Assessing the Impact of Post-Quantum Digital Signature Algorithms on Blockchains
By: Alison Gonçalves Schemitt , Henrique Fan da Silva , Roben Castagna Lunardi and more
Potential Business Impact:
Secures online money from future super-computers.
The advent of quantum computing threatens the security of traditional encryption algorithms, motivating the development of post-quantum cryptography (PQC). In 2024, the National Institute of Standards and Technology (NIST) standardized several PQC algorithms, marking an important milestone in the transition toward quantum-resistant security. Blockchain systems fundamentally rely on cryptographic primitives to guarantee data integrity and transaction authenticity. However, widely used algorithms such as ECDSA, employed in Bitcoin, Ethereum, and other networks, are vulnerable to quantum attacks. Although adopting PQC is essential for long-term security, its computational overhead in blockchain environments remains largely unexplored. In this work, we propose a methodology for benchmarking both PQC and traditional cryptographic algorithms in blockchain contexts. We measure signature generation and verification times across diverse computational environments and simulate their impact at scale. Our evaluation focuses on PQC digital signature schemes (ML-DSA, Dilithium, Falcon, Mayo, SLH-DSA, SPHINCS+, and Cross) across security levels 1 to 5, comparing them to ECDSA, the current standard in Bitcoin and Ethereum. Our results indicate that PQC algorithms introduce only minor performance overhead at security level 1, while in some scenarios they significantly outperform ECDSA at higher security levels. For instance, ML-DSA achieves a verification time of 0.14 ms on an ARM-based laptop at level 5, compared to 0.88 ms for ECDSA. We also provide an open-source implementation to ensure reproducibility and encourage further research.
Similar Papers
Post-Quantum Blockchain: Challenges and Opportunities
Cryptography and Security
Protects online money ledgers from future computer attacks.
Analysis of Post-Quantum Cryptography in User Equipment in 5G and Beyond
Cryptography and Security
Makes phones safe from future computer attacks.
Performance Analysis and Deployment Considerations of Post-Quantum Cryptography for Consumer Electronics
Cryptography and Security
Makes phones and gadgets safe from future computer hacks.