Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 30+ AI models, with 0% extra fees
Solana Post-Launch Quantum Roadmap: Falcon Becomes the Core Signature Scheme, Quantum Security Race Officially Begins
On April 27, 2026, the Solana Foundation officially released a comprehensive roadmap addressing the threat of quantum computing. The core message is clear and concise: two independent validator client teams—Anza and Firedancer under Jump Crypto—after their respective research, have simultaneously focused on the same post-quantum signature scheme—Falcon. Both teams have published initial implementations of Falcon on GitHub, marking Solana’s transition from theoretical exploration to practical engineering deployment.
This is not an isolated industry event. Just a month prior, Google Quantum AI, in collaboration with Ethereum Foundation researchers and Stanford University professors, released a white paper that shook the industry by drastically reducing the estimated number of physical qubits needed to break Bitcoin’s 256-bit elliptic curve cryptography—by about 20 times—from previous academic estimates—down to fewer than 500k qubits. The timeline for quantum threats is accelerating, and the Falcon route chosen by Solana happens to be at the very center of this discussion.
Understanding why Falcon was selected, how it balances security and performance technically, and what this upgrade means for the entire crypto industry are the core questions this article aims to answer.
Two Independent Paths Converge at Falcon
The roadmap released by the Solana Foundation includes a point that industry observers have called a “rare consensus”: two independent development teams—Anza and Firedancer—evaluated and researched post-quantum signature schemes separately, without prior coordination, and both ultimately converged on Falcon.
Anza is a development team composed of former Solana Labs core engineers, responsible for maintaining the Solana mainnet client, Agave; Firedancer, developed by Jump Crypto, is one of the most performant validator clients on the Solana network. Together, these two teams represent the majority of staked tokens on Solana, and their technical consensus carries significant weight.
Their evaluation logic shows notable overlap: both require signatures to be compact, verification to be efficient, and the scheme to achieve quantum resistance without sacrificing Solana’s current high throughput advantage. Falcon was chosen over other post-quantum schemes approved by NIST because it offers a unique balance across these dimensions.
The roadmap also discloses a phased strategy: Phase 1 continues research and testing of Falcon and alternatives; Phase 2 introduces post-quantum signatures for new wallets once the threat becomes a credible risk; Phase 3 completes full migration of existing wallets. This design balances foresight and practicality—avoiding a full network hard fork before the threat matures, while ensuring engineering preparations are in place.
From Distant Threat to Near-term Concern
Placing Solana’s actions within the broader industry timeline reveals the urgency behind this move.
In November 2025, Algorand Foundation’s protocol team completed the first post-quantum transaction on mainnet using Falcon, providing a proof of concept.
By January 27, 2026, Anza’s GitHub repository had begun Falcon-related work, indicating development was well underway before the public roadmap was announced.
On March 31, 2026, Google Quantum AI published a heavyweight white paper, systematically evaluating the resources needed for quantum computers to break cryptocurrency cryptography. The conclusion was startling: fewer than 500k physical qubits are needed to solve the discrete logarithm problem on 256-bit elliptic curves—within minutes—reducing previous estimates by about 20 times. Google set 2029 as its deadline for migrating to post-quantum cryptography and recommended industry-wide adoption on the same schedule.
On April 15, 2026, Tron announced the launch of its post-quantum upgrade, becoming one of the first mainstream networks to adopt NIST-approved new encryption standards.
Research from Bernstein et al. offers a quantitative investment perspective: Bitcoin and the crypto industry have roughly a 3-5 year window to transition to quantum-safe cryptography, viewing the threat as a “medium- to long-term system upgrade cycle,” not an immediate existential crisis.
In March, Ark Invest’s analysis indicated about 35% of Bitcoin supply is stored at addresses potentially vulnerable to future quantum attacks. Another independent estimate suggests approximately 6.93 million BTC (about 33% of total supply) have public keys exposed on-chain, including roughly 1.7 million from the Satoshi-era P2PK scripts embedded directly in transaction outputs.
The Solana Foundation’s public statement is restrained yet forward-looking, clearly stating that “quantum threats are still years away,” but also emphasizing that “if this threat materializes, Solana’s migration work has been thoroughly researched, understood, and prepared for deployment.” This phrasing indicates the ecosystem is taking a “preparedness rather than panic” approach.
Dissecting Falcon’s System Compatibility
From a technical architecture perspective, Falcon’s selection by Solana is not accidental but results from a system-level compatibility analysis. Solana’s high-throughput architecture, capable of processing tens of thousands of transactions per second, requires validator nodes to complete all computations within sub-second latency windows. Therefore, migration schemes must meet specific technical constraints, and Falcon demonstrates structural advantages over alternatives in several key dimensions.
Signature Size
Falcon signatures are approximately 690 bytes to 1-2 KB (depending on security level). In contrast, other major post-quantum schemes differ significantly: CRYSTALS-Dilithium (also NIST standardized) signatures are about 2-4 KB; SPHINCS+ (hash-based stateless signatures) are about 8-17 KB. Since each transaction in Solana must carry signature data, signature size directly impacts block space and bandwidth costs. Falcon’s signatures are the most compact among the three NIST-approved standards (FIPS 204 for Dilithium, FIPS 205 for SPHINCS+, and FN-DSA for Falcon).
