
Study & contribute to Bitcoin and lightning open source

Hands on, guided learning to make you confident in bitcoin development.

List of good first issues from curated bitcoin FOSS projects

Interactive AI chat to learn about Bitcoin technology and its history

Technical Bitcoin search engine

Daily summary of key Bitcoin tech development discussions and updates

Engaging Bitcoin dev intro for coders using technical texts and code challenges

Review technical Bitcoin transcripts and earn sats
Date
21 October, 2025
Speakers
Not Available
Transcript by
Not Available
A secp256k1 break? (quantum)
Goal: thinking over recent months about the quantum problem
Multiple approaches, Standardizes schemes.
Already relying on collision resistance. Emergency case, ideally don't introduce new cryptographic assumptions. Hash based signature schemes rely on the same assumptions that Bitcoin has now.
The drawback to hashbased is we lose a lot of features like multisignatures. Lattice-based you can retain some of that. The smallest lattice signature size is 1.7kb.
NIST standardized: Sphincs+
Optimized for size (preferred) and one for signing time.
Standardizes security levels:
| Security level | classical | quantum | 
| 1 | 128 bits | 64 bits (2^64 grover iterations)
 The number of sequential operations a classical computer can do in 10 years  | 
| 3 | 256 bits | 128 bits | 
| 5 | Not covered | Not covered | 
Higher security levels have higher signature sizes.
Leaning toward security level 1.
Shor's attack against DL requires on the order of 2^28 gates
Sphincs+
Size optimized, security level 1: 7.8kb (schnorr 64 bytes)
Since standardization, some optimizations have happened:
Sphincs+C (extra 700-1000 hashes to grind during signing, but verification is better): 6.3kb signature sizes
Can you do more signing grinding to trade off on size? Yes but it becomes not worth it.
With the same blocksize, block verification time would be the same.
You can parallelize parts of the signature verification.
S+ has no state requirements.
Number of signatures possible before degrading vs size of signature S+C?
2^64 signatures, then security degrades.
If you drop to 2^40 signatures 4.3kb
2^20 signatures: 3.1kb (~1m)
Does lightning need to move to post-quantum given the economics? Batch attacks can be dangerous.
Issues
No public derivation. No “efficient” watch-only wallet.
Problem with state? Backups and hardware wallet interplay.
One Time Signature (OTS): generate keypair, only allow to produce a single signature ever. Otherwise, can be forged. Ex.: lamport, winternitz
Extended merkle signature scheme (XMSS): generate multiple OTS keypairs, build a merkle tree, and the root is the public key. First time you sign, signature for the first OTS, merkle proof. Next time use the second tree entry.
One OTS: 256 byte signature size
Another approach is to build an unbalanced merkle tree. First signature: 288bytes. Second, a bit more. The problem is it is still stateful.
Public key built with a Sphincs+ and unbalanced (XMSS), sort of like how taproot has 2 ways to spend. Also outputs the secret key and the seed.
Winterniz OTS with +C optimization would be the OTS scheme for XMSS.
Sign using the unbalanced merkle tree XMSS. Assumes that HWW can keep state securely.
How to restore? Take the seed, when restoring, always using S+ to sign moving forward (larger signatures) XMSS can no longer be used. Issues with running in a VM, or restoring a disk backup.
For Bitcoin Core, you can do things like TPM to store state.
Discussion about multiple XMSS branches for multiple restores.
Point made that if you need to restore and use the fallback S+ branch, people will probably just send to a new wallet to use the smaller XMSS.
Esoteric ideas for multisig. Similar esoteric ideas for saving some bytes.
Discussion of parameterizing some of the size vs signing value vs # of signatures for different use cases. Lightning (many signatures) vs onchain (few).
Deploying? Could add opcodes now for schemes now, and allow them in tapscript. Keep using schnorr now, and have a sphincs+ fallback.
Community-maintained archive to unlocking knowledge from technical Bitcoin transcripts




