Key Takeaways
Project Eleven, a quantum computing research firm, has launched the Q-Day Prize, offering 1 Bitcoin (BTC) to the first individual or team that can break an elliptic curve cryptographic (ECC) key using Shor’s algorithm on a quantum computer.
This article explains what the Q-Day Prize is, how advances in quantum computing could affect Bitcoin’s security, and what crypto holders should know as the industry begins preparing for potential long-term risks.
The Q-Day Prize is a global challenge to assess the real-world threat quantum computing poses to Bitcoin’s cryptographic security.
Participants are tasked with demonstrating the ability to crack ECC keys, which underpin Bitcoin’s security model, using quantum computing techniques. The competition runs until April 5, 2026, and the first successful attempt will be awarded 1 BTC, valued at $94,631 (approx.) as of April 30, 2025.
Why is quantum computing a significant threat to Bitcoin?
If a quantum computer ever reaches the point where it can crack elliptic curve cryptography (ECC), it could unlock early Bitcoin wallets, including the 1.1 million BTC tied to Satoshi Nakamoto, which have never moved.
The Q-Day Prize is organized and administered by Project Eleven (P11), a quantum computing research and advocacy firm. Launched on April 16, 2025, the initiative will reward the first individual or team that can break an ECC key using Shor’s algorithm on a quantum computer.
Project Eleven’s mission with the Q-Day Prize is to assess the real-world threat quantum computing poses to Bitcoin’s cryptographic security. It aims to encourage practical demonstrations of cryptographic vulnerability, thereby accelerating the development of quantum-resistant protocols.
Project Eleven highlights that over 10 million Bitcoin addresses have exposed public keys, making them susceptible to quantum attacks. If quantum computers can break ECC, more than 6 million BTC, valued at around $500 billion, could be at risk.
Bitcoin’s security relies heavily on ECC, specifically the Elliptic Curve Digital Signature Algorithm (ECDSA).
Quantum computers, leveraging Shor’s algorithm, have the theoretical capability to efficiently solve problems that are currently infeasible for classical computers, such as factoring large numbers and computing discrete logarithms—both fundamental to ECC.
If a sufficiently powerful quantum computer is developed, it could potentially derive private keys from public keys, compromising the security of Bitcoin addresses.
Quantum computing isn’t an immediate threat to Bitcoin but a serious long-term concern. Bitcoin’s current security model depends on elliptic curve cryptography, which could be broken if quantum computers become powerful enough to solve the discrete logarithm problem using algorithms like Shor’s.
This risk primarily applies to older wallets with exposed or reused public keys. As of 2025, quantum computers haven’t yet reached that level of capability — but progress is ongoing, especially with developments like IBM’s Willow architecture.
Notably, Satoshi Nakamoto, the pseudonymous creator of Bitcoin, is believed to possess over 1 million BTC. These coins have remained untouched for years.
If quantum computing advances to the point where Satoshi’s private keys can be derived from the associated public keys, it could lead to significant market upheaval, loss of confidence in Bitcoin’s security, and potential financial losses.
The history of quantum computing threats in crypto is closely tied to the development of quantum algorithms that could compromise traditional cryptographic systems. Here’s a concise overview:
Post-Quantum Cryptography (PQC) refers to cryptographic algorithms that are secure against both classical and quantum attacks. These algorithms are often based on hard mathematical problems unrelated to factoring or discrete logarithms, which quantum computers target.
Common PQC approaches include:
The broader crypto industry is also investing in crypto quantum resistance, looking for ways to retrofit existing chains or migrate to quantum-hardened structures.
A soft fork would be more practical than a hard fork, which risks network splits and broader disruption. However, how such an upgrade would be designed, tested, and deployed remains hypothetical.
Some proposals suggest Bitcoin could be upgraded via a soft fork to support quantum-resistant signature schemes such as:
To minimize risk, developers advocate for hybrid signature schemes — combining classical and post-quantum signatures — until PQC is proven secure and practical under real-world conditions.
Quantum resistance is viewed as a long-term issue, and it has yet to become a focused priority in Bitcoin’s development roadmap.
Transitioning Bitcoin to quantum-resistant cryptography isn’t straightforward:
Project Eleven’s Q-Day Prize is a proactive measure to assess and address the potential risks quantum computing poses to Bitcoin. The initiative aims to catalyze the development and adoption of quantum-resistant cryptographic solutions by incentivizing real-world demonstrations of quantum vulnerabilities, ensuring long-term security and integrity of blockchain technologies.
Bitcoin’s quantum defense is no longer a theoretical discussion — it’s a necessity for long-term survival. While large-scale quantum computers are not yet available, preparing today ensures that the Bitcoin network remains robust and trustworthy tomorrow.
The path forward involves proactive research, community consensus, and careful implementation of quantum-safe cryptographic tools. By embracing post-quantum cryptography, Bitcoin can uphold its promise of being a secure, decentralized store of value in an era dominated by quantum computation.
ECC’s security relies on the difficulty of the elliptic curve discrete logarithm problem, which quantum computers can solve efficiently using Shor’s algorithm. This makes ECC more susceptible to quantum attacks compared to some other cryptographic schemes, necessitating the transition to quantum-resistant alternatives. For now, users can protect themselves by not reusing Bitcoin addresses, since unrevealed public keys are harder to attack. Keeping coins in cold storage or multisig wallets adds extra security. In the long term, users should upgrade wallets and software when post-quantum versions are released. Post-Quantum Cryptography (PQC) encompasses cryptographic algorithms designed to be secure against the capabilities of quantum computers. These algorithms are based on mathematical problems believed to be resistant to quantum attacks, such as lattice-based, hash-based, and multivariate polynomial equations. Why is ECC particularly vulnerable to quantum computing attacks?
How can everyday Bitcoin users prepare for quantum threats?
What is post-quantum cryptography, and how does it address quantum threats?