1 of 21

Quantum is The Future

Embrace Quantum�Hopefulness

Presentation by John Lilic

Risks, Challenges and Opportunities

2 of 21

Quantum Computing VS Web3 Cryptography

What is QDay?

QDay is the moment quantum computers break modern cryptography. ��Instead of waiting 8-10 years for an ultra-powerful quantum computer, mass-produced quantum hardware is accelerating the timeline.

Breaking Bitcoin once required 8 million qubits—but with parallel quantum systems, this will happen much faster.

The question is no longer ‘if’ but ‘when’.

3 of 21

Quantum Computing VS Web3 Cryptography

4 of 21

Quantum Computing VS Web3 Cryptography

5 of 21

Quantum Computing VS Web3 Cryptography

Actual Algorithm Performance

6 of 21

Active Volume

Litinski 2022 https://arxiv.org/pdf/2211.15465

Network based on implementation of

algorithm and not all qubits connected.

Faster than the same qubit count physically

connected into a single machine.

Many small machines, not one big one.

Quantum Computing VS Web3 Cryptography

7 of 21

Active Volume

https://arxiv.org/pdf/2306.08585 Litinski 2023 “How to compute a 256-bit elliptic curve private key with only 50 million Toffoli gates”

Targeting BTC block time on average, solving Bitcoin’s UTXO public key into private key with enough time to front run the transaction and send the money to the attacker.

2D local is “one giant machine” and the time predicted is 3.8 hours with 6000 logical qubits on superconducting (IBM, Google, Alice and Bob) qubits, or 160 days with Trapped Ion (Quantinuum, Oxford Ionics)

Quantum Computing VS Web3 Cryptography

8 of 21

Active Volume

A lot of little machines is much faster: 6000 modules with 1152 qubits each is 58 seconds for superconducting, 16 hours for trapped ions. Based on the networking delays and gate speed, photonics are 58 seconds to 17 hours (a limitation intrinsic to the specific error correction scheme used, which sequentializes part of the classical computation) and 24000 modules with 1152 qubits each is 8.3 seconds solve time.

Quantum Computing VS Web3 Cryptography

9 of 21

Quantum Computers enter Mass Production

PSIQuantum 26 April 2024: A manufacturable platform for photonic quantum computing. https://arxiv.org/html/2404.17570v1

GlobalFoundries 5 May 2024: PsiQuantum and GlobalFoundries to Build the World’s First Full-scale Quantum Computer.

https://gf.com/dresden-press-release/psiquantum-and-globalfoundries-build-worlds-first-full-scale-quantum-computer/

Oxford Ionics, 1 July 2024: Scalable, high-fidelity all-electronic control of trapped-ion qubits. https://arxiv.org/abs/2407.07694

Intel, 1 May 2024 - Electron Spin quantum wafer mass production. https://www.nature.com/articles/s41586-024-07275-6

Traditional Semiconductor manufacturing facilities are used to build quantum computers.

Quantum Computing VS Web3 Cryptography

10 of 21

What does “broken” mean for QDay?

Public keys converted into the Private key by Discrete Log problem, using Shor’s Algorithm.

If a transaction has been performed from an address, the public key is exposed.

Money can be spent from wallet, no matter cold storage or hot storage.

UTXO protects against ECDLP by creating new addresses. Ethereum / Solana can do the same but interacting with smart contracts will expose public key.

Attackers can still steal funds from UTXO if the solve time is fast enough.

Multi-sig are the most exposed, so BLS and Shamir Secret Sharing are gone.

Quantum Computing VS Web3 Cryptography

11 of 21

What does QDay mean for Web3?

Quantum computing is advancing faster than most expect. Q-Day isn’t a distant theory—it’s a real transition point that Web3 must prepare for.

  • Bitcoin & Public Key Exposure – 20-30% of all BTC (worth $500B+) is still vulnerable due to older address formats. Without action, these funds could be targeted.
  • DeFi & Smart Contracts – Web3 holds $1.7T across Layer 1 and Layer 2 networks. Many smart contracts rely on cryptography that will eventually need upgrading.

This isn’t about fear—it’s about adaptation. The Web3 ecosystem has time to migrate if action starts now. Q-Day isn’t the end—it’s a shift. Those who prepare early will lead the next era of secure, quantum-resistant Web3.

Quantum Computing VS Web3 Cryptography

12 of 21

Timeline - QDay in 2025, 2026 or 2027?

Little bit of science left for PSIQuantum, mostly manufacturing.

