On Tue, 16 Mar 2021 at 09:05, Matt Corallo via bitcoin-dev <bitcoin-dev@lists.linuxfoundation.org> wrote:
There have been many threads on this before, I'm not sure anything new has been brought up here.

Matt

On 3/15/21 17:48, Luke Dashjr via bitcoin-dev wrote:
> I do not personally see this as a reason to NACK Taproot, but it has become
> clear to me over the past week or so that many others are unaware of this
> tradeoff, so I am sharing it here to ensure the wider community is aware of
> it and can make their own judgements.

Note that this is most definitely *not* news to this list, eg, Anthony brought it up in "Schnorr and taproot (etc)
upgrade" and there was a whole thread on it in "Taproot: Privacy preserving switchable scripting". This issue has been
beaten to death, I'm not sure why we need to keep hitting the poor horse corpse.


I read through this thread just now. The QC discussion starts roughly here: https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2018-January/015620.html

My own (very possibly wrong) interpretation of the situation is:

1. Current addresses are very vulnerable to QC and would require hardfork to fix (and not fix particularly well).
2. Once a QC resistant spending procedure has been developed it could be added as a backup spending policy as a new tapleaf version (wallets would have to opt into it).
3. If QC does get to the point where it can break ECC then we can disable key-path spends via softfork
4. If everyone has moved their coins to Taproot addresses with a QC resistant tapleaf backup then we're ok.
5. Since the above is almost certainly not going to happen we can simply congratulate the new QC owners on the Bitcoin they take from old addresses (specter of QC encourages moving to taproot which could be thought of as a good thing).
6. Otherwise we have to hard fork to stop old addresses being spent without a quantum resistant ZKP (oof!).
7. Once we know what we're up against a new quantum resistant segwit version can be introduced (if it hasn't already).
8. If QC develop far enough to degrade SHA256 sufficiently (ECC probably breaks first) then that's a whole other ball game since it affects PoW and txids and so on and will likely require a hard fork.

The ordering of the above events is not predictable. IMO Mark's post is on the wildly optimistic side of projected rate of progress from my limited understanding. Either way it is strictly better to enter a QC world with Taproot enabled and most people are using it so we can introduce QC resistant backup spend paths without hardforks before they become practical. Depending on what happens they may not be needed but it's good to have the option.

On Tue, 16 Mar 2021 at 10:11, Karl-Johan Alm via bitcoin-dev <bitcoin-dev@lists.linuxfoundation.org> wrote:
On Tue, 16 Mar 2021 at 07:48, Matt Corallo via bitcoin-dev
<bitcoin-dev@lists.linuxfoundation.org> wrote:
>
> Overall, the tradeoffs here seem ludicrous, given that any QC issues in Bitcoin need to be solved in another way, and
> can't practically be solved by just relying on the existing hash indirection.

The important distinction here is that, with hashes, an attacker has
to race against the spending transaction confirming, whereas with
naked pubkeys, the attacker doesn't have to wait for a spend to occur,
drastically increasing the available time to attack.


First note that I am enthusiastically ignorant of QC technology so please take the following with a bowl of salt.
The premise of Mark's post is that QC progress is currently exponential (debatable) and will continue to be (unknowable) so "months" will turn into days and into minutes in short time period. Since QC progress is exponential and the speedup that ECC quantum algorithms offer is exponential you're not dealing with the typical "Moore's law" progress in terms of time to solve a particular problem; It's like exponential exponential (math person help me now). You could easily go from ten thousand years to break ECC to a few seconds within a year with that rate of progress so I don't think "slow quantum" is an adversary worth protecting against. I would love to know if I am wrong on this point.

Cheers,

LL