Post-Quantum HD Wallets: Preparing for the Threat Malaysia's Capital Controls Can't Block
Post-Quantum HD Wallets: Preparing for the Threat Malaysia’s Capital Controls Can’t Block

Malaysian developers building Bitcoin tools face a peculiar regulatory asymmetry: Bank Negara Malaysia can restrict ringgit on-ramps, freeze exchange accounts, and monitor transactions above RM30,000 — but it cannot stop a quantum computer from breaking secp256k1 in the 2040s and draining every non-upgraded wallet in Kuala Lumpur. The threat isn’t regulatory. It’s cryptographic obsolescence in a timeframe where your users’ retirement savings are at stake.
Conduition’s proposal for post-quantum hierarchical deterministic (HD) wallets with fallback SPHINCS+ keys offers a migration path that doesn’t require users to trust a distant soft fork timeline. But the design reveals a harder truth: quantum resistance and HD wallet convenience are structurally incompatible without sacrifices.
01· Why BIP32 Breaks Under Post-Quantum Constraints
BIP32’s elegance relies on secp256k1’s algebraic structure: parent public keys can derive child public keys without exposing private keys. This enables watch-only wallets, hardware wallet coordination, and XPUB-based accounting — the entire infrastructure of modern Bitcoin custody.
SPHINCS+ signatures, the NIST-standardized post-quantum algorithm, have no such algebraic relationship. Parent and child keys are cryptographically independent.
Conduition’s workaround is clever but costly. Non-hardened children share the same SPHINCS+ key, differentiated only by a nonce — which means a single expensive derivation operation covers the entire branch. The performance win is real, but the privacy cost is immediate: every spend must include unique data to prevent address clustering, bloating transactions by 32+ bytes. You get HD wallet UX or post-quantum privacy, not both.
For Malaysian users managing mixed-origin funds — local P2P buys, exchange withdrawals, overseas remittances — wallet software must intelligently separate paths: hardened for high-privacy spends, non-hardened for performance. That’s a UX design problem most wallet teams haven’t started solving.
02· The Malaysia Angle: Why Waiting for Consensus is a Risk
Antoine Poinsot’s mailing list post defending a “plain post-quantum output type” (versus a Taproot-like hybrid) crystallizes the governance dilemma: should Bitcoin enable quantum-resistant spends now and decide later whether to disable secp256k1, or bundle the decision together?
For developers in jurisdictions with capital controls, the timeline matters existentially. Bank Negara can freeze your exchange account tomorrow. A quantum threat is 5–15 years out under pessimistic timelines, but a soft fork consensus process is 2–5 years minimum — witness the Taproot activation debates. If you’re building a savings wallet for unbanked Malaysians in Kelantan, you cannot tell users “wait for global consensus to protect your life savings from a future threat.”
One interim proposal circulating on the bitcoin-dev mailing list offers a hedge — embedding post-quantum keys in tapscript today using BIP342’s unknown key type mechanism:
- Deploy now, activate later: Wallets include both
secp256k1andSPHINCS+keys in scripts; spend with quantum-vulnerable keys until a soft fork enables quantum-safe validation - Security constraint: Requires strict no-reuse policies (one-time addresses only), which conflicts with how Malaysian merchants often share static QR codes for repeat payments
- Standardization gap: Without a BIP number, wallets implementing this independently risk incompatible serialization formats
The pragmatic path for Malaysian developers: implement Conduition’s HD structure now in testnet/signet environments, monitor the mailing list for BIP assignment, and design wallet UX that teaches users the reuse-privacy-quantum tradeoff without paralyzing them.
03· STARK-Based Recovery: The Insurance Policy for Frozen Users
Olaoluwa Osuntokun’s zk-STARK proof of BIP32 seed knowledge offers a catastrophic recovery mechanism if secp256k1 is disabled before users migrate. The concept: prove you know the seed that derives a quantum-vulnerable key without revealing the seed itself, then claim funds under post-quantum rules.
His benchmarks show recovery is computationally expensive but viable — proof generation takes minutes, verification takes seconds. For Malaysian users potentially locked out by simultaneous capital controls and quantum threats, this is existential insurance: even if Bank Negara freezes your exchange account and quantum computers break ECDSA, you can recover self-custodied funds with a STARK proof.
The tooling isn’t production-ready, but the research milestone matters. Developers can build wallets today that contain both forward-migration paths (Conduition’s HD design) and backward-recovery paths (STARK proofs) as failsafes — “wait for the soft fork” doesn’t have to be the only option on the table.

Key Takeaway: Post-quantum HD wallets require sacrificing either privacy (reusing
SPHINCS+keys across non-hardened children) or performance (full derivation per key). For developers in capital-controlled regions like Malaysia, this isn’t academic — users need quantum-resistant self-custody options before global consensus on soft fork timelines, not after. Interim solutions like tapscript key embedding and STARK-based recovery provide insurance while the ecosystem coordinates on standards.
Here’s the uncomfortable question: if Bank Negara restricts exchange access the same year a credible quantum threat emerges, will your users have had enough time to migrate? Build for that scenario now, or accept the bet.
Found this useful? Zap 21 sats ⚡
中文摘要
量子计算威胁与马来西亚资本管制形成独特风险组合:国家银行可冻结交易所账户,但无法阻止未来量子计算机破解
secp256k1密钥。Conduition 提出的抗量子分层确定性(HD)钱包设计揭示核心矛盾:BIP32依赖椭圆曲线代数结构实现子密钥推导,但SPHINCS+等抗量子算法无此特性。非强化派生路径共享 SPHINCS 密钥可换取性能,但每次花费必须附加唯一数据以防地址聚类,交易体积增加 32+ 字节——隐私与便利无法兼得。对马来西亚开发者,时间线是生存问题:软分叉共识需 2–5 年,资本管制可能明天生效,量子威胁在 5–15 年内逼近。bitcoin-dev 邮件列表上的过渡方案允许钱包现在就在 tapscript 中嵌入抗量子密钥,使用传统签名直到软分叉激活——但要求严格禁止地址重用,这与本地商家常用静态二维码的习惯冲突。Osuntokun 的
zk-STARK种子证明提供灾难恢复机制:即使secp256k1被禁用,用户仍可通过零知识证明找回自托管资金。
#Bitcoin #DevBTC #PostQuantum #Malaysia #Sovereignty #BIP32 #Lightning
Write a comment