Skip to content

Post-Quantum Roadmap


TL;DR

EIP-8141 does not solve post-quantum security for Ethereum. It is the first step in a long roadmap requiring multiple coordinated protocol upgrades before Ethereum accounts are truly quantum-safe. The roadmap spans seven stages: decoupling accounts from ECDSA, PQ precompiles, ephemeral key rotation, encrypted mempools, complete secp256k1 revocability, native PQ transactions, and private L1 settlement.

The Ethereum L1 Strawmap identifies post-quantum L1 as one of five "north stars," targeting "centuries-long cryptographic security via hash-based schemes" through seven forks by end of 2029. The urgency is real: Google's Q-Day research estimates elliptic curve cryptography could be broken with fewer than 500,000 physical qubits in minutes, with 2029 as the projected timeline. Each stage builds on the previous one; skipping stages creates gaps a quantum adversary could exploit.

EIP-8141 is the foundational primitive that makes the rest possible. Without account decoupling from ECDSA, none of the subsequent stages have a protocol surface to build on.


1. Foundation: Decoupling Accounts from ECDSA

Status: EIP-8141 (Draft), targeted for Hegota fork (H2 2026) as CFI. Formally submitted to the EIP-8081 meta EIP on Apr 17 via PR #11537 (still awaiting final reviewer), per ACDE #233 decisions.

Today every Ethereum account is bound to a secp256k1 key pair. Shor's algorithm can recover the private key from an exposed public key in polynomial time. EIP-8141 breaks this coupling: VERIFY frames let any account code define its own signature verification, and EOA default code lets existing EOAs use alternative curves without deploying a smart contract or changing addresses.

The frame architecture is deliberately generic, providing foundational primitives (VERIFY frames, APPROVE, per-frame gas) without prescribing which PQ scheme to use. This gives the ecosystem time to research PQ curves before committing.

Delivers: the protocol surface for PQ migration. Does not deliver: actual quantum safety. Default code still signs with secp256k1 or P256, both quantum-vulnerable. The ECDSA key remains the master key.


⎯ Where EIP-8141 ends, the roadmap begins ⎯

Stage 1 above is what EIP-8141 itself delivers and is what the rest of this site documents. Stages 2 through 7 below are future research: separate EIPs, separate forks, separate open questions. EIP-8141 is a prerequisite for each of them but does not implement any of them. If you are reading this page for what ships in Hegotá, stop at Stage 1; the rest is the direction of travel.


2. PQ-Ready Precompiles and Opcodes

Status: Research (EIP-8051, EIP-8052)

PQ signature schemes are expensive. Falcon-512 costs over 1M gas in the EVM; Dilithium and SPHINCS+ are similarly costly. Dedicated precompiles are needed, following the path P256 took via RIP-7212 (~3,450 gas).

EIP-8141 decouples PQ scheme selection from the transaction format: as precompiles ship, accounts adopt them by updating VERIFY frame logic, no protocol changes needed. The signatures list proposal (PR #11481) adds forward-compatibility with signature aggregation, critical since PQ signatures are large (Falcon: ~666 bytes, Dilithium: ~2,420 bytes). The frame architecture was designed to keep aggregation open: VERIFY data is elided from the signature hash, enabling future block-level aggregation.

Delivers: practical gas costs for PQ verification. Does not deliver: mempool-level key protection or legacy key revocation.


3. Ephemeral Key Pairs

Status: Research (ethresear.ch, March 2026)

Even with PQ precompiles, the public key is exposed in the mempool between broadcast and inclusion. A quantum adversary could recover the private key and frontrun.

Ephemeral key pairs (proposed by mvicari) make every signing key single-use: each transaction rotates the authorized signer to a fresh address, permanently retiring the previous key. An EOA that has never transacted is quantum-safe because its public key is hidden behind a hash. Ephemeral keys ensure each key is used exactly once.

Under EIP-8141, this is expressible natively: VERIFY frames check the current signer, SENDER frames rotate to the next one, key derivation follows BIP-44 paths. Gas overhead is ~136k per ERC-20 transfer in the PoC (~100k above baseline), reducible by stage 2 precompiles.

Delivers: quantum safety against mempool-level key extraction. Does not deliver: protection against builders/proposers who see plaintext transactions.


4. Encrypted Mempools

Status: EIP-8184 (Draft, March 2026)

Ephemeral keys shrink the exposure window but do not eliminate it. EIP-8184 (LUCID) closes this gap with sealed transactions that propagate encrypted, revealed only after ordering is finalized:

  1. User broadcasts a sealed transaction: signed ticket (for charging) + ciphertext envelope
  2. Includers propagate via FOCIL inclusion lists
  3. Builders commit to bundles via hashes before seeing plaintext
  4. Key publishers release decryption keys after block commitment
  5. Decrypted transactions execute against the prior block state

EIP-8184 is PQ-forward-compatible: its signature_id field is extensible beyond the current EC_DSA_TYPE, and it describes an explicit EIP-8141 integration path where sealed transactions appear inside frame transactions. It requires EIP-7805 (FOCIL). See also Mempool Strategy → Encrypted Mempool Compatibility.

