This BIP Proposal is an alternative to QRAMP or a quantum winner-takes-all 
approach to the migration from a pre- to post quantum blockchain. It could be 
implemented as a hard fork OR as a consensus that quantum actors can 
legitimately move funds to safe addresses for protective custody and public 
good. It could even go forward with no consensuses at all since it is 
functionally equivalent to a quantum winner-takes-all at the protocol level.

BIP: TBD
Title: Quantum Secure Asset Verification & Escrow (QSAVE)
Author: James Tagg
Status: Draft
Type: Standards Track
Layer: Consensus (Consensus / Soft Fork / Hard Fork)
Created:
License:

Abstract

This BIP proposes QSAVE (Quantum Secure Asset Verification & Escrow) - a 
non-sovereign wealth fund providing protective custody for Bitcoin vulnerable 
to quantum attack (see Appendix for detailed vulnerability assessment). QSAVE 
preserves 100% of the principal for rightful owners while using generated 
returns to fund the protocol and global public good. It provides an alternative 
to the QRAMP (Quantum Resistant Asset Migration Protocol) proposal (which makes 
coins unspendable) or taking no action (which allows quantum appropriation, 
which many view as theft). This proposal addresses coins that are dormant but 
acknowledges there may be coins that have quantum watermarks but have not 
migrated to quantum addresses. A separate BIP proposal will address this case.

Motivation

Chain analysis reveals 3.5-5.5 million Bitcoin (~17-28% of circulating supply) 
have exposed public keys vulnerable to quantum attack (see Appendix: Quantum 
Vulnerability Assessment for detailed breakdown).

With sufficient education and proactive migration, a significant portion of the 
2-4M BTC in reused addresses could be moved to quantum-safe addresses before 
the threat materializes. Modern wallets are increasingly implementing best 
practices such as always sending change to fresh addresses. However, some 
portion will inevitably remain unprotected when quantum computers arrive due to:

- Owners who don't follow Bitcoin news
- Forgotten wallets discovered years later
- Cold storage assumed long term safe
- Users who die and whose heirs have yet to uncover the keys
- Users who procrastinate or underestimate the threat

When quantum computers capable of running Shor's algorithm arrive, the 
remaining vulnerable coins face two equally problematic outcomes:

1. Quantum appropriation: First actors with quantum computers take the coins
2. Forced burning: The community burns coins preventatively (by making them 
unspendable), breaking Bitcoin's promise as a store of value

This BIP proposes a third way: QSAVE - protective custody that preserves 
ownership rights and puts dormant capital to work for humanity.

Note on "Theft": Bitcoin's protocol operates purely through cryptographic 
proofs, without built-in concepts of ownership or theft—these are legal 
constructs that vary by jurisdiction. The community holds divergent views: some 
consider using advanced technology to derive private keys as legitimate within 
Bitcoin's rules, while others view it as unethical appropriation of others' 
funds.

QSAVE addresses both perspectives: If quantum key derivation is considered fair 
game, then racing to secure vulnerable coins before malicious actors is simply 
good-faith participation in the system. If it's deemed unethical, then the 
community needs a consensus solution that balances property rights with 
Bitcoin's algorithmic nature. Either way, protective custody preserves coins 
for their rightful owners rather than allowing them to be stolen or destroyed.

The Inheritance Vulnerability Window

Consider the "Auntie Alice's Bitcoin" scenario: Alice stores Bitcoin in cold 
storage as inheritance for her grandchildren, with keys secured in a safe 
deposit box. She doesn't follow Bitcoin news and remains unaware of quantum 
threats. She passes away and by the time her heirs discover the wallet, quantum 
computers capable of deriving private keys have emerged.

Three outcomes are possible:

1. Without protection: Quantum actors take the grandchildren's inheritance
2. With burning: The network destroys legitimate inheritance funds
3. With protective custody: Heirs can claim their inheritance with proper 
evidence (will, keys, proof of box opening)

This illustrates why we cannot assume dormant equals lost and why protective 
custody is the only approach that preserves legitimate ownership rights. The 
inability to distinguish between lost coins and stored coins is the fundamental 
reason protective custody is essential.

