Back to research
Jul 8, 2025
Quantum Proof-of-Work (QPoW): Simulator Now Live
BTQ launches the Quantum Proof-of-Work Simulator, the first platform to demonstrate quantum advantage in blockchain consensus—offering energy efficiency, post-quantum security, and compatibility with today’s classical infrastructure.
Quantum Proof-of-Work (QPoW): Simulator Now Live

1. Introducing the QPoW Simulator

BTQ’s Quantum Proof-of-Work (QPoW) Simulator is now live. This visualizes our research in quantum consensus mechanisms, introducing a Bitcoin mining method that is both energy-efficient and secure against quantum threats. Quantum Proof-of-Work is based on course-grained boson sampling, a fundamentally quantum phenomenon, making the puzzle resistant to quantum adversaries while remaining verifiable by classical computers allowing the network to remain compatible with existing classical infrastructure. By extending the security model behind Bitcoin’s SHA-256 puzzle, which today safeguards trillions of dollars in digital value, we pave the way for more robust and resilient forms of digital money.

Within the simulator, you can:

  • Run real-time QPoW mining cycles to observe quantum advantage.
  • Tune core parameters such as photon count, optical modes, and detection bins to evaluate security-performance trade-offs.
  • Explore interactive visualizations of miners outputs and compare competing miners' performance.

2. Quantum Foundations

Quantum Proof-of-Work is a novel consensus mechanism that leverages the principles of quantum mechanics, specifically boson sampling, to create a mining process that's inherently quantum in nature. Unlike classical proof-of-work systems that rely on hash functions, QPoW uses quantum sampling distributions to validate blocks.

Classical proof-of-work systems face two main limitations:

  1. The computational process is dominated by application specific integrated circuits (ASIC)s which are extremely energy intensive and not sustainable
  2. They are not future proofed against disruptions to the mining process by future quantum computers

QPoW addresses these challenges by creating a mining process that is:

  • Quantum-native on near term devices: The proof-of-work is inherently quantum mechanical but uses a boson sampler rather than a fault tolerant quantum computer
  • Energy efficient: the difficulty of the mining problem is adjustable with minimal effect on energy cost with the mining performance is determined by quality of components
  • Verifiable: Classical computers can still verify the work
  • Secure: The system remains secure even in a post-quantum world

The foundation of QPoW rests on boson sampling, a specialized NISQ-era quantum computation model that leverages the quantum mechanical properties of photons. The system implements a complex quantum circuit characterized by the following parameters:

  • (N): Number of input photons in the quantum system
  • (M): Number of optical modes
  • (B): Number of measurement bins for mode binning
  • (beta): TVD (Total Variation Distance) threshold

3. Quantum Mechanics

3.1 Quantum Sample Generation

The boson sampling protocol executes on an N-photon, M-mode linear optical network. The process unfolds in two stages:

Quantum Circuit Configuration

  • Input State: NN single photons are distributed across MM optical modes.
  • Unitary Transformation (UU): Each block generates a unique unitary matrix via QR decomposition of a Haar-random matrix.
  • Mode Configuration: Optical mode mapping is derived from a block-specific beacon permutation.

Sample Generation

  • Photons evolve under the unitary transformation defined by the block header
  • The system records batches of output configurations during a fixed mining window.
  • Each sample encodes the interference pattern resulting from multiple photons interacting within the quantum circuit—yielding output distributions that are computationally hard to simulate classically.

This process exploits quantum interference effects that are classically intractable, while remaining efficiently verifiable. Because valid samples can only be generated using quantum devices capable of sustaining multi-photon coherence, the resulting proof-of-work is inherently quantum-secure.

3.2 Validation Protocol

The validation protocol ensures that only genuine quantum samples contribute to consensus. It proceeds in two phases:

1. Mode Binning Validation

  • Mode Binning: Output samples are grouped into bins based on a permutation scheme derived from each block header. Each sampled distribution is compared against this reference distribution using Total Variation Distance (TVD).
  • A sampled distribution passes this phase if the TVD falls below a network-defined threshold β.

