This BIP Proposal is an alternative to QRAMP or a quantum winner-takes-all
approach to the migration from a pre- to post quantum blockchain. It could be
implemented as a hard fork OR as a consensus that quantum actors can
legitimately move funds to safe addresses for protective custody and public
good. It could even go forward with no consensuses at all since it is
functionally equivalent to a quantum winner-takes-all at the protocol level.
BIP: TBD
Title: Quantum Secure Asset Verification & Escrow (QSAVE)
Author: James Tagg
Status: Draft
Type: Standards Track
Layer: Consensus (Consensus / Soft Fork / Hard Fork)
Created:
License:
Abstract
This BIP proposes QSAVE (Quantum Secure Asset Verification & Escrow) - a
non-sovereign wealth fund providing protective custody for Bitcoin vulnerable
to quantum attack (see Appendix for detailed vulnerability assessment). QSAVE
preserves 100% of the principal for rightful owners while using generated
returns to fund the protocol and global public good. It provides an alternative
to the QRAMP (Quantum Resistant Asset Migration Protocol) proposal (which makes
coins unspendable) or taking no action (which allows quantum appropriation,
which many view as theft). This proposal addresses coins that are dormant but
acknowledges there may be coins that have quantum watermarks but have not
migrated to quantum addresses. A separate BIP proposal will address this case.
Motivation
Chain analysis reveals 3.5-5.5 million Bitcoin (~17-28% of circulating supply)
have exposed public keys vulnerable to quantum attack (see Appendix: Quantum
Vulnerability Assessment for detailed breakdown).
With sufficient education and proactive migration, a significant portion of the
2-4M BTC in reused addresses could be moved to quantum-safe addresses before
the threat materializes. Modern wallets are increasingly implementing best
practices such as always sending change to fresh addresses. However, some
portion will inevitably remain unprotected when quantum computers arrive due to:
- Owners who don't follow Bitcoin news
- Forgotten wallets discovered years later
- Cold storage assumed long term safe
- Users who die and whose heirs have yet to uncover the keys
- Users who procrastinate or underestimate the threat
When quantum computers capable of running Shor's algorithm arrive, the
remaining vulnerable coins face two equally problematic outcomes:
1. Quantum appropriation: First actors with quantum computers take the coins
2. Forced burning: The community burns coins preventatively (by making them
unspendable), breaking Bitcoin's promise as a store of value
This BIP proposes a third way: QSAVE - protective custody that preserves
ownership rights and puts dormant capital to work for humanity.
Note on "Theft": Bitcoin's protocol operates purely through cryptographic
proofs, without built-in concepts of ownership or theft—these are legal
constructs that vary by jurisdiction. The community holds divergent views: some
consider using advanced technology to derive private keys as legitimate within
Bitcoin's rules, while others view it as unethical appropriation of others'
funds.
QSAVE addresses both perspectives: If quantum key derivation is considered fair
game, then racing to secure vulnerable coins before malicious actors is simply
good-faith participation in the system. If it's deemed unethical, then the
community needs a consensus solution that balances property rights with
Bitcoin's algorithmic nature. Either way, protective custody preserves coins
for their rightful owners rather than allowing them to be stolen or destroyed.
The Inheritance Vulnerability Window
Consider the "Auntie Alice's Bitcoin" scenario: Alice stores Bitcoin in cold
storage as inheritance for her grandchildren, with keys secured in a safe
deposit box. She doesn't follow Bitcoin news and remains unaware of quantum
threats. She passes away and by the time her heirs discover the wallet, quantum
computers capable of deriving private keys have emerged.
Three outcomes are possible:
1. Without protection: Quantum actors take the grandchildren's inheritance
2. With burning: The network destroys legitimate inheritance funds
3. With protective custody: Heirs can claim their inheritance with proper
evidence (will, keys, proof of box opening)
This illustrates why we cannot assume dormant equals lost and why protective
custody is the only approach that preserves legitimate ownership rights. The
inability to distinguish between lost coins and stored coins is the fundamental
reason protective custody is essential.
