Post-Quantum Readiness in EdDSA Chains

Date:

You can find the slides at this link.

  • Quantum computers pose a serious threat to blockchains that rely on classical signatures such as ECDSA, since exposed public keys could allow adversaries to recover private keys using quantum algorithms.
  • Existing proposals for migrating to post-quantum signatures often require changing addresses, deploying hybrid signature schemes, or introducing mechanisms that fail to protect inactive accounts.
  • We observe that blockchains using EdDSA signatures (such as Sui, Solana, and Near) have a structural advantage: their keys are deterministically derived from a seed following RFC 8032.
  • This property enables a user to prove ownership of an account by proving knowledge of the EdDSA seed in zero knowledge, without revealing elliptic-curve secrets.
  • We introduce a protocol where the EdDSA seed is used as a witness in a zero-knowledge proof that authorizes a new post-quantum signature key.
  • The protocol enables seamless migration to quantum-safe signatures while preserving existing addresses and maintaining backward compatibility.
  • Importantly, the approach also works when the public key has already been exposed, which is the common case for active blockchain accounts.
  • We formalize a security model for post-quantum ready signatures and prove the security of the construction through a game-based argument.
  • A proof-of-concept implementation demonstrates practicality, achieving about 6.2 seconds proving time, 2.3 seconds verification time, and a 5.4 MB proof using the Ligetron zkVM.

Cryptography sometimes hides clever time capsules. EdDSA’s deterministic seed derivation was designed for simplicity and safety, yet it quietly leaves a door open for zero-knowledge based upgrades. Years later, that door turns out to be a surprisingly elegant escape hatch from the quantum future.