[ Litepaper ]
Protocol Overview
A comprehensive overview of the Quantum protocol in one place.
TL;DR
EXECUTIVE SUMMARY
Most blockchains rely on classical signatures (ECDSA/EdDSA/Schnorr) for transaction authorization and validator voting. Those signatures are vulnerable to sufficiently capable quantum computers (via Shor's algorithm).
Quantum's target end state is post-quantum by default: no legacy ECDSA authorization, and a protocol engineered around the scaling realities of PQ signatures—larger bytes-on-the-wire, larger bytes-on-disk, and larger consensus proof objects.
Current direction:
- Execution: Reth-based EVM (Ethereum execution ergonomics).
- Consensus: Commonware Simplex for fast notarization/finality (2 hops to notarization, 3 hops to finalization).
- PQ signatures: Falcon (compact) + ML-DSA/Dilithium (conservative), with a hash-based hedge path using SLH-DSA for break-glass security.
- Threshold exploration: Ringtail as a candidate for compact PQ threshold certificates (to avoid shipping 2f+1 signatures per certificate).1
- Entanglement (Quantum ↔ EVM bridge): Canonical bridge architecture using LayerZero v2 transport + DVN security, with a PQ boundary invariant: inbound value only materializes on Quantum via pending credit → PQ claim() (and a required PQ-secured DVN as defense-in-depth).
- PQ Wallet Layer (cross-chain):
- MetaMask Snap enabling PQ key management + PQ signing (Falcon or ML-DSA lane).
- Local PQ signing tool to sign transactions and broadcast via standard pipelines (Foundry/Hardhat), with planned upstream PRs where feasible.
- PQ verifier contract deployed per supported chain (Falcon or ML-DSA/Dilithium), used by smart wallets for on-chain verification.
- PQ-secured smart wallets on other EVM chains: assets held in a wallet that only accepts PQ signatures.
- More wallet integrations and a native Quantum wallet.
- P2P transport PQ-KEM (post-mainnet): We will evaluate ML-KEM (Kyber) for P2P key establishment after mainnet, once baseline performance and operational behavior are proven. No hybrid approach is planned at this stage; the goal is a clean, single-lane PQ KEM decision based on measured need and risk.
- QCN (Quantum Circuit Network): A settlement-layer marketplace for distributed quantum jobs on real QPUs (off-chain discovery + on-chain escrow, commit→reveal, objective disputes, permissionless finalization). Planned post-mainnet once the base chain + Entanglement are hardened.
Why post-quantum now
NIST's first finalized PQC standards (FIPS 203/204/205) were approved and published in August 2024.
Signature standards include ML-DSA (FIPS 204) and SLH-DSA (FIPS 205). Falcon is selected by NIST and planned for standardization in a future document (FN-DSA / FIPS 206, in development).2 This means the "which algorithms?" question is converging, and it's worth doing systems engineering now instead of waiting.
What we are building
Quantum is an EVM-compatible blockchain designed for a world where post-quantum authorization is non-optional.
What makes it different from "PQ add-ons":
PQ-by-default authorization (target end state)
PQ signatures aren't a plugin; they become the default account authorization mechanism.
Consensus and networking engineered for PQ payload sizes
PQ signature and certificate bytes are treated as a first-class protocol constraint.
Cryptographic agility and operational hedging
We plan for algorithm surprises with clear "normal → hedged → emergency" modes.
Minimalist architecture
We avoid adding complexity (e.g., DAG ordering) unless benchmarks prove it's required.
Bring PQ safety to the broader EVM ecosystem
Even before chains migrate at L1, we can materially improve asset custody by enabling PQ-secured smart wallets and mainstream wallet + developer tooling that can produce PQ signatures.
Design goals
PQ authorization at L1 (target end state)
Classical ECDSA is not a valid authorization mechanism for accounts.
Fast finality, designed for PQ payloads
We target sub-second UX and treat bytes as the key constraint.
Hedge against cryptographic surprises
Lattice dominates practical PQ, but we preserve a conservative hedge path.
Keep the protocol simple
Prefer straightforward consensus + execution unless measurements demand more.
Make PQ adoption practical
Ship wallet and dev tooling so PQ signing works in real workflows (not just research demos).
Use cases
Quantum is designed for assets and applications where "wait to migrate later" is not acceptable:
Long-lived assets
RWAs, treasuries, long-duration bonds, institutional custody.
High-value vaults
Accounts that demand "break-glass" safety guarantees (dual-sign policies).
Exchange / bridge assurance
Externally referenced checkpoint anchors for conservative finality.
Governance with long horizons
Voting that remains valid under future quantum threat models.