Principles
1. Preserve the principal - 100% of recovered Bitcoin remains available for
rightful owners to reclaim at any time
2. Ensure long-term store of value by avoiding any pre-emptive burn (making
coins unspendable)
3. Avoid market shocks by keeping principal locked while only using generated
returns
4. Generate returns for the benefit of humanity through conservative yield
strategies
5. Protect the Chain, ensuring smooth transition to post-quantum era
6. Enable priority recovery through quantum watermark system
Recovery Process
Recovery Timing Matrix
| Scenario | Timing | Method
| Requirements |
|---------------------------|-------------------------------|---------------------------|----------------------------|
| M-Day (Migration Day) | Pre-Q-Day with Hard Fork | Consensus-based
migration | Hard fork implementation |
| Q-Day (Quantum Day) | When quantum computers arrive | White-hat
recovery race | No protocol changes needed |
| Emergency Cut-over | Catastrophic quantum break | Parallel chain
migration | Rapid consensus response |
| Overlapping M/Q-Day | Both processes active | Concurrent
migrations | Mempool competition |
Recovery Protocol
All recovery transactions follow the same pattern:
1. Move vulnerable coins to protective custody addresses
2. Leave OP_RETURN notification on original address with recovery information
3. Prioritize by dormant period and value at risk
4. Quantum watermarks permit immediate return of funds
Consensus Layer
Implementation varies based on timing and consensus level (see Recovery Timing
Matrix above):
No Action: PQP (Post Quantum Pay) wallet technology - purely commercial/user
layer
Consensus: Community endorsement strengthens legal position for white-hat
recovery
Soft Fork: Taproot V2/BIP-360 enables voluntary migration (doesn't protect
dormant accounts)
Hard Fork: Required for pre-Q-Day recovery or emergency cut-over scenarios
Implementation Timeline
Phase 0: Launch - Live from Day One
- DAO Governance: Active voting on proposals from day one
- Initial Publication: Non-Sovereign Wealth Fund Proposal Discussion
Phase 1: Consensus Building & Infrastructure (Months 1-6)
- Community discussion and refinement (while QD3 registrations continue)
- Technical specification development for advanced features
- Technical specification for backup chain
- Legal framework establishment with states
- Coordination with regulatory bodies for good-faith protections
- Signing the main quantum computer makers to the recovery principles
- Begin backup chain development using post-quantum signature schemes (e.g.,
FIPS 204 ML-DSA)
Phase 2: Enhanced Infrastructure (Months 7-12)
- Smart contract deployment for fund management
- Advanced governance system implementation
- Claim verification protocol enhancements
- Complete backup chain synchronization and cut over process
- Multi-signature protective custody addresses pre-established
Phase 3: Recovery Preparation (Months 13-18)
- Public notification system deployment
- Recovery transaction staging
- Security audits of all systems
- Publish recovery chain software
- Public notice period initiation (6 months before recovery)
- Broadcast intent to recover specific UTXOs
- Allow time for unregistered owners to move coins or register claims
- Publish recovery transactions in mempool but not mine
Phase 4: Active Recovery (Month 19+)
- Execute recovery per Recovery Timing Matrix
- Use Recovery Protocol for all transactions
- Manage protective custody with multi-signature addresses
- Process ownership claims per Claim Verification Protocol
- Initiate fund operations per Fund Architecture
Proposed Fund Architecture
+-----------------------------------------+
| Recovered Bitcoin |
| (Principal - 100% Preserved) |
+-----------------------------------------+
|
v
+-----------------------------------------+
| Conservative Strategies |
| (3-5% Annual Return) |
| * Lightning Network Liquidity |
| * DeFi Lending Protocols |
| * Bitcoin-backed Stablecoins |
+-----------------------------------------+
|
v
+-----------------------------------------+
| Interest Distribution |
| (Public Good Only) |
| * Open Source Development |
| * Quantum Security Research |
| * Global Infrastructure |
| * AI Safety & Alignment |
+-----------------------------------------+
Claim Verification Protocol
Original owners can reclaim their coins at ANY time by providing:
Prior to Break (Q-Day):
1. Cryptographic Proof: Message signed with their key
2. Optional Supporting Evidence: Transaction history, temporal patterns if
there is any doubt/dispute on Q-Day date
Post Break:
1. Identity Verification: Since quantum computers will create publicly
available databases of all exposed private keys (similar to existing databases
of classically compromised keys), possession of the private key alone is
insufficient.
2. Required Evidence:
- government-issued identification
- Historical transaction knowledge
- Temporal pattern matching
- Social recovery attestations
This approach recognizes that post-quantum, private key possession becomes
meaningless as proof of ownership since quantum-derived key databases will be
publicly available.
