Wu said that Vitalik Buterin stated that Ethereum currently has four types of quantum vulnerabilities: consensus layer BLS signatures, data availability reliance on KZG commitments and proofs, EOA’s ECDSA signatures, and application layer ZK proofs based on KZG or Groth16. The proposed approach is phased replacement: replacing BLS with hash-based signatures (such as Winternitz variants) at the consensus layer, combined with STARK aggregation, while carefully selecting new core hash functions; migrating data availability from KZG to STARK, addressing the 2D DAS linearity and erasure code proof issues; supporting arbitrary quantum-resistant signatures for EOAs through native account abstraction (EIP-8141), combined with vectorized precompiles and recursive protocol layer aggregation to reduce verification costs; and compressing extensive verification logic into few on-chain verifications through recursive protocol layer signatures and proof aggregation.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Vitalik Buterin proposes an Ethereum quantum-resistant roadmap, covering consensus, data availability, and signature scheme adjustments
Wu said that Vitalik Buterin stated that Ethereum currently has four types of quantum vulnerabilities: consensus layer BLS signatures, data availability reliance on KZG commitments and proofs, EOA’s ECDSA signatures, and application layer ZK proofs based on KZG or Groth16. The proposed approach is phased replacement: replacing BLS with hash-based signatures (such as Winternitz variants) at the consensus layer, combined with STARK aggregation, while carefully selecting new core hash functions; migrating data availability from KZG to STARK, addressing the 2D DAS linearity and erasure code proof issues; supporting arbitrary quantum-resistant signatures for EOAs through native account abstraction (EIP-8141), combined with vectorized precompiles and recursive protocol layer aggregation to reduce verification costs; and compressing extensive verification logic into few on-chain verifications through recursive protocol layer signatures and proof aggregation.