Infrastructure primitives
PQ-native accounts for applications that must be future-proof by design.
Compute settlement
QPU job results and receipts anchored under PQ authorization (QCN).
Wallet-layer hardening on today's chains
Protect assets with a PQ-controlled smart wallet even on EVM chains that still use ECDSA at the base layer.
System overview
Execution + consensus are intentionally conventional. The novelty is PQ authorization + PQ scaling, and how that boundary is enforced across bridges, wallets, and marketplaces.
Architecture at a glance
| Layer / Domain | What runs there | What it does |
|---|---|---|
| Execution | Reth-based EVM | EVM compatibility and execution ergonomics |
| Consensus | Simplex (Commonware) | Fast notarization/finality with short critical path |
| Authorization | PQ tx type + verifier precompiles | PQ signatures as default authorization (target end state) |
| Entanglement bridge | LayerZero v2 + DVN stack + PQ boundary gate | Cross-chain transfers with pending credit → PQ claim() |
| PQ Wallet Layer | Snap + verifier contracts + smart wallets | PQ signing + PQ custody on other EVM chains |
| QCN | On-chain escrow + off-chain execution | Quantum job marketplace settled on Quantum |
Core chain transaction path
Cryptography choices
We prefer widely analyzed families and published standards where possible.
Signature sizes (intuition)
| Scheme | Signature size | Notes |
|---|---|---|
| Falcon-512 | ≤ 666 B (max) | Practical max-size bound used in common integration patterns.3 |
| ML-DSA-44 (Dilithium family) | 2,420 B | Standardized family (FIPS 204). |
| SLH-DSA 128s | 7,856 B | Hash-based hedge is conservative but byte-heavy. |
What we're actively exploring
- Falcon everywhere (userland + consensus) for minimum bytes
- Falcon userland + threshold certificates for consensus scaling (Ringtail candidate)1
- Falcon vs ML-DSA/Dilithium lanes (benchmark + audit driven), depending on maturity and operational performance
P2P transport: PQ-KEM (post-mainnet)
We will evaluate ML-KEM (Kyber) for P2P key establishment after mainnet, once baseline performance and operational behavior are proven. No hybrid approach is planned at this stage; the goal is a clean, single-lane PQ KEM decision based on measured need and risk.
The PQ scaling cliff
Post-quantum signatures can be CPU-manageable, but they are large, and that cascades into bandwidth, storage, and consensus proof scaling.
User layer: throughput becomes byte-limited
Each transaction carries a larger authorization payload. If blocks/propagation are tuned around ~65–72 byte classical signatures, PQ payloads can:
- ▸ reduce transactions per block at the same byte budget
- ▸ increase propagation latency and orphan risk
- ▸ increase mempool bandwidth and storage pressure
Consensus layer: quorum proofs grow with validator count
In BFT-style consensus, finality requires a quorum (often 2f+1) of validator approvals. If a quorum proof contains the set of signatures, then:
quorum-proof signature-bytes ≥ (2f+1) × signature_size
(plus signer IDs/bitmap and framing overhead)
For Falcon-512 (≤666 B max):3
- n = 100 ⇒ f = 33 ⇒ 2f+1 = 67 ⇒ ≥ 44,622 bytes (~44.6 KB)
- n = 200 ⇒ f = 66 ⇒ 2f+1 = 133 ⇒ ≥ 88,578 bytes (~88.6 KB)
Where time goes (why bytes become latency)
In practice, PQ payloads show up first as:
- network latency pressure — bigger votes/certs; more bandwidth on critical path
- durability pressure — larger artifacts persisted; fsync/WAL sync points can become visible4
- verification pressure — often secondary for consensus, primary for tx throughput
Consensus approach
We start with Simplex for a short critical path and operational clarity.5
Then we address PQ scaling with minimal levers:
Simple
Quorum proofs ship many signatures
Benchmark-gated
Threshold certificates / threshold proofs (ship one signature)
Caveat: threshold signing adds interaction. It must not erase Simplex's fast-path advantages.
Hedging and cryptographic agility
We want a contingency if a major lattice break happens.
Hedging modes
Normal
Lattice-only signatures.
Checkpoint-hedged
Hash-based signatures only on checkpoints (epoch boundary / cadence).
Emergency
Dual-sign per message (lattice + hash-based) for sustained active attack scenarios.
Scope clarity: checkpoint hedging strengthens external anchoring without taxing the fast path. If lattice signatures become fully forgeable, Emergency is the break-glass posture for continued operation under pressure.
PQ Wallet Layer (Cross-chain)
Making other chains quantum-safer
Quantum's L1 target end state is PQ-by-default. But we can deliver meaningful benefits to users before the rest of the ecosystem migrates by improving wallet-layer custody on existing EVM chains.
