Soundness in Coinbase report

Coinbase’s Quantum Report and the Only PQ Strategy Already Deployed at Soundness

Date
Date
29-04-2026
29-04-2026
Author
Author
Soundness team
Soundness team

Recently, Coinbase’s Independent Advisory Board on Quantum Computing and Blockchain published its first position paper on post-quantum migration strategies for blockchain systems.

The board includes Dan Boneh, Justin Drake, Yehuda Lindell, Scott Aaronson, Sreeram Kannan, and Dahlia Malkhi.

The paper covers consensus-layer migration, execution-layer migration, and chain-by-chain approaches across Bitcoin, Ethereum, Solana, Algorand, Sui, and Aptos.

In Section 4.3, the report evaluates four strategies for migrating execution-layer signatures to post-quantum security. The first strategy, “Generate private keys as hash outputs” — includes a single deployed example: Soundness.

Source paper:
Quantum Computing and Blockchain Position Paper (PDF)

This is the only deployed product referenced anywhere in that section.

For the past eight months, we have been building around this exact direction. This article explains what the report says, how our system fits into it, and what comes next.

What Strategy 1 Actually Means

The construction begins with a simple observation.

Most blockchain wallets today are derived from a seed:

  • BIP-39 for ECDSA ecosystems like Bitcoin and Ethereum

  • RFC 8032-style derivations for EdDSA ecosystems like Solana, Sui, Stellar, and Canton

The seed is hashed — typically using SHA-512 or PBKDF2 — to derive the signing scalar. The public key is then generated by multiplying that scalar with the curve generator.

A cryptographically relevant quantum computer running Shor’s algorithm can recover the signing scalar from the public key.

What it cannot do is invert the hash function and recover the original seed.

That means the seed remains a post-quantum-secure witness even after elliptic-curve signatures become vulnerable.

A zero-knowledge proof of knowledge of the seed allows a user to prove wallet ownership in a way that survives the quantum transition:

  • No address migration

  • No asset transfer

  • No chain hard fork

  • No account replacement

This is the construction formalized in our Financial Cryptography 2026 paper.

Related walkthrough:
Post-Quantum Readiness for Blockchain Today

The Property Scorecard

The report evaluates each migration strategy against four properties:

  • P1 — Does not weaken current security

  • P2 — Provides post-quantum security

  • P3 — Adds no significant cost today

  • P4 — Requires minimal blockchain changes

Strategy 1 is the only approach that receives a “YES” across all four categories.

The board’s primary recommendation is “move to 1-of-2,” a hybrid transition approach that scores positively on security and deployment practicality for many chains.

That recommendation makes sense for ecosystems willing to introduce hybrid signature models during migration.

But Strategy 1 occupies a different category entirely.

It is the only approach that:

  • Preserves existing addresses

  • Protects dormant accounts

  • Avoids forced migration

  • Requires no immediate chain coordination

The Main Critique: Performance

The report’s main criticism of Strategy 1 is performance:

“Such signatures will likely be very expensive, and so this would not be a good long-term solution in a post-quantum world.”

That concern is valid.

It is also the exact problem we have been working on for the last eight months.

Our FC 2026 implementation used Ligetron, a WebAssembly-accelerated proving system.

Results from that pipeline:

  • Proof size: 5.4 MB

  • Client-side proving time: ~6.2 seconds on an M4 MacBook Pro

  • Fully browser-based proving

  • No seed exposure outside the device

The codebase is open source:

pqchain GitHub Repository

While workable for client-side generation, 5.4 MB proofs were too heavy for scalable verification infrastructure.

So we redesigned the proving layer.

Moving from Ligetron to WHIR

Migrating to a WHIR-based proving system reduces proof sizes from megabytes to roughly 50 KB while also bringing proving and verification into sub-second territory.

WHIR belongs to the FRI/STIR family of hash-based polynomial commitments:

  • No trusted setup

  • Unconditional post-quantum security

  • Same client-side security model

  • Roughly two orders of magnitude smaller proofs

Achieving this reduction required substantial circuit redesign work:

  • SHA-512 preimage relations

  • Bit decomposition layers

  • Curve25519 arithmetic

  • Constraint optimization for recursive proving efficiency

None of this came for free.

All of it was necessary to make Strategy 1 operationally realistic at the verification layer.

