Ethereum isn’t waiting for quantum computers to become a problem before figuring out how to survive them.
The Ethereum Foundation launched pq.ethereum.org on Wednesday, a resource center dedicated to the protocol’s post-quantum security effort. The site consolidates a roadmap, open source repositories, specifications, research articles, EIPs, and 14-question FAQs written by EF’s post-quantum team.
More than 10 customer teams are already building and shipping devnets weekly through what the foundation calls PQ Interop, the foundation said in an X post earlier Wednesday.
Today, several EF teams are launching a resource dedicated to Ethereum’s post-quantum security effort.
What started with initial research on STARK-based signature aggregation in 2018 has grown into a coordinated multi-team effort, all open source.…
– Ethereum Foundation (@ethereumfndn) March 24, 2026
The technical challenge is substantial. It is widely believed that quantum computers will eventually break the public key cryptography that ensures ownership, authentication and consensus on Ethereum.
The EF’s position is that a cryptographically relevant quantum computer is not imminent, but migrating to a decentralized global protocol requires years of coordination, engineering, and formal verification.
The migration touches every layer of the protocol.
At the execution layer, post-quantum signature verification via vector mathematical precompilation would allow users to transition to quantum-secure authentication via account abstraction without a disruptive “flag day” where everyone has to update simultaneously.
At the consensus layer, the current BLS validator signing scheme is replaced with hash-based signatures called leanXMSS, with a minimal zk-based VM handling aggregation to restore scalability as post-quantum signatures are larger.
At the data layer, post-quantum cryptography extends to handling blobs for data availability.
This connects directly to the straw map snippet from earlier this month, where Ethereum co-creator Vitalik Buterin called the document “very important” and discussed finality improvements. The post-quantum push stood out then because it treated quantum threats as a concrete engineering problem with specific branching targets rather than a hypothetical problem.
While quantum computing represents a category of threat that attacks cryptographic foundations rather than physical infrastructure, protocols that are prepared as soon as possible will be the most resilient when such a system finally materializes.




