Quantova

132 posts

Quantova banner
Quantova

Quantova

@QuantovaGlobal

Foundational blockchain platform powering decentralized apps, stablecoins, and post quantum resistant smart contracts via QVM.

Zug, Switzerland Присоединился Haziran 2023
113 Подписки19.1K Подписчики
Закреплённый твит
Quantova
Quantova@QuantovaGlobal·
Building a Post Quantum Layer 1 from the ground up. Not upgrading cryptography, redesigning consensus, execution, and verification for new constraints. If you’re working on infrastructure, research, or exploring this space, open to connect.
Quantova tweet media
English
0
57
69
5.7K
Quantova
Quantova@QuantovaGlobal·
PQ schemes (e.g., lattice/hash-based) introduce: - larger σ → bandwidth & state growth - higher verification cost → validator load - altered cost models → consensus implications This shifts security from purely cryptographic assumptions → protocol + network constraints
English
0
0
1
2.5K
Quantova
Quantova@QuantovaGlobal·
The critical issue is time-bounded extraction If an adversary can solve ECDLP within the Δ between broadcast and inclusion: - exposed pubkeys (P2PK, reused P2PKH) become targets - mempool becomes an adversarial surface - fee ordering enables replacement attacks
English
1
0
2
2.7K
Quantova
Quantova@QuantovaGlobal·
Quantum computing threatens blockchain security at the primitive level Shor’s algorithm reduces ECDLP over secp256k1 to polynomial time, breaking the one way assumption behind ECDSA/EdDSA Security moves from ~128-bit hardness → effectively bounded by quantum resources
Quantova tweet media
English
1
1
81
3.9K
Quantova
Quantova@QuantovaGlobal·
@Joseph_Kearney Fair point The conversation should be about how to prepare, not whether the risk exists
English
1
0
1
47
Dr. Joseph Kearney
Dr. Joseph Kearney@Joseph_Kearney·
Embarrassing at best. Some of the biggest names in quantum computing explicitly say this is an issue. And you get a group of amateurs to come on your show and say it's not a issue. Then you just make up how physics works 😂. I said it last time you posted this shit. Zero probability, scientifically is absolute certainty, are these "physicists" willing to personally guarantee that there is a "ZERO" risk.
Simply Bitcoin@SimplyBitcoin

Jeff Booth, Nick & Jack explain how there is ZERO risk of quantum attack on Bitcoin Few understand.

English
7
4
24
1.5K
Eli Ben-Sasson | Starknet.io
Some users don't care too much about decentralization. Some users don't think too much about security in general, or post-quantum security in particular. Some users don't care about verifiability and all this technical stuff. That's understandable. But builders should care about it. A lot. All the time. That's the job.
English
27
8
61
2.5K
Quantova
Quantova@QuantovaGlobal·
@Cloudflare How should systems reason about security once it becomes time dependent (latency, exposure windows)?
English
0
0
0
8
Cloudflare
Cloudflare@Cloudflare·
We’re recording a new ThisWeekinNET.com episode soon with Bas Westerbaan, Principal Research Engineer at Cloudflare, on post-quantum cryptography. What does post-quantum mean right now? Why is it back in the news? What should people know? Reply here with your questions.
English
8
3
22
12.3K
The Crypto Times
The Crypto Times@CryptoTimes_io·
🚨TODAY: @coinbase ramps up efforts on post-quantum security. Urging coordinated action as @brian_armstrong says the industry must address quantum risks “sooner rather than later.”
The Crypto Times tweet mediaThe Crypto Times tweet media
English
1
0
2
110
asanso
asanso@asanso·
Dropping a new testnet for post-quantum signatures. This one implements the PQ signature scheme we’ve been discussing so far: Falcon and an ephemeral key. Would love feedback from folks kicking the tires. More details soon. Kudos to @GiulioRebuffo. link👇
asanso tweet media
English
8
13
57
3.8K
Quantova
Quantova@QuantovaGlobal·
@AbdelStark @blksresearch Does batching SHRIMPS inside STARKs actually offset the signature size + verification overhead?
English
1
0
0
45
abdel
abdel@AbdelStark·
Provable SHRIMPS: Post-quantum hash-based signatures verified in Cairo with STARK proofs. As usual @blksresearch is killing it on the post quantum bitcoin research. SHRIMPS 🦐 is so cool that I made provable shrimps, it could be useful to for batch shrimps signature verification. Don't panic, as @adam3us said: "SHRIMPS & bitcoin quantum readiness > quantum FUD."
Jonas Nick@n1ckler

Please welcome SHRIMPS🦐 to the family of stateful PQ signatures: 2.5 KB hash-based sigs across multiple devices. SHRINCS🛋️ gave ~324-byte sigs but is single-device. SHRIMPS🦐 addresses multi-device; any device loaded from the same seed creates sigs 3x smaller than SLH-DSA