Principles

1. Preserve the principal - 100% of recovered Bitcoin remains available for 
rightful owners to reclaim at any time
2. Ensure long-term store of value by avoiding any pre-emptive burn (making 
coins unspendable)
3. Avoid market shocks by keeping principal locked while only using generated 
returns
4. Generate returns for the benefit of humanity through conservative yield 
strategies
5. Protect the Chain, ensuring smooth transition to post-quantum era
6. Enable priority recovery through quantum watermark system

Recovery Process

Recovery Timing Matrix

| Scenario                  | Timing                        | Method            
        | Requirements               |
|---------------------------|-------------------------------|---------------------------|----------------------------|
| M-Day (Migration Day)     | Pre-Q-Day with Hard Fork      | Consensus-based 
migration | Hard fork implementation   |
| Q-Day (Quantum Day)       | When quantum computers arrive | White-hat 
recovery race   | No protocol changes needed |
| Emergency Cut-over        | Catastrophic quantum break    | Parallel chain 
migration  | Rapid consensus response   |
| Overlapping M/Q-Day       | Both processes active         | Concurrent 
migrations     | Mempool competition        |

Recovery Protocol

All recovery transactions follow the same pattern:

1. Move vulnerable coins to protective custody addresses
2. Leave OP_RETURN notification on original address with recovery information
3. Prioritize by dormant period and value at risk
4. Quantum watermarks permit immediate return of funds

Consensus Layer

Implementation varies based on timing and consensus level (see Recovery Timing 
Matrix above):

No Action: PQP (Post Quantum Pay) wallet technology - purely commercial/user 
layer

Consensus: Community endorsement strengthens legal position for white-hat 
recovery

Soft Fork: Taproot V2/BIP-360 enables voluntary migration (doesn't protect 
dormant accounts)

Hard Fork: Required for pre-Q-Day recovery or emergency cut-over scenarios

Implementation Timeline

Phase 0: Launch - Live from Day One
- DAO Governance: Active voting on proposals from day one
- Initial Publication: Non-Sovereign Wealth Fund Proposal Discussion

Phase 1: Consensus Building & Infrastructure (Months 1-6)
- Community discussion and refinement (while QD3 registrations continue)
- Technical specification development for advanced features
- Technical specification for backup chain
- Legal framework establishment with states
- Coordination with regulatory bodies for good-faith protections
- Signing the main quantum computer makers to the recovery principles
- Begin backup chain development using post-quantum signature schemes (e.g., 
FIPS 204 ML-DSA)

Phase 2: Enhanced Infrastructure (Months 7-12)
- Smart contract deployment for fund management
- Advanced governance system implementation
- Claim verification protocol enhancements
- Complete backup chain synchronization and cut over process
- Multi-signature protective custody addresses pre-established

Phase 3: Recovery Preparation (Months 13-18)
- Public notification system deployment
- Recovery transaction staging
- Security audits of all systems
- Publish recovery chain software
- Public notice period initiation (6 months before recovery)
  - Broadcast intent to recover specific UTXOs
  - Allow time for unregistered owners to move coins or register claims
  - Publish recovery transactions in mempool but not mine

Phase 4: Active Recovery (Month 19+)
- Execute recovery per Recovery Timing Matrix
- Use Recovery Protocol for all transactions
- Manage protective custody with multi-signature addresses
- Process ownership claims per Claim Verification Protocol
- Initiate fund operations per Fund Architecture

Proposed Fund Architecture

+-----------------------------------------+
|          Recovered Bitcoin              |
|      (Principal - 100% Preserved)       |
+-----------------------------------------+
                 |
                 v
+-----------------------------------------+
|        Conservative Strategies          |
|        (3-5% Annual Return)             |
|     * Lightning Network Liquidity       |
|     * DeFi Lending Protocols            |
|     * Bitcoin-backed Stablecoins        |
+-----------------------------------------+
                 |
                 v
+-----------------------------------------+
|         Interest Distribution           |
|         (Public Good Only)              |
|     * Open Source Development           |
|     * Quantum Security Research         |
|     * Global Infrastructure             |
|     * AI Safety & Alignment             |
+-----------------------------------------+

Claim Verification Protocol

Original owners can reclaim their coins at ANY time by providing:

Prior to Break (Q-Day):
1. Cryptographic Proof: Message signed with their key
2. Optional Supporting Evidence: Transaction history, temporal patterns if 
there is any doubt/dispute on Q-Day date

Post Break:
1. Identity Verification: Since quantum computers will create publicly 
available databases of all exposed private keys (similar to existing databases 
of classically compromised keys), possession of the private key alone is 
insufficient.
2. Required Evidence:
   - government-issued identification
   - Historical transaction knowledge
   - Temporal pattern matching
   - Social recovery attestations

This approach recognizes that post-quantum, private key possession becomes 
meaningless as proof of ownership since quantum-derived key databases will be 
publicly available.

