- Algorand outlined a post-quantum ledger strategy focused on securing account control, not only historical blockchain data, against Shor’s and Grover’s algorithms.
- The plan builds on 2022 State Proofs and a 2025 Falcon-based MainNet authorization milestone, then targets live accounts.
- Single-signature, Logic Signature, Application and multisignature accounts need different migrations, with Falcon, salting, typing and gradual opt-in adoption central before native post-quantum accounts eventually become first-class protocol primitives across the network.
Algorand outlined a next-generation ledger security strategy to prepare its account model for the quantum computing era. The work focuses on protecting the live ledger, not just historical blocks, by removing quantum-vulnerable control paths from every account type. Quantum risk centers on Shor’s algorithm, which could expose Ed25519 private keys, and Grover’s algorithm, which affects hash-derived addresses. For developers, the core challenge is account control, because securing balances means securing every valid way an address authorizes transactions.
Account Types Define the Migration Challenge
The roadmap splits post-quantum work into three stages: secure the past, secure the present and secure the future. State Proofs, deployed in 2022 through the Renaissance Block, used Falcon signatures to make historical attestations quantum-resistant. A November 2025 milestone showed MainNet transaction authorization using Falcon through account abstraction. Now the focus turns to accounts, where balances, assets, applications and configurations depend on safe authorization paths. The present ledger is the critical battleground, because history protection alone cannot secure spendable state.

Single-signature accounts face the most direct risk because they rely on Ed25519 keys. Algorand’s proposed first move is Falcon account abstraction, letting users create Falcon-controlled accounts or rekey existing Ed25519 accounts to a Falcon-verifying Logic Signature authorizer. That preserves the address while changing who can spend from it. Yet friction remains, including larger Falcon keys and signatures, multi-transaction flows, wallet support and custody procedures. Post-quantum migration is therefore not just protocol design, it also requires operational adoption.
Program-controlled accounts create a stranger problem. Logic Signature and Application accounts may not intentionally generate Ed25519 keys, yet their 32-byte identifiers can sometimes be interpreted as valid Ed25519 public keys. A quantum attacker could exploit that accidental path and bypass program logic. Logic Signatures can be salted until addresses are off-curve, while Application accounts may need salted derivation or account typing. Multisignature accounts add raw Ed25519 sub-signers. Each account type needs its own security treatment, not one universal patch.
The long-term direction points toward native post-quantum accounts, with Falcon becoming a first-class protocol primitive. That raises compatibility questions because Falcon public keys are far larger than Algorand’s 32-byte address format, requiring hash-based derivation and verification design. Algorand also favors gradual, opt-in migration over panic. The strategy is deliberately evolutionary, built to protect users without breaking applications, governance roles or custody arrangements before the threat becomes operational.
crypto-economy.com