Verification Efficiency
Falcon uses a construction based on NTRU lattices, where verification involves a single polynomial multiplication—yielding very low constant factors. This is crucial for Solana’s nodes, which need to verify signatures rapidly to maintain network consistency. Preliminary tests show that optimized Falcon implementations can boost network performance by 2-3 times compared to current elliptic curve schemes.
Key Size
Falcon’s public keys are also reasonably small, significantly less than some alternatives. Compact public keys help control account storage overhead, vital for maintaining efficiency in a blockchain with a large account set.
Falcon’s ability to maintain high security while having compact signatures is rooted in its reliance on the hardness of the NTRU lattice problem—considered resistant even in quantum models. Unlike RSA (based on integer factorization) or ECC (based on discrete logarithms), lattice-based cryptography has not been efficiently attacked by Shor’s algorithm or its variants. Falcon’s signing process involves three steps: hashing the message to a lattice point, using a short private key (a short basis) to find a nearby lattice point, and outputting a short offset vector as the signature. Verification involves checking that the signature is a short vector matching the message hash, without requiring access to the private key.
Below is a comparison table of four mainstream signature schemes, illustrating Falcon’s balance between performance and security:
It’s important to note that Falcon’s advantage in signature size comes at the cost of more complex signature generation, involving Fourier sampling and other sophisticated operations. These require more precise engineering, especially in secure hardware environments, but the computational overhead is borne mainly by the signer, not the verifier. This asymmetry aligns well with Solana’s architecture: verification nodes perform lightweight checks, while signature generation can be handled by users’ devices within acceptable limits.
At the infrastructure level, many key components of Solana—such as Ed25519 signatures in account models, the Turbine/Rotor block propagation mechanism, Alpenglow BLS signatures in consensus, and signature verification in user programs—face quantum threats. Transitioning to Falcon will require synchronized upgrades across these components, and increased transaction sizes will necessitate adjustments in the Solana Virtual Machine (SVM), network parameters, and consensus protocols.
A notable design detail is the address-preserving migration mechanism. Anza’s proposal suggests that users can leverage their original mnemonic seed to derive keys, and through zero-knowledge proofs, verify the mathematical relationship between their existing Ed25519 seed and the new post-quantum key, enabling migration without changing account addresses. This significantly reduces user friction during migration.
Industry Opinions: Diverging Perspectives
The announcement of Solana choosing Falcon has sparked diverse discussions across the industry. Analyzing mainstream viewpoints reveals that different technical philosophies underpin their positions.
Core Developers: Threat Not Yet Mature, But Preparedness Is Essential
The Solana Foundation and the two major client teams share a highly aligned stance. Their public statements emphasize that “quantum threats are still years away,” but “work has been thoroughly researched and is ready for deployment if needed.” Anza’s chief economist, Max Resnick, and Stanford cryptography researcher Sam Kim, published a joint article providing probabilistic estimates: the likelihood of quantum computers posing a real threat within five years is about 3-5%. This low-probability assessment supports a rational “early readiness” approach—since the window is uncertain, being prepared now makes sense.
Investment Perspective: Moderate Risk Tolerance, Systematic Upgrades Needed
Bernstein analysts, led by Gautam Chhugani, qualitatively assess that the quantum threat is “real but controllable.” Their core argument distinguishes between exposure—roughly 1.7 million exposed public keys—and overall systemic risk, which remains low because Bitcoin’s hash-based security (SHA) remains robust even against quantum attacks. This aligns with Ark Invest’s earlier estimate that about 35% of Bitcoin supply is at addresses potentially vulnerable.
FalconX’s Joshua Lim offers a unique financial derivative perspective: quantum risk may first manifest in derivatives markets—options and long-term contracts—where pricing often reflects market fears of “Q-Day” before on-chain activity does.
Industry Divergence: “Action-Oriented” vs. “Watchful” Bitcoin Community
There is significant internal debate on whether and how to respond to quantum threats. The Bitcoin community, in particular, shows a split.
Adam Back, CEO of Blockstream and a highly influential voice in Bitcoin’s technical ecosystem, remains cautious. He publicly states that quantum risks are overestimated and that no action is needed for decades.
Countering this, security researcher Ethan Heilman proposed BIP-360, suggesting a new output type—Pay-to-Merkle-Root—to protect addresses from short-term quantum attacks. Heilman admits full implementation could take about seven years.
TRON founder Justin Sun adopts a more aggressive stance: “While Bitcoin debates and Ethereum forms research committees, TRON is already building. Quantum security should be a feature, not a vulnerability.” TRON’s post-quantum upgrade, launched on April 15, adopts NIST standards and positions quantum resistance as a competitive advantage.