2. State Binning Analysis

  • The Peak Bin Percentage (PBP) measures the concentration of samples within a distribution by taking the proportion of a miner's total quantum samples that fall into the single most frequent output bin after the state binning process. 
  • The sample is accepted only if the miner’s PBP is statistically consistent with the network-wide value within tolerance ϵ.

3.3 Consensus Mechanism

Each miner participates in block production by generating a batch of quantum samples using their local quantum hardware. These samples are submitted alongside the proposed block. The network verifies samples and selects a winner in the following steps:

Step 1: Statistical Validity via PBP

  • The Peak Bin Percentage (PBP) is calculated for each mine. PBPs serve as a validity check by comparing a miner's PBP to the network average. 
  • To pass, the miner's PBP must be within a tolerance ϵ of this average. 
  • This check helps ensure the miner's sample distribution aligns statistically with the overall network behavior and isn't anomalous (i.e. is not classically spoofed).

Step 2: Winner Selection via Lowest TVD

  • Total Variation Distance (TVD) is computed between the miner’s binned output distribution and a known, block-specific reference distribution derived from the expected boson sampling behavior.
  • A miner’s submission is considered valid if the calculated TVD is below a network-defined threshold β, indicating statistical consistency with real quantum behavior.
  • From the pool of miners whose submissions passed the TVD validity threshold, the miner whose sample distribution exhibits the lowest TVD compared to the reference distribution is chosen to produce the next block.

This dual validation approach ensures that each block is backed by authentic quantum-generated data, that miner submissions are statistically aligned with the network’s expected distributions, and that consensus remains robust against manipulation or classically spoofed samples, all while being verifiable by classical nodes.

4. Implications for Digital Assets

Quantum computing introduces fundamental challenges to the cryptographic foundations of today’s blockchain systems. Many of the assumptions securing digital ledgers—such as the hardness of factoring large integers or solving discrete logarithms—are directly threatened by quantum algorithms. As a result, both private key security and consensus mechanisms face distinct quantum-era risks. The following is how post-quantum cryptographic methods and quantum-native consensus mechanisms, such as Quantum Proof-of-Work (QPoW), offer targeted mitigations to preserve blockchain security and resilience.

Private Key Vulnerability

Attack Vector: Algorithms like Shor's give exponential speedup for integer factorization, relevant to RSA; similar efficiencies exist for elliptic curve discrete logarithms) enable efficient attacks on widely used public-key cryptosystems. A sufficiently powerful quantum computer could potentially derive a user's private key from their public key, compromising their funds and identity.

Mitigation: The standard mitigation involves transitioning to Post-Quantum Cryptography (PQC) schemes designed to resist these quantum attacks. While essential for securing user accounts and transactions in a full blockchain implementation, integrating PQC is outside the scope of this specific qPoW consensus simulation.

Proof-of-Work Vulnerability

Attack Vector: Classical Proof-of-Work (PoW) systems, often relying on computationally intensive hash-based puzzles (like finding a hash preimage below a target), are susceptible to Grover's algorithm. Grover's provides a quadratic speedup (O(sqrt{N}) vs \(O(N)\)) on unstructured search problems, potentially allowing a quantum attacker to find valid PoW solutions significantly faster than classical miners, disrupting consensus.

Mitigation: This quantum proof-of-work system changes the mining task from one that is classical to one that is quantum in nature. Instead of hash inversions susceptible to Grover's, miners generate samples from a probability distribution defined by a complex unitary transformation using course-grained boson sampling. Verifying this work involves statistical checks (like the TVD validation against a reference distribution) to confirm the samples align with expected quantum behavior, a task difficult to approximate classically but easily verifiable. This quantum-first approach sidesteps the specific vulnerability of classical hash puzzles to Grover's algorithm.

5. Conclusion

BTQ has pioneered the first commercial demonstration of quantum advantage through Quantum Proof-of-Work as a way to secure and future proof digital assets relying on traditional forms of computation proof of work.  By providing a quantum analogue to the classical proof-of-work algorithms such as Bitcoin’s SHA-256 puzzle, which today secures trillions of dollars in digital assets, Quantum Proof-of-Work offers a path towards stronger and more resilient forms of digital money.