Three-tier Evidence Hierarchy
The claim verification process employs a three-tier evidence hierarchy to
evaluate ownership claims with staking and slashing to prevent fraud and
partial time based awards in case of partial proof. Evidence strength:
- Tier 1: Cryptographic proofs with verifiable pre-break timestamps (signatures
in pre-quantum blocks and similar immutable records)
- Tier 2: Third-party records (exchange logs, bankruptcy filings, probate
rulings, trustee statements)
- Tier 3: Supporting materials (affidavits, chain-of-inheritance, media
coverage, witness declarations)
Governance Structure
The QSAVE fund requires robust decentralized governance to ensure proper
stewardship of recovered assets. The governance framework must balance
efficiency with decentralization while maintaining absolute commitment to
principal preservation.
Core Governance Principles:
- Quadratic Voting: Reduces influence of large stakeholders while maintaining
democratic participation
- Multi-Council Structure: Separates technical, allocation, and audit functions
to prevent capture
- Constraints: Only generated returns may be allocated (per principle #1)
- Emergency Procedures: Supermajority (75%) required for emergency actions;
freeze of recovery process can be executed by authorized individuals until
quarum can be established.
Governance Bodies:
- Technical Council: Oversees security, recovery operations, and technical
infrastructure
- Allocation Council: Manages distribution of generated returns to for the
public good thru charitable donation, impact investing or research funding.
- Audit Council: Provides independent oversight and transparency reporting
Safeguards:
- Staggered terms to ensure continuity
- Public transparency of all decisions
- Time-locked implementations for non-emergency changes
- Immutable smart contracts for principal preservation
Rationale
The QSAVE protocol represents the optimal technical implementation for
addressing quantum vulnerability. Unlike binary approaches (burn or allow
appropriation), QSAVE introduces a third path that aligns with Bitcoin's core
principles while solving practical challenges.
Technical Neutrality
QSAVE maintains implementation flexibility:
- Fork-neutral: Works with or without protocol changes (see Recovery Timing
Matrix)
- Price-neutral: Markets have already priced quantum risk (per BlackRock ETF
disclosures)
- Liquidity-neutral: Principal preservation prevents market disruption
Implementation Advantages
- Transparent Operations: All movements follow Recovery Protocol
- Decentralized Governance: See Governance Structure section
- Auditable Recovery: See Claim Verification Protocol
- Progressive Deployment: Phase 0 operational from day one
Risk Mitigation
The protocol addresses key operational risks:
- Race Condition Risk: Pre-positioned infrastructure for rapid Q-Day response
- Legal Clarity: Aligns with established lost & found precedents
- Governance Capture: Quadratic voting and mandatory principal preservation
constraints
- Technical Failure: Backup chain with post-quantum signatures ensures
continuity
Legal Framework Considerations
The recovery process aligns with established legal principles in many
jurisdictions. Under precedents like People v. Jennings (NY 1986), temporary
custody without intent to permanently deprive does not constitute larceny. This
is analogous to moving lost property to a lost & found — a universally accepted
practice despite technically involving "taking without permission."
In the United States alone, over 400 million items are moved to lost & found
departments annually without legal consequence. QSAVE applies this same
principle to digital assets vulnerable to quantum attack, providing a
protective custody mechanism that preserves ownership rights.
Furthermore, the U.S. Department of Justice's policy on good-faith security
research provides additional legal clarity for recovery operators acting to
protect vulnerable assets from quantum threats.
Legal clarification and Jurisdiction choices need to be made.
The Sovereign Law Paradox
Without protective frameworks, law-abiding states face a critical disadvantage.
Bad actors operating from jurisdictions with weak or non-existent
cryptocurrency regulations can exploit quantum vulnerabilities with impunity,
while good-faith actors in law-compliant states remain paralyzed by legal
uncertainty. This creates a systematic wealth transfer from citizens of
law-abiding nations to criminal organizations and rogue states. The strongest
property laws paradoxically create the weakest defense against quantum theft.
Jurisdictions are developing good faith exemptions to their computer security
laws and these will need to accelerate.