Key idea
Even on chains where consensus and base accounts still use ECDSA, assets can be protected inside a smart wallet that only accepts PQ signatures.
This is not "full PQ security" of the chain, but it materially improves user safety: even if a user's ECDSA key is compromised, the attacker cannot move assets held in a PQ-only smart wallet.
What we are implementing first
MetaMask Snap for PQ key management + signing
A MetaMask plugin enabling users to generate and manage PQ keys, and produce PQ signatures (Falcon or ML-DSA lane).
Local PQ signing tool
A CLI tool to sign transactions with PQ keys and broadcast via standard pipelines (Foundry/Hardhat), with planned upstream PRs where feasible.
PQ verifier contract deployments
Falcon or ML-DSA/Dilithium verifier contract deployed per supported chain, used by smart wallets for canonical on-chain PQ signature verification.
PQ-secured smart wallets
Smart wallets on other EVM chains where assets are held in a wallet that only accepts PQ signatures, delegating verification to the chain's verifier contract.
More wallet integrations + native Quantum wallet
Additional wallet integrations and a native Quantum wallet as the ecosystem matures.
PQ verification on other chains (verifier contracts)
Most EVM chains do not have native PQ verifier precompiles. To make PQ-secured smart wallets practical across the ecosystem, we deploy a canonical verifier per supported chain.
- We deploy either a Falcon verifier or a Dilithium/ML-DSA verifier (depending on direction) to every chain we support.
- The PQ smart wallet delegates verification to this verifier, rather than embedding full PQ verification logic in every wallet instance.
- This improves auditability (one shared verifier surface per chain) and standardizes verification semantics across networks.
User journey (high level)
How it works (high level)
Components (ecosystem PQ custody on existing EVM chains)
| Component | Where it runs | What it does |
|---|---|---|
| MetaMask Snap (PQ signer) | User device (inside MetaMask) | Generates/holds PQ keys and produces PQ signatures |
| Local PQ signing tool (CLI) | User/dev machine | Signs with PQ keys; broadcast via Foundry/Hardhat/RPC/relayers |
| PQ Smart Wallet (contract) | Target EVM chain | Holds assets; only authorizes actions with valid PQ signatures |
| PQ Verifier Contract | Target EVM chain (one per supported chain) | Canonical PQ signature verification (Falcon or ML-DSA/Dilithium) |
| Frontend / onboarding | Web app | Guides setup; Snap install; wallet deploy; asset migration |
| Relayer (optional) | Off-chain service | Improves UX (batching/sponsored gas) without weakening PQ auth |
Important limitations (explicit)
- This improves custody safety, but does not convert the underlying chain into a PQ-by-default chain.
- Guarantees depend on verifier correctness/audits, wallet upgrade policies, and secure key UX (Snap / wallet / local signer).
Entanglement: Quantum ↔ EVM Bridge
Quantum needs a bridge that preserves a clear boundary:
Nothing mints/unlocks on Quantum unless there is post-quantum (PQ) authorization.
Entanglement uses LayerZero v2 as transport and a DVN-based verification stack, with defense-in-depth:
- 1. PQ-DVN required for EVM → Quantum verification
- 2. Quantum-side pending credit → PQ claim() gate
Message lifecycle
Quantum → EVM
- 1. PQ-auth on Quantum initiates send
- 2. LayerZero transports message
- 3. EVM mints after verification + delivery
EVM → Quantum (inbound boundary)
- 1. EVM burns/locks and sends
- 2. Quantum records pending credit keyed by guid
- 3. User/relayer finalizes via PQ-authenticated claim()
Quantum Circuit Network (QCN)
QCN is a protocol and marketplace for running structured quantum circuit jobs on real QPUs, with off-chain execution and on-chain settlement on Quantum.
Off-chain discovery + on-chain commitments + rule-based settlement.
What QCN is
- A compute market (workers compete on price + SLA + reliability)
- A settlement layer (escrow + bonds + objective slashing)
- Composable with EVM contracts (async job requests and result consumption)
What QCN is not (by default)
- An on-chain correctness verifier for quantum outputs
- A redundant rerun system
- A speed race ("first to claim wins")
Job lifecycle
What we will benchmark
We treat PQ readiness as measurable bottlenecks: bytes, sync points, and latency distributions.