Delivers: complete concealment of signatures and public keys until after ordering. Does not deliver: revocation of the legacy secp256k1 key.


5. Complete secp256k1 Revocability

Status: Partial proposals (EIP-7851, EIP-8151, both Draft). Scoped to EIP-7702-delegated EOAs; broader story still open.

As long as the original secp256k1 key retains authority, the account has a quantum-vulnerable surface. Complete revocability means permanently removing the ECDSA key as an authorized signer:

  • The protocol must support accounts with no ECDSA fallback
  • Legacy transaction types (0, 1, 2) must be rejected for these accounts
  • Recovery mechanisms for accounts that lose their PQ key must exist
  • Deployed signature-checking contracts (e.g., ERC-2612 permit via ecRecover) must also stop honoring deactivated keys without needing redeployment

Two draft EIPs cover the revocability path for the subset of accounts that have delegated through EIP-7702:

  • EIP-7851 (Deactivate a Delegated EOA's Key) — system contract where a 7702-delegated EOA can schedule an irreversible deactivation of its ECDSA key, finalized after a 7-day cancellation window. Once finalized, block processing, the transaction pool, and future 7702 authorizations all reject signatures from the deactivated key.
  • EIP-8151 (Private Key Deactivation Aware ecRecover) — modifies the ecRecover precompile to return 32 zero bytes for keys deactivated under EIP-7851, so immutable contracts that rely on ecRecover for authorization (most visibly ERC-2612 permit) stop honoring deactivated keys without having to be redeployed. Requires EIP-7851.

These proposals resolve revocability for 7702-delegated accounts. They do not cover EIP-8141 EOAs that use default code without a 7702 delegation; revocability for that population is still open. This is likely the last stage before full migration: all preceding infrastructure (PQ auth, key rotation, mempool protection) must be proven before the ECDSA fallback can be safely removed protocol-wide.

Delivers: elimination of the quantum-vulnerable weak link for 7702-delegated EOAs, including for deployed signature-checking contracts via the ecRecover patch. Does not deliver: a revocability path for codeless EIP-8141 EOAs, recovery mechanisms for lost PQ keys, or elimination of the ECDSA fallback protocol-wide.


6. Native Post-Quantum Transactions

Status: Strawmap target (end of 2029)

With all building blocks in place, Ethereum ships native PQ transactions as a protocol feature. The strawmap envisions leanXMSS for signatures and STARK-based compression via leanVM:

  • Fork I (~H1 2027): Validator PQ key registration
  • Fork J (~H2 2027): Gas efficiency for PQ signatures
  • Fork L (~H2 2028): State compression via ZK proofs
  • Later forks: Full PQ consensus

In practice: frame transactions with PQ precompile VERIFY frames, restrictive-tier mempool validation, ephemeral key rotation, encrypted propagation, and revoked ECDSA keys. EIP-8141 provides the transaction format this composes into, without requiring a new tx type for each capability.


7. Long-Term: Private L1 Settlement

Status: Research direction

The PQ roadmap converges with native privacy via shielded transfers, another strawmap north star. A fully private L1 combines PQ authentication, encrypted propagation, shielded transfers (concealed amounts/parties), and ZK state proofs.

Proposals pointing in this direction: EIP-8224 (fflonk ZK proofs for shielded gas funding), the expansive mempool tier for privacy protocols, and the merkle branch escape hatch for witness data. EIP-8141's frame architecture provides the protocol surface that PQ verification, encrypted propagation, and shielded transfers all build on.

The three-gates analysis identifies what must change for shielded-pool withdrawals to reach a block through public infrastructure rather than a private relayer: canonical-pool code-hash exemption, raised VERIFY caps (~400k per tx, 1M per inclusion list), and validation-index FOCIL enforcement.


Roadmap Summary

StageComponentStatusDepends on
1Account decoupling from ECDSAEIP-8141 (Draft)-
2PQ precompiles and opcodesResearch (EIP-8051, EIP-8052)Stage 1
3Ephemeral key rotationResearch (ethresear.ch)Stages 1, 2
4Encrypted mempoolsEIP-8184 (Draft)Stage 1
5Complete secp256k1 revocabilityEIP-7851, EIP-8151 (Draft; scoped to EIP-7702-delegated EOAs)Stages 1-4
6Native PQ transactionsStrawmap target (end of 2029)Stages 1-5
7Private L1 settlementResearch directionStages 1-6

EIP-8141 is necessary but not sufficient. It builds the foundational first step by decoupling account authentication from ECDSA and providing the generic transaction primitives that all subsequent PQ work builds on. A long sequence of protocol upgrades, precompiles, and eventually full ECDSA deprecation must follow before Ethereum is truly post-quantum safe. This roadmap is measured in years, not months.



Sources: EIP-8141 Spec, EIP-8184 (LUCID), Ephemeral Key Pairs (ethresear.ch), Ethereum L1 Strawmap, Post-Quantum Ethereum, Google Q-Day Timeline, EIP-8051, EIP-8052, EIP-7851, EIP-8151