Three-tier Evidence Hierarchy

The claim verification process employs a three-tier evidence hierarchy to 
evaluate ownership claims with staking and slashing to prevent fraud and 
partial time based awards in case of partial proof. Evidence strength:

- Tier 1: Cryptographic proofs with verifiable pre-break timestamps (signatures 
in pre-quantum blocks and similar immutable records)
- Tier 2: Third-party records (exchange logs, bankruptcy filings, probate 
rulings, trustee statements)
- Tier 3: Supporting materials (affidavits, chain-of-inheritance, media 
coverage, witness declarations)

Governance Structure

The QSAVE fund requires robust decentralized governance to ensure proper 
stewardship of recovered assets. The governance framework must balance 
efficiency with decentralization while maintaining absolute commitment to 
principal preservation.

Core Governance Principles:
- Quadratic Voting: Reduces influence of large stakeholders while maintaining 
democratic participation
- Multi-Council Structure: Separates technical, allocation, and audit functions 
to prevent capture
- Constraints: Only generated returns may be allocated (per principle #1)
- Emergency Procedures: Supermajority (75%) required for emergency actions; 
freeze of recovery process can be executed by authorized individuals until 
quarum can be established.

Governance Bodies:
- Technical Council: Oversees security, recovery operations, and technical 
infrastructure
- Allocation Council: Manages distribution of generated returns to for the 
public good thru charitable donation, impact investing or research funding.
- Audit Council: Provides independent oversight and transparency reporting

Safeguards:
- Staggered terms to ensure continuity
- Public transparency of all decisions
- Time-locked implementations for non-emergency changes
- Immutable smart contracts for principal preservation

Rationale

The QSAVE protocol represents the optimal technical implementation for 
addressing quantum vulnerability. Unlike binary approaches (burn or allow 
appropriation), QSAVE introduces a third path that aligns with Bitcoin's core 
principles while solving practical challenges.

Technical Neutrality

QSAVE maintains implementation flexibility:
- Fork-neutral: Works with or without protocol changes (see Recovery Timing 
Matrix)
- Price-neutral: Markets have already priced quantum risk (per BlackRock ETF 
disclosures)
- Liquidity-neutral: Principal preservation prevents market disruption

Implementation Advantages
- Transparent Operations: All movements follow Recovery Protocol
- Decentralized Governance: See Governance Structure section
- Auditable Recovery: See Claim Verification Protocol
- Progressive Deployment: Phase 0 operational from day one

Risk Mitigation

The protocol addresses key operational risks:
- Race Condition Risk: Pre-positioned infrastructure for rapid Q-Day response
- Legal Clarity: Aligns with established lost & found precedents
- Governance Capture: Quadratic voting and mandatory principal preservation 
constraints
- Technical Failure: Backup chain with post-quantum signatures ensures 
continuity

Legal Framework Considerations

The recovery process aligns with established legal principles in many 
jurisdictions. Under precedents like People v. Jennings (NY 1986), temporary 
custody without intent to permanently deprive does not constitute larceny. This 
is analogous to moving lost property to a lost & found — a universally accepted 
practice despite technically involving "taking without permission."

In the United States alone, over 400 million items are moved to lost & found 
departments annually without legal consequence. QSAVE applies this same 
principle to digital assets vulnerable to quantum attack, providing a 
protective custody mechanism that preserves ownership rights.

Furthermore, the U.S. Department of Justice's policy on good-faith security 
research provides additional legal clarity for recovery operators acting to 
protect vulnerable assets from quantum threats.

Legal clarification and Jurisdiction choices need to be made.

The Sovereign Law Paradox

Without protective frameworks, law-abiding states face a critical disadvantage. 
Bad actors operating from jurisdictions with weak or non-existent 
cryptocurrency regulations can exploit quantum vulnerabilities with impunity, 
while good-faith actors in law-compliant states remain paralyzed by legal 
uncertainty. This creates a systematic wealth transfer from citizens of 
law-abiding nations to criminal organizations and rogue states. The strongest 
property laws paradoxically create the weakest defense against quantum theft. 
Jurisdictions are developing good faith exemptions to their computer security 
laws and these will need to accelerate.

Economic Impact

Positive Effects
- Removes quantum uncertainty from Bitcoin price
- Funds public good without inflation or taxation (see Fund Architecture)
- Preserves Bitcoin's fixed supply economics (Principle #1)
- Creates new model for decentralized capital allocation

Neutral Effects
- No net change in circulating supply (coins preserved, not spent)
- Market has already priced in quantum risk per BlackRock ETF terms
- Interest generation creates minimal selling pressure

