After Naoris launches, it provides quantum-secure protection for Bitcoin and Ethereum assets on a quantum blockchain

NAORIS-5,36%
BTC1,14%
ETH0,84%

Gate News message: as the blockchain industry accelerates its response to the threat of quantum computing, Naoris Protocol has officially launched its post-quantum blockchain mainnet following its initial rollout. From the moment the network was created, it has used post-quantum cryptography technology. The algorithms it uses have been approved by the U.S. National Institute of Standards and Technology (NIST). The goal is to prevent future quantum computers from cracking the elliptic curve digital signature algorithms (ECDSA) that mainstream blockchains such as Bitcoin and Ethereum rely on.

Naoris Chief Growth Officer Nathaniel Szerezla said the project implements a standardized ML-DSA signature—an NIST-approved version of the CRYSTALS-Dilithium algorithm—ensuring the network has quantum-safe properties from the very start. After users bind their post-quantum keys, the system enforces a one-way, irreversible conversion and only accepts post-quantum signed transactions; any transaction that uses only classical ECDSA signatures will be rejected.

At present, the Naoris network is running limited validator nodes, and it has already processed more than 106 million post-quantum transactions on its testnet, while also detecting more than 603 million security threats. Szerezla warned that blockchain assets relying on traditional cryptography cannot automatically gain protection, and that users need to migrate their assets to Naoris in order to enjoy quantum security guarantees.

Meanwhile, Bitcoin and Ethereum developers are also exploring quantum-resistant solutions. Ethereum co-founder Vitalik Buterin has proposed replacing the BLS and ECDSA in the protocol with alternative signature schemes that can withstand quantum attacks. Bitcoin developers are advancing the BIP 360 proposal, which reduces public key exposure through “Pay-to-Merkle-Root,” preparing for the future addition of post-quantum signatures. Because blockchain transaction history is public and permanent, once a quantum computer reaches sufficient capability, attackers may be able to recover private keys from old transaction signatures. Naoris’s strategy is precisely to provide a solution to mitigate this risk.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
No comments