A put up from Udi Wertheimer a couple of weeks in the past made headlines throughout crypto media with a stark declare: the Lightning Community is “helplessly damaged” in a post-quantum world, and its builders can do nothing about it. The headline traveled quick. For companies which have constructed actual cost infrastructure on Lightning or are evaluating it, the implications had been unsettling.
It deserves a measured response.
Wertheimer is a revered Bitcoin developer, and his underlying concern is authentic: quantum computer systems, in the event that they ever change into sufficiently highly effective, pose an actual long-term problem to the cryptographic methods on which Bitcoin and Lightning rely. That half is true, and the Bitcoin improvement group is already engaged on it critically. However the framing of Lightning as “helplessly damaged” obscures greater than it reveals, and companies making infrastructure choices deserve a clearer image.
What Wertheimer bought proper
Lightning channels require contributors to share public keys with their counterparty when opening a cost channel. In a world the place cryptographically related quantum computer systems (CRQCs) exist, an attacker who obtains these public keys may theoretically use Shor’s algorithm to derive the corresponding personal key, and from there, steal funds.
This can be a actual structural property of how Lightning works. What the headline leaves out
The menace is way extra particular and much more conditional than “your Lightning stability may be stolen.”
First, the channels themselves are protected by a hash whereas they’re open. Funding transactions use P2WSH (Pay-to-Witness-Script-Hash), that means the uncooked public keys contained in the 2-of-2 multisig association are hidden onchain for so long as the channel stays open. Lightning funds are additionally hash-based, routed via HTLCs (Hashed Time-Lock Contracts), which depend on hash preimage revelation reasonably than uncovered public keys. A quantum attacker passively watching the blockchain can’t see the keys they would want.
The reasonable assault window is way narrower: a force-close. When a channel is closed, and a dedication transaction is broadcast onchain, the locking script turns into publicly seen for the primary time, together with the local_delayedpubkey, a regular elliptic-curve public key. By design, the node that broadcasts it can’t instantly declare its funds: a CSV (CheckSequenceVerify) timelock, sometimes 144 blocks (about 24 hours), should first expire.
In a post-quantum situation, an attacker watching the mempool may see {that a} dedication transaction confirms, extract the now-exposed public key, run Shor’s algorithm to derive the personal key and try to spend the output earlier than the timelock expires. HTLC outputs at force-close create further home windows, some as quick as 40 blocks, roughly six to seven hours.
This can be a actual and particular vulnerability. However it’s a timed race towards an attacker who should actively clear up one of many hardest mathematical issues in existence, inside a hard and fast window, for every particular person output they need to steal. It isn’t a passive, silent drain on each Lightning pockets concurrently.
The quantum {hardware} actuality verify
Right here is the half that hardly ever makes it into the headlines: cryptographically related quantum computer systems don’t exist immediately, and the hole between the place we’re and the place we might should be is gigantic.
Breaking Bitcoin’s elliptic curve cryptography requires fixing the discrete logarithm on a 256-bit key, a roughly 78-digit quantity, utilizing hundreds of thousands of steady, error-corrected logical qubits operating for an prolonged interval. The most important quantity ever factored utilizing Shor’s algorithm on precise quantum {hardware} is 21 (3 × 7), achieved in 2012 with vital classical post-processing assists. The latest file is a hybrid quantum-classical factoring of a 90-bit RSA quantity, spectacular progress, however nonetheless roughly 2⁸³ occasions smaller than what it will really take to interrupt Bitcoin.
Google’s quantum analysis is actual and value watching. The timelines mentioned by severe researchers vary from optimistic estimates for the late 2020s to extra conservative projections for the 2030s or past. None of that’s “your Lightning stability is in danger immediately.”
The event group shouldn’t be sitting nonetheless
Wertheimer’s framing, that Lightning builders are “helpless”, can be out of step with what is definitely taking place. Since December alone, the Bitcoin improvement group has produced greater than 5 severe post-quantum proposals: SHRINCS (324-byte stateful hash-based signatures), SHRIMPS (2.5 KB signatures throughout a number of gadgets, roughly thrice smaller than the NIST commonplace), BIP-360, Blockstream’s hash-based signatures paper, and proposals for OP_SPHINCS, OP_XMSS, and STARK-based opcodes in tapscript.
The right framing shouldn’t be that Lightning is damaged and unfixable. It’s that Lightning, like all of Bitcoin, and like many of the web’s cryptographic infrastructure, requires a base-layer improve to change into quantum-resistant, and that work is underway.
What this implies for companies constructing on Lightning immediately
Lightning processes actual cost quantity for actual enterprises immediately, iGaming platforms, crypto exchanges, neobanks, and cost service suppliers transferring cash globally at fractions of a cent with on the spot finality. The query companies needs to be asking shouldn’t be whether or not to desert Lightning based mostly on a theoretical future menace, however whether or not the groups constructing Lightning infrastructure are paying consideration to what’s coming and planning accordingly.
The reply, based mostly on the amount and high quality of post-quantum analysis taking place within the Bitcoin improvement group proper now, is sure.
The Lightning Community shouldn’t be helplessly damaged. It faces the identical long-horizon cryptographic problem as the whole digital monetary system, and it has a improvement group actively working to handle it. That may be a totally different story from the one the headline instructed.

