEGqqdb4nqfhUzGKN6KPhXmQsLNpay or 39VXyuoc6SXYKp9TcAhoiN1mb4ns6z3Yu6, then it will alert everyone, that 160-bit addresses should be abandoned (or a different hash function should be used). See topic: https://bitcointalk.org/index.php?topic=293382.0

Proof of Work puzzle in mainnet, testnet4 and signet.
pooya87
Legendary
*
Offline Offline

Activity: 4046
Merit: 12127



View Profile
November 27, 2025, 03:06:36 AM
Merited by Mia Chloe (1), stwenhao (1)
 #6

Time +30s:
Attacker quantum extracts key
~
Miner: "Thanks for the 1 BTC fee guys!" 🤑

NOBODY GETS THE BITCOIN! 😂😂😂
This is like a paradox!

Bitcoin exists (miners mine it, there is a market where it is worth $100k) because it is secure and nobody can break it. If a time comes when it takes 30 seconds to break ECDSA the it would have had ceased to exist (no miners and no value) which means nobody would bother taking this 1 BTC in your hypothetical scenario since it would be worth $0 Cheesy

███████████████████████████
███████▄████████████▄██████
████████▄████████▄████████
███▀█████▀▄███▄▀█████▀███
█████▀█▀▄██▀▀▀██▄▀█▀█████
███████▄███████████▄███████
███████████████████████████
███████▀███████████▀███████
████▄██▄▀██▄▄▄██▀▄██▄████
████▄████▄▀███▀▄████▄████
██▄███▀▀█▀██████▀█▀███▄███
██▀█▀████████████████▀█▀███
███████████████████████████
.
.Duelbits PREDICT..
█████████████████████████
█████████████████████████
███████████▀▀░░░░▀▀██████
██████████░░▄████▄░░████
█████████░░████████░░████
█████████░░████████░░████
█████████▄▀██████▀▄████
████████▀▀░░░▀▀▀▀░░▄█████
██████▀░░░░██▄▄▄▄████████
████▀░░░░▄███████████████
█████▄▄█████████████████
█████████████████████████
█████████████████████████
.
.WHERE EVERYTHING IS A MARKET..
█████
██
██







██
██
██████
Will Bitcoin hit $200,000
before January 1st 2027?

    No @1.15         Yes @6.00    
█████
██
██







██
██
██████

  CHECK MORE > 
TothAnalyst
Newbie
*
Offline Offline

Activity: 6
Merit: 0


View Profile
November 28, 2025, 02:13:58 PM
 #7

How does the mask512 dual-signature scheme compare to existing post-quantum approaches in terms of security guarantees and transaction size, and do you think it could realistically scale for widespread Bitcoin adoption? Roll Eyes


# First Quantum-Resistant Bitcoin Transaction Using mask512 Derivation

I've successfully broadcast the first quantum-resistant Bitcoin transaction
to mainnet using a novel dual-signature scheme.

Transaction: https://blockstream.info/tx/143d47830c1d757583f9685396b2fb89778c47b9fc1c0d640b27bf01a366ded4

## How It Works
- Dual-lock P2SH: ECDSA signature + SHA256 hash preimage
- Even if quantum computers break ECDSA, hash preimage remains secure
- Requires 2^128 operations to break (impossible for quantum computers)
- Works on Bitcoin TODAY - no consensus changes needed

## Technical Details
- Transaction size: 510 bytes (vs normal ~190 bytes)
- Uses mask512 derivation: single seed → ECDSA key + unlock secret
- Script: <pubkey> OP_CHECKSIGVERIFY OP_HASH256 <commitment> OP_EQUAL

