Quantum computers, if they ever reach sufficient power, do indeed pose a long-term challenge to the cryptographic systems underpinning Bitcoin and Lightning. The Bitcoin development community is already actively addressing this potential threat, demonstrating a proactive stance to future-proof the technology.
Wertheimer's core argument highlighted a valid structural property of Lightning: during channel opening, participants exchange public keys. In a world with cryptographically relevant quantum computers (CRQCs), an attacker armed with these public keys could theoretically employ Shor's algorithm to derive corresponding private keys, thus potentially compromising funds.
However, this scenario is far more nuanced and conditional than a blanket statement implies. Crucially, while a Lightning channel remains open, its protection is robust. Funding transactions utilise P2WSH (Pay-to-Witness-Script-Hash), which ensures that the raw public keys within the 2-of-2 multisig arrangement remain hidden on-chain. Furthermore, Lightning payments rely on HTLCs (Hashed Time-Lock Contracts), which depend on hash preimage revelation rather than exposed public keys. This means a passive quantum attacker monitoring the blockchain wouldn't have access to the necessary keys.
The real attack window, if it were to materialise in a post-quantum era, would be significantly narrower: during a force-close. When a commitment transaction is broadcast on-chain as part of a channel closure, the locking script becomes publicly visible, including the `local_delayedpubkey` – a standard elliptic-curve public key. By design, the node initiating the force-close cannot immediately claim its funds. A CSV (CheckSequenceVerify) timelock, typically around 144 blocks (approximately 24 hours), must first expire. In this specific post-quantum scenario, an attacker monitoring the mempool could observe the confirmed commitment transaction, extract the newly exposed public key, and then attempt to use Shor's algorithm to derive the associated private key. This clarifies the specific, albeit currently theoretical, vulnerability. The ongoing work within the Bitcoin development community aims to mitigate these long-term challenges, ensuring the continued resilience and security of the Lightning Network for businesses and users alike.






