part of the purpose of doing that is the public key of a UTXO is not revealed until it's spent, this requires a different signature construction where you find the key by verifying the signature against the txid (hash) rather than having the key and verifying it validates against the signature (like bip-340 schnorr signatures)

essentially this means the cat is out of the bag before anyone knows who had the bag

Reply to this note

Please Login to reply.

Discussion

Because your public key isn’t revealed until you spend, quantum computers can’t just hack away at your public key at their leisure. If your transaction will be in the next block, there’s a time limit on finding the private key.

Fair point,

But the claim of quantum computing is what would take the current (best) super computer thousands of years to brute force, qubits can do in mere seconds.

If it takes #bitcoin 10 mins to first confirmation…that is a lot of seconds gone by.