Consensus metrics
- ▸ time-to-notarization / time-to-finality (p50/p95/p99)
- ▸ end-to-end bytes per view
- ▸ bytes broadcast per validator per view
- ▸ durability sync points (WAL/fsync) impact on latency tails
- ▸ sign-time tails under load
- ▸ certificate size vs validator count (with/without thresholding)
User layer metrics
- ▸ tx byte size (pk-in-every-tx vs registry)
- ▸ precompile verification throughput
- ▸ block propagation vs tx size
- ▸ hedge policy overhead vs standard policy
Crypto metrics
- ▸ sign/verify microbench across CPU targets
- ▸ implementation variance and tail latency
PQ Wallet Layer metrics
- ▸ Snap signing latency + reliability in real dApp flows
- ▸ verifier gas costs and smart wallet overhead
- ▸ end-to-end UX latency: sign → submit → finalize
- ▸ tooling friction for Foundry/Hardhat and common stacks
QCN metrics
- ▸ job submission calldata + gas
- ▸ commit/reveal overhead
- ▸ finalize contention and keeper tip sizing
- ▸ dispute rates and slashing effectiveness
- ▸ artifact availability during challenge windows
Threat model and scope
This litepaper focuses on post-quantum safety for signatures (authorization + consensus voting), not "PQ everything."
In scope
- Account safety under quantum threat models (no ECDSA auth in target end state)
- Consensus safety under standard BFT assumptions
- Operational hedge modes
- QCN settlement integrity
- Wallet-layer custody hardening on other EVM chains
Out of scope
- Full PQ guarantees for all primitives beyond signatures
- MEV elimination
- On-chain adjudication of QPU correctness (default QCN mode)
- Claiming cross-chain PQ smart wallets upgrade another chain to full PQ security
Roadmap
This roadmap is organized as milestones (not a status board). Workstreams can run in parallel; sequencing may adjust based on benchmarks, audits, and ecosystem readiness.
PQ Wallet Layer (Cross-chain) MVP
Deploy a wallet-layer custody primitive across multiple EVM chains (not cross-chain signing).
- ▸ PQ verifier contract deployed once per supported chain (Falcon or ML-DSA/Dilithium lane)
- ▸ PQ smart wallet that delegates signature verification to the verifier contract
- ▸ MetaMask Snap for PQ key management + signing
- ▸ Frontend onboarding + migration flow: Snap install → wallet deploy → deposit/migrate assets → PQ-only usage
- ▸ Local PQ signing tool (CLI) to sign and broadcast via standard pipelines
- ▸ Foundry/Hardhat enablement, with upstream PRs where feasible
- ▸ Security review/audit scope for verifier + wallet + onboarding flows
Quantum L1 Devnet 1 (PQ consensus baseline)
Simplex with PQ validator signatures. Benchmarks: vote/certificate bytes, WAL/durability impact, notarization/finality distributions.
Quantum L1 Devnet 2 (PQ userland authorization)
PQ transaction type + verifier precompiles. Phase 1 tx format: pubkey included in every tx.
Hedging modes (checkpoint + emergency)
Checkpoint hedging (hash-based signatures only on checkpoints). Emergency mode (dual-sign every consensus message when activated).
AuthDescriptor optimization (optional key registry)
Short-form tx option referencing on-chain key metadata. Benchmarks: state growth vs bandwidth savings.
Threshold certificates (optional, benchmark-gated)
Prototype behind a feature flag. Go/no-go based on interaction cost vs bytes saved and tail-latency impact.
Entanglement MVP (Quantum ↔ EVM bridge)
LayerZero v2 adapters + bridge cores. PQ boundary enforcement: pending credit → PQ claim().
- ▸ Required PQ-secured DVN in EVM → Quantum security stacks
- ▸ End-to-end benchmarks + operational runbooks
Public Testnet + audits
Full surface enabled (consensus + PQ userland + Entanglement + supported wallet-layer components). Multiple independent audits.
Mainnet launch + bug bounty + QCN kickoff
Mainnet launch + bug bounty program. QCN begins as a post-launch track (phased, benchmark-gated).
Disclaimer
This document is a working draft intended to describe a direction and an experimental plan. Architecture, parameters, and cryptographic choices may change based on benchmarks, audits, and ecosystem readiness.
Footnotes
1 Ringtail is a candidate threshold signature scheme with message-independent preprocessing and reported signature/communication sizes at large thresholds; it's explicitly exploratory and benchmark-gated for Quantum.
2 NIST PQC standards & status: FIPS 203/204/205 (finalized Aug 2024). Falcon is selected by NIST and planned for standardization as FN-DSA (FIPS 206, in development).
3 We use ≤ 666 B as a practical Falcon-512 max-size bound consistent with common interface assumptions; implementations may vary by encoding choices.
4 Larger persisted artifacts can make durability sync points more visible in latency tails (design-dependent).
5 Simplex references: Commonware materials on architecture and fast-path finality.
Ready to start building?
Explore our developer documentation and join the community.