1 facility in upstate New York can make 500,000 devices per year. QDay 2027.

Hiring for personnel at 4 more facilities. 3 facilities moves to QDay 2026.

China is an unknown risk, but Wukong is advanced quantum chip.

5-10 Companies are targeting 2027 for 1 million qubits.

3 Companies in mass production now PSIQuantum - leader.

More improvement possible in algorithms explained by Litinski in his Youtube presentation at QIP2024

Shor’s has been improved again recently.

Quantum Computing VS Web3 Cryptography

13 of 21

Embracing Quantum

Quantum computing is not just about breaking encryption—it enables unbreakable security, new financial models, and decentralized trust.

Just as the internet reshaped the world, quantum will redefine computation, finance, and Web3.

Those who prepare now will shape the next era of technology and lead the quantum-powered future.

Our destiny is in our hands—the choices we make today will determine who thrives in the quantum age.

Quantum Computing VS Web3 Cryptography

14 of 21

Quantum 1-Shot Signatures

Quantum 1-Shot Signatures are cryptographic signature schemes where one party can�delegate another party to sign any message exactly once.

This is impossible classically without using a trusted setup (like a TEE): Once you give�someone your public key, they can use it as much as they want!

Quantum computing allows this by first computing a hash on a state in superposition,�and only after post-selecting a given pre-image. This is classically impossible to do!

A great application of this are blockchains with instant absolute finality.

Quantum Computing VS Web3 Cryptography

15 of 21

Quantum 1-Time Programs

Quantum 1- Programs are programs that can be executed on any input exactly once. �They are related to Quantum 1-Time Memories, and are very useful from a crypto point�of view as a 1-Time Program can be used to implement a tradable financial instrument.

Again, this is classically impossible without a trusted setup.

In quantum computing with ideal hardware 1-Time programs are provably impossible, �but this impossibility result can be reversed by using something called Wiesner states in a �non-ideal hardware scenario such as NISQ. So not having ideal quantum hardware actually�buys us something here!

Quantum Computing VS Web3 Cryptography

16 of 21

Quantum Key Distribution

Quantum Key DistributionQKD is a way for two parties to produce a shared secret�key in a way that makes potential eavesdroppers detectable.

Simply put: If someone is listening on the channel trying to spoof information, the parties�will know.

This is possible thanks to the quantum no-cloning theorem, which says that quantum�states cannot be copied. So an eavesdropper is forced to measure the state to spoof�information, and measurements always change states. This is what makes it detectable!

Quantum Key Distribution can be used to achieve perfect cryptography via one-timepads. It is the only form of provable perfect cryptography we know so far.

Quantum Computing VS Web3 Cryptography

17 of 21

Quantum Money

Quantum states are resources, as they cannot be copied, only measured and transferred �around.

The idea of quantum money is to use quantum states as banknotes with economic value. They can be transferred around but not copied, making them the perfect form of money.

Quantum money is still a few years away – we need reliable long-term quantum memory and other stuff for that – but can be used to build ledgerless blockchains, that is, blockchains that do not need miners, validators, node or any form of shared state.

TL;DR: Works exactly like cash but can be exchanged remotely like digital money!

Quantum Computing VS Web3 Cryptography

18 of 21

Device-Independent Cryptography

In cryptography, you always prove security with respect to an attacker with some capabilities. For instance, in traditional public key crypto we assume the attacker not to be able to invert one-way functions in polynomial time.

Device-independent cryptography is a form of cryptography that is almost unreasonably secure: It is secure even if the attacker has control on your hardware!

This seems like sci-fi but it’s a very nice property to have, especially now that we know for a fact the NSA and other government agencies routinely tamper with our hardware to install all sorts of backdoors even before it comes out of the factory.

Quantum Computing VS Web3 Cryptography

19 of 21

Embracing Opportunity

A quantum-safe Web3 is a fresh start—let’s build it.

No more outdated cryptography. Quantum security requires new standards, not hybrid patches.

The race for the #1 quantum-safe DEX, DeFi, and markets is open.

Migrate contracts now—early adopters will define the future.

Web3 can either wait to be broken or lead the transition to quantum security. The choice is ours.

Quantum Computing VS Web3 Cryptography

20 of 21

Quantum Computing VS Web3 Cryptography

The Future is Quantum��Reject Quantum Doomerism

Embrace Quantum Hopefulness

21 of 21

Quantum Computing VS Web3 Cryptography

Thank you for your time.

John Lilic

NeverLocal