English
23
38
280
23.8K
Quantova
Quantova@QuantovaGlobal·
@CasaHODL @lopp @nic_carter 1) If verification costs increase under PQ schemes, how does that impact block size and throughput assumptions? 2) Can Bitcoin maintain decentralization under heavier validation load?
English
0
0
0
70
Casa
Casa@CasaHODL·
Two quantum papers in one week, both with estimates way below previous projections. Google is now targeting 2029 for their post-quantum cryptography transition. We're hosting a Space with @lopp and @nic_carter this Thursday at 1 PM ET to discuss what this means for Bitcoin and the path forward. What questions do you want answered? x.com/i/spaces/1aJbd…
English
15
10
37
8.9K
Quantova
Quantova@QuantovaGlobal·
@pumatheuma @SuccinctLabs ZK based disclosure might become a standard but attackers don’t need to prove capability, defenders do, not clear that balance holds
English
0
0
1
24
Uma Roy
Uma Roy@pumatheuma·
Google's Quantum AI team used @SuccinctLabs zkVM SP1 for responsible disclosure of a new SOTA quantum algorithm. Their paper presents a 20x more efficient implementation of Shor's algorithm for cracking secp256k1 keys: the elliptic curve used by Bitcoin and Ethereum. They believe the attack is so dangerous that instead of publishing the circuits, they instead published a ZKP that the circuits exist. I wonder if ZK proof of exploit becomes a broader theme in vulnerability disclosures going forward.
Uma Roy tweet media
English
14
32
293
15.7K
Quantova
Quantova@QuantovaGlobal·
Google released a paper showing 256-bit ECC may require <500k physical qubits to break in minutes Once key extraction fits within operational windows, mempool and key exposure assumptions break down. Post-quantum migration is no longer optional. That’s exactly the problem Quantova is built to address
English
0
0
53
1.7K
Quantova
Quantova@QuantovaGlobal·
@cryptogoos Post-quantum migration is becoming critical
English
0
0
0
5
CryptoGoos
CryptoGoos@cryptogoos·
🚨BREAKING: Binance founder CZ says quantum computing is not a threat to crypto. CZ says crypto can upgrade, adapt, and survive post-quantum.
CryptoGoos tweet mediaCryptoGoos tweet media
English
10
12
110
26.7K
Quantova
Quantova@QuantovaGlobal·
@Cat_States What happens to systems where key exposure + latency windows become exploitable even before full breaks?
English
0
0
0
154
Dr. Hugh Bitt
Dr. Hugh Bitt@Cat_States·
🚨 The quantum threat to Bitcoin just got MUCH closer. We're talking as soon as a year or few. A decade ago, breaking RSA-2048 or P-256 (what Bitcoin uses) required ~1 billion physical qubits. Today? As few as 10,000 qubits. That's not a typo. A new paper just dropped from Oratomic, a neutral atom startup. Co-author: John Preskill, one of the greatest quantum theorists alive. The breakthrough is high-rate quantum error correction + neutral atom architecture = dramatically fewer physical qubits. 10,000 reconfigurable atomic qubits. That’s all you need. Researchers have demonstrated neutral atom arrays of up to 6,000 already. How much longer will the bitcoin community play with fire?!
Dr. Hugh Bitt tweet media
English
101
57
258
35.1K
Quantova
Quantova@QuantovaGlobal·
@Cointelegraph The real issue isn’t a 9 min, it’s that once signatures are exposed the security model around key reuse and mempool behavior starts to break down That’s a protocol problem, not just a timing
English
0
0
0
133
Quantova
Quantova@QuantovaGlobal·
At #Quantova, we design for these constraints at the protocol level - PQ-secured consensus - deterministic cryptographic cost in QVM - execution aligned with verification
English
0
0
2
3.5K
Quantova
Quantova@QuantovaGlobal·
In most L1s, verification is assumed to be cheap and predictable. Under PQ assumptions, that breaks: - validator throughput shifts - gas models become misaligned - execution costs become harder to reason about
English
1
0
2
3.5K
Quantova
Quantova@QuantovaGlobal·
Post-quantum in blockchain isn’t just replacing signatures. PQ primitives introduce new constraints: - larger proofs - heavier verification - different performance bounds These directly impact consensus and execution
English
1
0
58
2.8K
Quantova
Quantova@QuantovaGlobal·
@conordeegan Agree on the urgency, but once you move beyond key rotation, PQC introduces different performance and verification characteristics that many systems weren’t designed for In some cases it’s less migration - - more redesign
English
0
0
1
5
Conor Deegan
Conor Deegan@conordeegan·
Migration to post-quantum cryptography is largely a fixed amount of work. Every system using classical crypto will have to find where it’s used, change how keys are handled, rotate them, etc. That part won’t change. However, what is changing is the timeline. We keep seeing target dates move forward like this. It’s happening for a mix of reasons: progress on the quantum side, lower resource estimates, and a growing understanding of the risk. At the same time, nothing fundamental is missing anymore to get started; NIST schemes are standardised, implementations exist, and we have a lot of early working deployments already. if you are still adding new classical crypto into a system today, you are adding work that will need to be undone. Time to PQC everything
Conor Deegan tweet media
English
4
3
41
2.3K
Quantova
Quantova@QuantovaGlobal·
@n1ckler Interesting How are you reasoning about reuse bounds once state desynchronizes across devices?
English
1
0
0
2.8K
Jonas Nick
Jonas Nick@n1ckler·
Please welcome SHRIMPS🦐 to the family of stateful PQ signatures: 2.5 KB hash-based sigs across multiple devices. SHRINCS🛋️ gave ~324-byte sigs but is single-device. SHRIMPS🦐 addresses multi-device; any device loaded from the same seed creates sigs 3x smaller than SLH-DSA
Jonas Nick tweet media
English
41
129
546
141.8K