Crypto companies are accelerating efforts to harden wallets and custody systems against a potential quantum computing threat, moving to fortify user-facing infrastructure on a faster timeline than blockchains such as Bitcoin and Ethereum are likely to change their core protocols.
The push reflects a pragmatic calculation: network-level upgrades can take years, while concerns about a so‑called “Q‑Day” are edging closer, with one recent estimate placing that inflection as early as 2030. In response, firms are building quantum‑resistant signing systems that slot into existing products, from institutional custody stacks to consumer wallets, without waiting for broad consensus changes at the base layer.
Technology Use Case
One prominent effort comes from Silence Laboratories, which says it has added support for distributed, or multi‑party computation (MPC), signatures based on ML‑DSA—an algorithm selected by the National Institute of Standards and Technology (NIST) in its post‑quantum cryptography process. The company positioned the work as a way to bring post‑quantum security to the places where users actually sign transactions, while preserving the operational patterns already familiar to custodians and institutions.
According to Jay Prakash, CEO and co‑founder of Silence Laboratories, the company spent the past six months reviewing the latest post‑quantum developments. That review tracked with NIST’s approval of three algorithms—SPHINCS+, Falcon, and CRYSTALS‑Dilithium—and centered on how well each can be adapted to the distributed signing flows typical in MPC environments used by banks, custodians, and other institutional actors.
Prakash said MPC “friendliness” is uneven across those schemes. In practice, that means some options may not support efficient distributed transaction signing, and performance characteristics differ in areas such as signature size and compute cost. He also pointed to an emerging fragmentation risk as various blockchains evaluate different algorithms with their own optimization criteria.
Silence Laboratories’ approach relies on splitting a private key into shares that live across isolated nodes. When a transaction must be authorized, the participating nodes jointly produce a signature without ever reassembling the key in one place. By never reconstructing the key, the design reduces a single point of failure—an attribute that, Prakash argued, aligns with how institutions already think about risk. “Institutions are now wired to distributed signing,” he said, noting that partners across the custody landscape, from providers like BitGo to banks building digital asset practices, already discourage keeping a key in a single location.
Industry Response
MPC systems are a standard fixture in institutional wallets, and the company emphasized that its method fits within that architecture. The pitch is incremental by design: firms can apply a code‑level upgrade to their MPC stack to obtain a post‑quantum‑secure signing layer, without retooling the surrounding infrastructure. In principle, that means developers could update a wallet software development kit and preserve the end‑user experience—whether someone interacts through a wallet like MetaMask or another interface—while gaining post‑quantum protections behind the scenes.
That wallet‑first posture does not encompass the entire industry. A parallel track of development targets protocol‑level changes, on the view that end‑to‑end protection ultimately requires the base networks to adopt quantum‑resistant primitives. The divide is practical as much as it is philosophical: wallet upgrades can be deployed quickly and unilaterally by service providers, while protocol upgrades require coordination, testing, and community agreement, and can take far longer to land.
Alternative Architectures
Other companies are exploring overlays that add quantum‑resistant signatures on top of existing networks. Developers behind a wallet from Postquant Labs, for example, are building a system that uses a separate smart contract layer to incorporate post‑quantum signing for Bitcoin. The aim is to avoid changes to the base protocol while still enabling users to transact with quantum‑resistant assurances through an additional layer.
Related proposals have surfaced in research channels. StarkWare researcher Avihu Mordechai Levy has described a technique to replace Bitcoin’s elliptic‑curve signatures with hash‑based alternatives that operate within current consensus rules. That design is framed as a last‑resort pathway rather than a scalable solution, in part because the resource requirements could be high.
Coordination, Behavior, and Timing
Beneath the engineering choices lies a coordination challenge. Experts warn that user behavior and ecosystem organization remain potential weak links in any post‑quantum transition. Even if wallets adopt new algorithms, gaps could persist until the underlying networks implement compatible changes. Prakash underscored that point, noting that wallet‑level defenses cannot fully compensate if the blockchains themselves do not eventually upgrade.
The difficulty is compounded by timing. While there is no public evidence of quantum computers capable of breaking widely used cryptography today, the pace of research has kept attention fixed on the timetable. That uncertainty is prompting companies to act at the wallet and custody layers now, even as protocol work proceeds on longer horizons. The calculus favors steps that reduce exposure without disrupting current operations—hence the emphasis on drop‑in libraries, MPC‑compatible primitives, and approaches that allow institutions to maintain familiar security controls while adding post‑quantum features.
Market Impact
For custodians and institutions, the appeal of these upgrades is operational continuity. MPC is already entrenched in risk management, from distributed approvals to hardware isolation. Post‑quantum‑capable MPC lets those organizations extend the model they use today, rather than re‑architecting key management practices. That offers a cleaner internal rollout path and a consistent interface for end users, who would not need to take explicit action to benefit if their provider upgrades its signing libraries.
At the same time, fragmentation across algorithms and implementations could complicate adoption. With different blockchains favoring different schemes, and with each option exhibiting distinct trade‑offs, service providers must weigh interoperability against performance and security considerations. The industry’s experience with MPC may help—distributed signing is already embedded in many custody workflows—but choosing, testing, and standardizing on specific post‑quantum algorithms remains a non‑trivial process.
What Comes Next
The near‑term picture is one of parallel efforts. Wallet builders and custody platforms are pressing forward with post‑quantum signing paths that can be deployed within their existing systems. Researchers and protocol developers are evaluating deeper changes that could eventually rewrite how signatures work on the base networks. Overlay concepts, like those pursued by Postquant Labs and discussed in research by Avihu Mordechai Levy, sit between those poles, offering a means to layer quantum‑resistant assurances without forcing immediate consensus changes—albeit with cost and scalability caveats.
Whatever the route, the strategic aim is consistent: narrow the window of vulnerability before quantum capabilities mature, while keeping the ecosystem usable in the present. The industry’s next phase will hinge on coordination—between wallets and protocols, between institutions and developers, and between varied algorithmic choices—so that a patchwork of solutions coalesces into end‑to‑end protection rather than a fragmented response.
For now, companies like Silence Laboratories are betting that meeting institutions where they are—MPC‑first, infrastructure‑conscious, and reluctant to overhaul working systems—offers the fastest practical path to post‑quantum resilience. The approach promises continuity for users and operations today, with an acknowledgment that the full solution ultimately requires the base chains to move as well.