Early Post-Quantum Primitive Exploration
While mainstream networks plan migration routes, some emerging ecosystems have built native post-quantum support from inception. Circle’s Layer 1 blockchain Arc plans to offer optional post-quantum signatures at mainnet launch, covering wallets and infrastructure. Naoris Protocol launched its post-quantum Layer 1 mainnet on April 1, 2026, as a pioneer.
To clarify the current landscape, here is a summary of the core positions of key institutions and individuals:
Current Market Data for Solana
Following the roadmap announcement, Solana (SOL) experienced brief market attention. As of April 29, 2026, SOL is priced around $84.97, with a 24-hour increase of about 1.06%, a 7-day decline of approximately 2.71%, and a year-to-date decrease of about 42.58%. Its market cap is roughly $48.94 billion, with a circulating supply of about 575.96 million SOL out of a total supply of approximately 624.38 million.
Industry Impact Analysis: Potential Reshaping of the Landscape
Whether or not the Falcon implementation is fully realized, it has already exerted a structural influence on the competitive landscape and infrastructure direction of the crypto industry.
Post-Quantum Readiness as a New Differentiation Dimension
Before 2026, quantum safety was largely seen as a theoretical or fringe topic. However, with Google’s white paper, Solana’s roadmap, and Circle’s native post-quantum design, quantum security is being redefined as a core infrastructure differentiator for public chains. This is not a face-to-face “security arms race”—since the actual quantum threat has not yet arrived—but a “trust and attractiveness” race: whether a network can signal to users and institutions that it has considered security issues decades ahead may become a hidden factor in long-term capital attraction.
Asymmetric Migration Capabilities
Solana’s migration plan demonstrates an underestimated advantage: in proof-of-stake networks, validator nodes are relatively centralized and governed, allowing post-quantum upgrades via network upgrades. In contrast, Bitcoin’s higher decentralization and more complex governance make a full transition longer—estimated at about 7 years for proposals like BIP-360. This asymmetry could lead to different response speeds as quantum computing advances.
Industry Signal Transmission
The release of Solana’s roadmap resonates with other industry signals: Google set 2029 as the target for post-quantum migration; Cloudflare adjusted its migration plans after Google’s white paper; the UK’s NCSC set milestones between 2028 and 2035. Solana’s move is part of a broader wave involving major tech and security organizations, likely accelerating other mainstream chains to set clear post-quantum timelines.
Gradual User Behavior Shift
A key challenge is the address-preserving migration mechanism. Anza’s proposal suggests users can leverage their original mnemonic seed, combined with zero-knowledge proofs, to verify the relationship between their existing Ed25519 seed and the new post-quantum key, enabling migration without changing addresses. This reduces user friction and facilitates gradual adoption.
Multi-Scenario Evolution: Four Possible Quantum Futures
Building on the factual overview, here are four plausible scenarios for blockchain quantum security evolution—these are speculative but grounded in technical reasoning.
Scenario 1: Ordered Transition
Quantum computing advances at a predictable pace, with a 3-5 year window for gradual migration. Under this scenario, Solana can maintain network stability by adopting a “new wallet first, gradual migration” strategy. Falcon’s compact signatures keep transaction size increases manageable, and network performance remains stable. Bitcoin’s proposals (BIP-360/361) are implemented after community consensus. This scenario minimizes disruption to asset prices and industry structure.
Scenario 2: Accelerated Response
Suppose breakthroughs in neutral atom or photonic quantum tech significantly shorten the timeline to 2-3 years. Solana’s preparedness, thanks to Falcon’s prior research, positions it better than others, but the industry must coordinate rapidly. The exposure of about 6.93 million BTC public keys becomes a major uncertainty.
Scenario 3: Standard Path Changes
If NIST announces new post-quantum schemes or finds better constructions, Falcon may no longer be optimal. Solana’s roadmap, designed with flexibility, would need to adapt, increasing transition costs. This underscores the risk of locking into a single scheme before standards are finalized.
Scenario 4: Narrative-Driven Bubble
Quantum threat narratives could trigger market panic and risk reallocation—funds flowing from “non-quantum-ready” assets into those with clear plans or native post-quantum support. Short-term overreactions may create bubbles, with derivatives markets pricing in fears before on-chain activity reflects it. Long-term, this could distort perceptions but also accelerate industry responses.
Conclusion
Falcon’s selection by Solana is fundamentally a choice at the intersection of technical compatibility and long-term strategy: in a high-throughput blockchain, post-quantum signatures must be not only secure but also compact and efficient. The convergence of two independent research paths into Falcon provides a compelling rationale.
From a broader industry perspective, Solana’s Falcon roadmap marks a key milestone in transitioning quantum security from fringe research to mainstream engineering. While the actual quantum threat still requires breakthroughs in physics, error correction, and engineering—currently, the gap between the most advanced quantum computers (~1,500 qubits) and the ~500k qubits needed to break elliptic curve cryptography remains vast—this threat’s clock is undeniably accelerating.
For the crypto industry, Solana’s approach offers a valuable lesson: view post-quantum migration as a long-term engineering project requiring early research and cautious implementation, rather than panic-driven reaction. This balanced stance may be the most rational response amid the high volatility of quantum threat narratives.