## Code
Link to GitHub repo coming soon

Thoughts? Feedback welcome!
```
GaloisGhost
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
December 16, 2025, 06:39:03 PM
 #8

Why do you think the pre-image makes it secure? When Quantum Computers achieve fully maturity, we will need to worry about the implications of Shor's Algorithm and Grover's Algorithm.

Haven't you heard about Grover's Algorithm?
https://arxiv.org/pdf/2202.10982
Applying Grover’s Algorithm to Hash Functions: A Software Perspective
internetional
Legendary
*
Offline Offline

Activity: 2044
Merit: 2827



View Profile
December 17, 2025, 11:32:53 AM
 #9

The title mentions a quantum-resistant wallet, but as far as I understand, there is no "first quantum-resistant wallet in the world" here yet, right? So far, we are only talking about just one "quantum-resistant transaction". And even there, the discussion mixes two different meanings of the word "resistance": resistance as an additional cryptographic lock, and resistance as the impossibility of a practical attack. At the moment, the OP is only proposing resistance in the first sense. There is no discussion at all of a wallet that would actually allow the owner to keep their bitcoins in the presence of a quantum adversary.

Or by choosing this title, is the OP implying that they already have a solution to that problem as well?

█████████████████████████
█████████████████████████
███████▀█████████▀███████
█████████████████████████
█████████████████████████
████████████▀████████████
███████▀███████▄███████
███████████▄▄▄███████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████
█████████████████████████

 2UP.io 
NO KYC
CASINO
██████████████████████████
████████████████████████
███████████████████████
███████████████████
██████████████████████
███████████████████████
███████████████████████
██████████████████
███████████████████████
██████████████████
███████████████████████
████████████████████████
██████████████████████████
███████████████████████████████████████████████████████████████████████████████████████
 
FASTEST-GROWING CRYPTO
CASINO & SPORTSBOOK

 

███████████████████████████████████████████████████████████████████████████████████████
███████████████████████████
█████████████████████████
███████████████████████
███████████████████████
████████████████████████
███████████████████████
███████████████████████
██████████████████████
████████████████████████
███████████████████████
███████████████████████
█████████████████████████
███████████████████████████
 

...PLAY NOW...
jwlcore
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
December 29, 2025, 05:31:16 PM
 #10

Interesting experiment, but it’s important to separate script-level constructions from actual post-quantum authorization.

The approach described here still relies on ECDSA as the authorizing primitive. The hash preimage only adds an extra condition, but does not remove ECDSA as a single point of failure. Once a valid signature is visible in the mempool, a quantum adversary can extract the private key and attempt a higher-fee double spend.

This is why such constructions don’t meaningfully change the threat model they wrap ECDSA instead of replacing it.

A real post-quantum design requires:
   removing ECDSA from the authorization path
   introducing a new signature primitive verified by all nodes
   enforcing it at the consensus level, not as a P2SH policy trick

In our work we’re addressing exactly these issues by adding a native post-quantum signature opcode and a separate consensus validation path, with full negative testing (invalid sigs, invalid sighash, size limits, script errors). https://bitcointalk.org/index.php?topic=5569815.0

This avoids mempool race attacks, fee-bumping games, and “quantum double-spend auctions”, because authorization no longer depends on ECDSA at all.

Script-level experiments are useful for exploration, but post-quantum security ultimately requires protocol-level changes.
NotATether
Legendary
*
Offline Offline

Activity: 2198
Merit: 9201


Trêvoid █ No KYC-AML Crypto Swaps


View Profile WWW
December 31, 2025, 11:09:17 AM
 #11

This is not really a quantum-resistant transaction, because you did not emulate some quantum-resistant algorithm inside the locking script.

There are a bunch of NIST algorithms rated for quantum-safe usage, but you will have to design them in Bitcoin Script by hand, as none exist already AFAIK.

.
 betpanda.io 
 
ANONYMOUS & INSTANT
.......ONLINE CASINO.......
▄███████████████████████▄
█████████████████████████
█████████████████████████
████████▀▀▀▀▀▀███████████
████▀▀▀█░▀▀░░░░░░▄███████
████░▄▄█▄▄▀█▄░░░█▄░▄█████
████▀██▀░▄█▀░░░█▀░░██████
██████░░▄▀░░░░▐░░░▐█▄████
██████▄▄█░▀▀░░░█▄▄▄██████
█████████████████████████
█████████████████████████
█████████████████████████
▀███████████████████████▀
▄███████████████████████▄
█████████████████████████
██████████▀░░░▀██████████
█████████░░░░░░░█████████
███████░░░░░░░░░███████
████████░░░░░░░░░████████
█████████▄░░░░░▄█████████
███████▀▀▀█▄▄▄█▀▀▀███████
██████░░░░▄░▄░▄░░░░██████
██████░░░░█▀█▀█░░░░██████
██████░░░░░░░░░░░░░██████
█████████████████████████
▀███████████████████████▀
▄███████████████████████▄
█████████████████████████
██████████▀▀▀▀▀▀█████████
███████▀▀░░░░░░░░░███████
██████░░░░░░░░░░░░▀█████
██████░░░░░░░░░░░░░░▀████
██████▄░░░░░░▄▄░░░░░░████
████▀▀▀▀▀░░░█░░█░░░░░████
████░▀░▀░░░░░▀▀░░░░░█████
████░▀░▀▄░░░░░░▄▄▄▄██████
█████░▀░█████████████████
█████████████████████████
▀███████████████████████▀
.
SLOT GAMES
....SPORTS....
LIVE CASINO
▄░░▄█▄░░▄
▀█▀░▄▀▄░▀█▀
▄▄▄▄▄▄▄▄▄▄▄   
█████████████
█░░░░░░░░░░░█
█████████████

▄▀▄██▀▄▄▄▄▄███▄▀▄
▄▀▄█████▄██▄▀▄
▄▀▄▐▐▌▐▐▌▄▀▄
▄▀▄█▀██▀█▄▀▄
▄▀▄█████▀▄████▄▀▄
▀▄▀▄▀█████▀▄▀▄▀
▀▀▀▄█▀█▄▀▄▀▀

Regional Sponsor of the
Argentina National Team
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!