Post-Quantum Readiness in EdDSA Chains
Published in FC 20206, 2026
- Quantum computers threaten blockchains that rely on ECDSA, since exposed public keys may allow adversaries to recover private keys using quantum algorithms.
- Existing post-quantum migration proposals often require address changes, hybrid signature schemes, or mechanisms that fail to protect inactive accounts.
- We observe that blockchains using EdDSA signatures (e.g., Sui, Solana, Near) have a structural advantage: their keys are deterministically derived from a seed according to RFC 8032.
- This property allows users to prove ownership of an account by proving knowledge of the EdDSA seed in zero knowledge, without revealing elliptic-curve secrets.
- We introduce a post-quantum migration protocol where the EdDSA seed acts as the witness in a zero-knowledge proof that authorizes new quantum-safe signatures.
- The protocol enables seamless migration to post-quantum security while preserving existing addresses and maintaining backward compatibility.
- Our approach works even when public keys have already been exposed, which is common for active blockchain accounts.
- We formalize a security model for post-quantum ready signatures, capturing both dual-mode security (classical and post-quantum) and compatibility with existing blockchain systems.
- We prove the security of the construction using a game-based argument showing that knowledge of the EdDSA seed is necessary to authorize the migration.
- We implement a proof-of-concept using the Ligetron zkVM, demonstrating practical performance with 6.2s proving time, 2.3s verification time, and 5.4MB proof size.
Tiny side note from the cryptography nerd corner: the trick of using the EdDSA seed instead of the scalar is what makes the whole thing elegant. RFC 8032 quietly gave EdDSA chains a time capsule for post-quantum migration years before anyone was worrying about it seriously. Sometimes standards hide little gifts for the future.
