Ethereum is not waiting for quantum computers to become a problem before they figure out how to survive them.
The Ethereum Foundation on Wednesday launched pq.ethereum.org, a dedicated resource center for the protocol’s post-quantum security efforts. The site consolidates a roadmap, open source repositories, specifications, research papers, EIPs and a 14-question FAQ written by the EC’s post-quantum team.
More than 10 customer teams are already building and shipping equipment weekly through what the foundation calls PQ Interop, the foundation said in an X filing earlier Wednesday.
Today, multiple teams at EF are launching a dedicated resource for Ethereum’s post-quantum security efforts.
What started with early STARK-based signature aggregation research in 2018 has grown into a coordinated, multi-team effort, all open source…
— Ethereum Foundation (@ethereumfndn) March 24, 2026
The technical challenge is great. It is believed that quantum computers will eventually break the public key cryptography that ensures ownership, authentication and consensus across Ethereum.
The EC’s position is that a cryptographically relevant quantum computer is not imminent, but that migrating a decentralized global protocol takes years of coordination, construction and formal verification.
The migration affects every layer of the protocol.
At the execution layer, post-quantum signature verification through a vector math precompile would let users transition to quantum-safe authentication through account abstraction without a disruptive “flag day” where everyone has to upgrade simultaneously.
At the consensus layer, the current BLS validation signature scheme is replaced with hash-based signatures called leanXMSS, with minimal zk-based virtual machine management aggregation to restore scalability as post-quantum signatures are larger.
At the data layer, post-quantum cryptography extends to blob handling for data availability.
This connects directly to the straw map from earlier this month, where Ethereum co-creator Vitalik Buterin called the document “very important” and walked through the final improvements. The post-quantum push stood out because it treated quantum threats as a concrete engineering problem with specific fork targets rather than a hypothetical one.
While quantum computing represents a threat category that attacks the cryptographic foundation rather than the physical infrastructure, the protocols that prepare the earliest will be the most resilient when such a system eventually becomes a reality.



