Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
BIP-360 Interpretation: Bitcoin's First Step Toward Quantum Defense, But Why It's Only "The First Move"?
This article explains how BIP-360 is reshaping Bitcoin’s quantum resistance strategy, analyzes its improvements, and discusses why full post-quantum security has not yet been achieved.
Written by: Cointelegraph
Translated by: AididiaoJP, Foresight News
Key Points
Bitcoin’s design philosophy enables it to withstand severe economic, political, and technological challenges. As of March 10, 2026, its developer community is actively addressing an emerging technological threat: quantum computing.
The recently proposed Bitcoin Improvement Proposal 360 (BIP-360) is the first to officially include quantum resistance in Bitcoin’s long-term technical roadmap. While some media portray it as a major breakthrough, the reality is more cautious and gradual.
This article will explore how BIP-360, by introducing P2MR scripts and removing Taproot’s key-path spending, reduces Bitcoin’s quantum exposure. It aims to clarify the proposal’s improvements, trade-offs, and why full post-quantum security has yet to be realized.
Sources of Quantum Threats to Bitcoin
Bitcoin’s security relies on cryptography, primarily elliptic curve digital signatures (ECDSA) and Schnorr signatures introduced via Taproot. Classical computers cannot feasibly derive private keys from public keys. However, a sufficiently powerful quantum computer running Shor’s algorithm could break elliptic curve discrete logarithm problems, threatening private key security.
Key distinctions:
Therefore, the community generally considers public key exposure as the primary quantum threat.
Potential Weaknesses in Bitcoin by 2026
Different address types in Bitcoin face varying levels of future quantum threat:
BIP-360 specifically targets the public key exposure issue.
Core of BIP-360: Introducing P2MR
BIP-360 proposes a new output type called Pay-to-Merkle-Root (P2MR). Structurally similar to Taproot, it makes a key change: completely removing the key-path spending option.
Unlike Taproot, which commits to an internal public key, P2MR only commits to the Merkle root of a script tree. Spending a P2MR output involves:
Throughout this process, no public key-based spending path exists.
The direct effects of removing the key-path spending include:
Features Preserved by BIP-360
A common misconception is that abandoning the key-path spending weakens Bitcoin’s smart contract or scripting capabilities. In fact, P2MR fully supports:
BIP-360 achieves all these via Tapscript Merkle trees. It preserves full scripting flexibility while discarding the convenient but potentially risky direct signature paths.
Background: Satoshi Nakamoto briefly discussed quantum computing in early forums, suggesting that if it became practical, Bitcoin could migrate to stronger signature schemes. This indicates that leaving room for future upgrades was part of the initial design philosophy.
Impact of BIP-360 in Practice
While seemingly a purely technical improvement, BIP-360 will broadly impact wallets, exchanges, and custody services. If adopted, it will gradually reshape how new Bitcoin outputs are created, spent, and stored, especially affecting users prioritizing long-term quantum resistance.
Background: Some governments have started to focus on the “collect now, decrypt later” threat, collecting encrypted data now to decrypt with future quantum computers. This strategy echoes concerns about public key exposure in Bitcoin.
Limitations of BIP-360
Although BIP-360 enhances Bitcoin’s defenses against future quantum threats, it is not a complete overhaul of cryptographic systems. Its limitations include:
Developers’ Forward-Looking Planning
The development path of quantum computing remains uncertain. Some believe practical quantum computers are decades away, while others point to:
Transitioning critical infrastructure takes a long time. Bitcoin developers emphasize the need for systematic planning across BIP design, software implementation, infrastructure adaptation, and user adoption. Acting only when quantum threats are imminent risks being too late.
If the community reaches broad consensus, BIP-360 could be implemented gradually via soft forks:
This approach mirrors the path of SegWit and Taproot upgrades, from optional adoption to widespread use.
Community Discussions Surrounding BIP-360
There is ongoing debate about the urgency and costs of implementing BIP-360. Key questions include:
These discussions continue. The proposal has spurred important conversations but does not resolve all issues.
Background: The theoretical threat of quantum computers capable of breaking current cryptography dates back to 1994, with Peter Shor’s algorithm. This predates Bitcoin by decades. Bitcoin’s planning for future quantum threats is essentially a response to this longstanding theoretical breakthrough.
Current User Actions
Quantum threats are not imminent, so users need not panic. However, some prudent measures include:
BIP-360: A Step Toward a Quantum-Resistant Era
BIP-360 marks a concrete first step in reducing Bitcoin’s quantum exposure at the protocol level. It redefines how new outputs are created, minimizes accidental public key leaks, and lays groundwork for long-term migration.
It does not automatically upgrade existing Bitcoin holdings, retains current signature schemes, and underscores that achieving true quantum resistance requires careful, coordinated, ongoing effort across the entire ecosystem. This depends on long-term engineering, phased community adoption, and cannot be achieved by a single BIP alone.