零知识证明 zkDaily
ZKP Frontier Tracker 🎯
Fri
04.03
2026
Project avatar
Paper
https://eprint.iacr.org/2026/625
Ryan Babbush Post-Quantum Cryptography

Notes

零知识证明 zkDaily
Q&A Deep Dive 💬
Fri
04.03
2026
beginner
Why are blockchains more exposed to quantum attacks than ordinary systems?
Because blockchain transactions and public keys are usually public, attackers can store the data and wait until quantum computers mature, especially targeting wallets and historical assets whose public keys are already exposed.
answer
intermediate
What is an on-spend attack and why is it dangerous?
An on-spend attack means that after a user broadcasts a transaction but before confirmation, an attacker uses quantum computation to recover the private key and front-run the spend. This is especially dangerous for public mempool chains.
answer
expert
Why are the resource estimates in this paper so important?
It concretizes the cost of breaking 256-bit ECDLP into roughly 1200 to 1450 logical qubits and tens of millions of Toffoli gates, sharply reducing uncertainty from prior estimates and directly impacting PQ migration timelines.
answer