Appendix: Quantum Vulnerability

Vulnerable Address Categories

| Category              | Address Type     | Key Status | Quantum Vulnerable | 
Est. BTC (M) | Recovery Priority | Notes                              |
|-----------------------|------------------|------------|--------------------|--------------|-------------------|------------------------------------|
| P2PK Outputs          | P2PK             | Various    | Yes                | 
1.9-2.0      | Critical          | Directly exposed public keys       |
| Taproot (All)         | P2TR             | Various    | Yes                | 
0.5-1        | Critical          | ALL Taproot addresses exposed      |
| Reused P2PKH (spent)  | P2PKH            | Various    | Yes                | 
2-4          | High              | Spent = pubkey revealed            |
| Reused P2WPKH (spent) | P2WPKH           | Various    | Yes                | 
~0.5-1       | High              | Modern but still vulnerable        |
| Unused P2PKH          | P2PKH            | Various    | No                 | 
6-8          | Protected         | Hash only; quantum-safe            |
| Unused P2WPKH         | P2WPKH           | Various    | No                 | 
4-6          | Protected         | Modern safe until spent            |
| Script Hash           | P2SH/P2WSH       | Various    | Mostly No          | 
3-4          | Protected         | Generally safe (depends on script) |
| Total Vulnerable      |                  |            | Yes                | 
3.5-5.5M     |                   | 17-28% of supply                   |

Quantum Risk

There is a lack of consensus on the timeline for the quantum threat other than 
it appears to be accelerating:

Expert Consensus:
- Conservative estimates (NIST IR 8413): 2035-2050
- Aggressive projections: 2027-2035
- Industry leaders (including Brock Pierce at Tokenize 2025): "Yes, quantum was 
20 years away until recently. It's likely this decade. Most people are now 
pinpointing it at 2027. I think that's early, but there's some bright minds 
working on it."

Recent Technical Advances:
- Google's 2025 research: Demonstrated that 2048-bit RSA encryption could 
theoretically be broken by a quantum computer with 1 million noisy qubits 
running for one week (20-fold decrease from previous estimate)
- Jensen Huang (NVIDIA CEO): Shifted to optimistic stance, stating quantum 
computing is "reaching an inflection point" and we're "within reach of being 
able to apply quantum computing" to solve problems "in the coming years"

Regulatory Requirements:
- U.S. National Security Systems must use quantum-resistant algorithms for new 
acquisitions after January 1, 2027 (NSA CNSA 2.0)
- Given 1-5 year government procurement cycles, blockchain proposals today must 
be quantum-proof

References

1. NIST IR 8413 - "Status Report on the Third Round of the NIST Post-Quantum 
Cryptography Standardization Process", July 2022.
   https://doi.org/10.6028/NIST.IR.8413

2. NSA CNSA 2.0 - "Commercial National Security Algorithm Suite 2.0 FAQ", 
September 7, 2022.
   
https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF

3. Google Quantum AI - "Quantum Advantage in Error Correction", Nature, 2025.
   Demonstrated 99.85% reduction in required quantum resources.

4. Jensen Huang - "Nvidia CEO says quantum computing is at an inflection 
point", Channel News Asia, June 11, 2025.
   
https://www.channelnewsasia.com/business/nvidia-ceo-says-quantum-computing-inflection-point-5174861

5. Global Risk Institute - "Quantum Threat Timeline 2025: Executive 
Perspectives on Barriers to Action", 2025.
   
https://globalriskinstitute.org/publication/quantum-threat-timeline-2025-executive-perspectives-on-barriers-to-action/

6. Brock Pierce - "Million Dollar Bitcoin CONFIRMED! Brock Pierce & Michael 
Terpin Drop BOMBS at Tokenize! 2025." YouTube, timestamp 18:10.
   https://www.youtube.com/watch?v=DhYO1Jxmano

7. Satoshi Nakamoto - BitcoinTalk Forum post, 2010. "If it happens gradually, 
we can transition to something stronger."
   https://bitcointalk.org/index.php?topic=3120.0

8. FIPS 204 - "Module-Lattice-Based Digital Signature Standard", August 2024.
   Specifies CRYSTALS-Dilithium (ML-DSA).

9. BIP 341 - "Taproot: SegWit version 1 spending rules", January 2020.
   https://github.com/bitcoin/bips/blob/master/bip-0341.mediawiki

10. BlackRock iShares Bitcoin Trust - Prospectus acknowledging quantum 
computing risk to Bitcoin holdings, 2024.

11. Mosca, M. - "Quantum Threat Timeline," University of Waterloo, 2023.
    Estimates 2035-2040 timeline for quantum threats to cryptography.

-- 
You received this message because you are subscribed to the Google Groups 
"Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion visit 
https://groups.google.com/d/msgid/bitcoindev/SN6PR12MB2735280A252DD62231D1320AA523A%40SN6PR12MB2735.namprd12.prod.outlook.com.

Reply via email to