Aggregation Changes the Economics

One part the report only briefly touches on is aggregation.

At the base layer, the system can operate per transaction:

  1. User generates a PQ-NIZK proof

  2. Chain verifies the proof alongside the classical signature

  3. Existing account model remains untouched

This provides immediate post-quantum security without changing wallet infrastructure, but it introduces recurring proving and verification overhead.

Aggregation changes the picture.

Multiple proofs can be compressed into a single batch proof so validators verify one proof instead of many.

For institutional custody systems and threshold architectures, this is the difference between something theoretically interesting and something deployable.

It also creates an unusual side effect:

The construction behaves like a cryptographic form of account abstraction without requiring smart-contract wallets, delegation systems, or execution-layer rewrites.

The chain sees a single proof.

Users keep their existing addresses.

The More Natural Deployment Model: Account-Level Migration

The long-term deployment path is not per-transaction proving.

It is account-level binding.

Instead of generating a proof for every transaction, a user generates a single proof binding a newly generated post-quantum key to their existing on-chain identity.

That post-quantum key could be:

  • Dilithium

  • Falcon

  • Future NIST-standardized systems

The proof is verified once.

After that:

  • Transactions are authenticated directly under the new PQ key

  • No further proofs are needed

  • No recurring proving costs remain

This distinction matters.

Transaction-level proofs provide immediate protection with zero migration assumptions.

Account-level binding removes ongoing cost entirely after a one-time enrollment step.

Even in a future where chains natively support post-quantum signatures, existing accounts still need a secure way to link old identities to new keys.

This construction provides that bridge while preserving dormant accounts whose owners may not be online during the migration window.

What Works Today

Our enrollment platform, PQ-Me, already supports five wallets across five networks.

Users can:

  1. Connect a wallet

  2. Generate the proof locally in the browser through WebAssembly

  3. Download a PQ certificate

The seed never leaves the device.

The entire proving flow is client-side.

Interactive explainer:
PQ Stack Interactive Demo

The explainer visualizes:

  • Seed derivation

  • Proof generation

  • On-chain verification

  • Standard EdDSA signing flow

  • PQ-protected execution flow

side by side.

What Comes Next

Three parallel directions are currently active.

Bitcoin Support

The construction extends to ECDSA through hardened BIP-32 derivation paths.

The circuit is substantially heavier:

  • PBKDF2

  • 2048 HMAC-SHA512 iterations

  • Roughly 100× the proving cost of the EdDSA version

Despite this, proof size targets remain comparable.

Work is ongoing.

Native Chain Support

Allowing validators to accept Mode 2 signatures alongside classical signatures is fundamentally a software-layer upgrade rather than a consensus rewrite.

We are actively discussing deployment paths with multiple chain teams.

At the same time, we are continuing to reduce costs through:

  • Better proving systems

  • Aggregation

  • Verification optimizations

  • Native PQ verification primitives

Once these primitives exist at the EVM layer and equivalent execution environments, the economics shift significantly.

Threshold and HSM Extensions

The MPC extension is currently in development:

  • 2-of-3 signing

  • Seed-based DKG

  • Aggregatable proofs

  • Rogue witness mitigation

In parallel, the HSM-oriented construction:

  • Hidden public keys

  • ZK signature proofs

  • Custody-compatible flows

has already been integrated with regulated custody requirements in mind.

Closing

Eight months ago, the core bet was simple:

  • The seed is the correct post-quantum anchor

  • Client-side proving can make the model practical

The Coinbase Independent Advisory Board has now cited our deployment as the only implemented example of the strategy that scores positively across every property in their evaluation framework.

The board recommends hybrid “1-of-2” migration as the primary transition path, and that reasoning is sound for many ecosystems.

But for users who want to:

  • Preserve existing addresses

  • Protect dormant accounts

  • Avoid forced migration

  • Maintain compatibility across chains

Strategy 1 remains the only approach that achieves all four simultaneously.

And today, we are the only team that has deployed it.

The work to make it cheaper, faster, and easier to integrate continues.

Ready to Become Quantum-Ready?

Join institutional capital in securing assets against quantum threats without disrupting operations.

Ready to Become Quantum-Ready?

Join institutional capital in securing assets against quantum threats without disrupting operations.

Ready to Become Quantum-Ready?

Join institutional capital in securing assets against quantum threats without disrupting operations.