Economic Impact
Positive Effects
- Removes quantum uncertainty from Bitcoin price
- Funds public good without inflation or taxation (see Fund Architecture)
- Preserves Bitcoin's fixed supply economics (Principle #1)
- Creates new model for decentralized capital allocation
Neutral Effects
- No net change in circulating supply (coins preserved, not spent)
- Market has already priced in quantum risk per BlackRock ETF terms
- Interest generation creates minimal selling pressure
Appendix: Quantum Vulnerability
Vulnerable Address Categories
| Category | Address Type | Key Status | Quantum Vulnerable |
Est. BTC (M) | Recovery Priority | Notes |
|-----------------------|------------------|------------|--------------------|--------------|-------------------|------------------------------------|
| P2PK Outputs | P2PK | Various | Yes |
1.9-2.0 | Critical | Directly exposed public keys |
| Taproot (All) | P2TR | Various | Yes |
0.5-1 | Critical | ALL Taproot addresses exposed |
| Reused P2PKH (spent) | P2PKH | Various | Yes |
2-4 | High | Spent = pubkey revealed |
| Reused P2WPKH (spent) | P2WPKH | Various | Yes |
~0.5-1 | High | Modern but still vulnerable |
| Unused P2PKH | P2PKH | Various | No |
6-8 | Protected | Hash only; quantum-safe |
| Unused P2WPKH | P2WPKH | Various | No |
4-6 | Protected | Modern safe until spent |
| Script Hash | P2SH/P2WSH | Various | Mostly No |
3-4 | Protected | Generally safe (depends on script) |
| Total Vulnerable | | | Yes |
3.5-5.5M | | 17-28% of supply |
Quantum Risk
There is a lack of consensus on the timeline for the quantum threat other than
it appears to be accelerating:
Expert Consensus:
- Conservative estimates (NIST IR 8413): 2035-2050
- Aggressive projections: 2027-2035
- Industry leaders (including Brock Pierce at Tokenize 2025): "Yes, quantum was
20 years away until recently. It's likely this decade. Most people are now
pinpointing it at 2027. I think that's early, but there's some bright minds
working on it."
Recent Technical Advances:
- Google's 2025 research: Demonstrated that 2048-bit RSA encryption could
theoretically be broken by a quantum computer with 1 million noisy qubits
running for one week (20-fold decrease from previous estimate)
- Jensen Huang (NVIDIA CEO): Shifted to optimistic stance, stating quantum
computing is "reaching an inflection point" and we're "within reach of being
able to apply quantum computing" to solve problems "in the coming years"
Regulatory Requirements:
- U.S. National Security Systems must use quantum-resistant algorithms for new
acquisitions after January 1, 2027 (NSA CNSA 2.0)
- Given 1-5 year government procurement cycles, blockchain proposals today must
be quantum-proof
References
1. NIST IR 8413 - "Status Report on the Third Round of the NIST Post-Quantum
Cryptography Standardization Process", July 2022.
https://doi.org/10.6028/NIST.IR.8413
2. NSA CNSA 2.0 - "Commercial National Security Algorithm Suite 2.0 FAQ",
September 7, 2022.
https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF
3. Google Quantum AI - "Quantum Advantage in Error Correction", Nature, 2025.
Demonstrated 99.85% reduction in required quantum resources.
4. Jensen Huang - "Nvidia CEO says quantum computing is at an inflection
point", Channel News Asia, June 11, 2025.
https://www.channelnewsasia.com/business/nvidia-ceo-says-quantum-computing-inflection-point-5174861
5. Global Risk Institute - "Quantum Threat Timeline 2025: Executive
Perspectives on Barriers to Action", 2025.
https://globalriskinstitute.org/publication/quantum-threat-timeline-2025-executive-perspectives-on-barriers-to-action/
6. Brock Pierce - "Million Dollar Bitcoin CONFIRMED! Brock Pierce & Michael
Terpin Drop BOMBS at Tokenize! 2025." YouTube, timestamp 18:10.
https://www.youtube.com/watch?v=DhYO1Jxmano
7. Satoshi Nakamoto - BitcoinTalk Forum post, 2010. "If it happens gradually,
we can transition to something stronger."
https://bitcointalk.org/index.php?topic=3120.0
8. FIPS 204 - "Module-Lattice-Based Digital Signature Standard", August 2024.
Specifies CRYSTALS-Dilithium (ML-DSA).
9. BIP 341 - "Taproot: SegWit version 1 spending rules", January 2020.
https://github.com/bitcoin/bips/blob/master/bip-0341.mediawiki
10. BlackRock iShares Bitcoin Trust - Prospectus acknowledging quantum
computing risk to Bitcoin holdings, 2024.
11. Mosca, M. - "Quantum Threat Timeline," University of Waterloo, 2023.
Estimates 2035-2040 timeline for quantum threats to cryptography.
--
You received this message because you are subscribed to the Google Groups
"Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion visit
https://groups.google.com/d/msgid/bitcoindev/SN6PR12MB2735280A252DD62231D1320AA523A%40SN6PR12MB2735.namprd12.prod.outlook.com.