qsafe Wallet Explorer Dapp Faucet
EN KR
LIVE ON TESTNET - CHAINID 42069

Quantum-Resistant
Ethereum Infrastructure

First Layer 2 secured by NIST FIPS 204 post-quantum cryptography. ML-DSA-65 and ML-DSA-87 native EVM precompiles, ERC-4337 smart accounts, session keys, MetaMask Snap, and Celestia data availability.

42069
CHAIN ID
354,809
BLOCKS
Celestia
DATA AVAILABILITY
98%
GAS SAVINGS
5
SIGNATURE MODES
Core Infrastructure

Built for Post-Quantum Security

Integrating post-quantum cryptography into the execution layer, account abstraction, and developer tooling—while keeping UX clean and costs predictable.
LEVEL 3 MetaMask ML-DSA-87 ML-DSA-65 Blockchains
ML-DSA-65
ML-DSA-65 Precompile
CORE
NIST FIPS 204 Level 3 PQ signatures via native precompile (0x0101).
ML-DSA-87
ML-DSA-87 Precompile
NEW
Maximum NIST Level 5 security for highest-value assets (0x0102).
Signature Modes
5 Signature Modes
CORE
Hybrid, PQC-only, session key, and fallback modes for compatibility.
Session Keys
Session Keys
CORE
Use cheap session signatures for daily TX; reserve PQC for high-value ops.
ERC-4337
ERC-4337 Smart Accounts
CORE
Account abstraction with upgrade paths, batching, and Paymaster support.
Celestia Alt-DA
Celestia Alt-DA
NEW
Reduce data costs by pushing signature payloads to modular data availability.
MetaMask Snap
MetaMask Snap
NEW
PQC key generation and hybrid signing inside MetaMask for easy onboarding.
OP Stack Foundation
OP Stack Foundation
CORE
Battle-tested OP Stack with custom op-geth while preserving EVM equivalence.
Architecture
Layered Diagram
Blockchain Infrastructure Stack
SPECIFICATION SHEET

Quantum resistance at every layer

Post-quantum cryptography is integrated into the execution layer through native precompiles. Session keys reduce cost overhead; ERC-4337 smart accounts enable policy-based custody. Data availability is modular and anchored for production operations.

ML-DSA-65
Level 3 / 0x0101
ML-DSA-87
Level 5 / 0x0102
Standard
NIST FIPS 204
Sig Modes
0x01–04 + 0xFF
Session Key TX
66B / ~$0.001
Crypto Lib
Cloudflare CIRCL
ECOSYSTEM

Everything you need

A practical surface area for teams: wallet, dashboard, and explorer—designed to match institutional expectations.
Web Wallet

Web Wallet

Cross-device wallet built for institutional UX and clear controls.

Open Wallet
dApp Dashboard

dApp Dashboard

Operational console for accounts, session keys, and policy execution.

Launch dApp
Block Explorer

Block Explorer

Audit-grade visibility into blocks, transactions, and smart contracts.

Open Explorer
QuantumSafe

QuantumSafe

PQC API calls, post-quantum wallet integration, and batch signature scanning in one unified surface.

Try QuantumSafe
TEST NETWORK

Connect to QShield L2

Use the configuration below to connect wallets and developer tooling. Replace endpoints and IDs with your deployment values when you go production.
RPC ENDPOINT
https://qshield.xyz/rpc
CHAIN ID
42069
TESTNET FAUCET
https://qshield.xyz/faucet
PQC PRECOMPILES
ML-DSA-65 (0x0101), ML-DSA-87 (0x0102)
SMART CONTRACTS
Factory: 0x... | Paymaster: 0x... | EntryPoint: 0x...
BLOCK EXPLORER
https://scan.qshield.xyz
FAQ

Frequently Asked Questions

Common questions about QShield L2, post-quantum cryptography, and how it all works.

QShield L2 is the first Ethereum Layer 2 network secured by NIST FIPS 204 post-quantum cryptography. It implements ML-DSA-65 (Security Level 3) and ML-DSA-87 (Security Level 5) as native EVM precompiles, providing quantum-resistant smart accounts through ERC-4337 Account Abstraction. Built on the OP Stack, it maintains full EVM equivalence while protecting user assets against future quantum computer attacks via Shor's algorithm.

Ethereum's current security relies on ECDSA (secp256k1) digital signatures, which are vulnerable to Shor's algorithm on a sufficiently powerful quantum computer. NIST estimates that cryptographically relevant quantum computers could emerge within 10-15 years. A "harvest now, decrypt later" attack means adversaries can already collect signed transactions today and break them once quantum hardware matures. QShield L2 addresses this by adding ML-DSA post-quantum signatures alongside ECDSA in a hybrid scheme, so accounts remain secure even if ECDSA is compromised.

Everyday transactions using Session Keys cost approximately $0.002 per transaction with EIP-4844 blobs, or $0.0003 with Celestia data availability — comparable to standard Layer 2 transaction costs. This is because Session Key transactions use a lightweight 66-byte ECDSA signature instead of the full 3,375-byte hybrid PQC signature, reducing both execution gas (from ~54,000 to ~8,200) and data availability costs by up to 98%. High-security operations like account creation or key rotation use full hybrid signatures at approximately $0.05 per transaction.

ML-DSA-65 (formerly known as CRYSTALS-Dilithium) is a lattice-based digital signature algorithm standardized by NIST as FIPS 204 in August 2024. It provides Security Level 3 (equivalent to AES-192) against both classical and quantum attacks. QShield chose ML-DSA-65 because it offers the best balance of security and performance for blockchain use: the 1,952-byte public key and 3,309-byte signature are large but manageable with SSTORE2 storage patterns and session key optimization. The Go implementation uses Cloudflare's CIRCL library, verified at approximately 45,000 gas per verification as a native EVM precompile.

Session Keys allow users to authorize a temporary ECDSA key for routine transactions (token transfers, swaps, NFT mints) without requiring a full hybrid PQC signature each time. The user signs once with their hybrid key (ECDSA + ML-DSA) to register a Session Key with configurable limits: time expiry (up to 30 days), maximum transaction value, and target address whitelist. Subsequent transactions use only the Session Key's 66-byte ECDSA signature, reducing per-transaction costs from ~$0.05 to ~$0.002 — a 96% reduction. The quantum security is preserved because the Session Key was authorized through a quantum-resistant hybrid signature.

QShield supports 5 signature modes for different security needs: (1) Hybrid 0x01 — ECDSA + ML-DSA-65 dual verification for high-value transactions and key operations; (2) PQC-only 0x02 — ML-DSA-65 only, activated when ECDSA is compromised; (3) Session Key 0x03 — lightweight ECDSA for everyday transactions, authorized by a prior hybrid signature; (4) ML-DSA-87 0x04 — ECDSA + ML-DSA-87 for maximum Level 5 security; (5) ECDSA-only 0xFF — emergency fallback if a PQC vulnerability is discovered. Modes 0x02 and 0xFF require governance gate activation to prevent unauthorized switching.

Add QShield L2 testnet to your wallet with these settings: RPC endpoint https://qshield.xyz/rpc, Chain ID 42069, Currency Symbol ETH. Get testnet tokens from our faucet at https://qshield.xyz/faucet. The Web Wallet at https://qshield.xyz/wallet/ supports PQC key generation via MetaMask Snap. The block explorer at https://scan.qshield.xyz provides full transaction visibility. For developers, the PQC precompiles are available at addresses 0x0101 (ML-DSA-65) and 0x0102 (ML-DSA-87).

Yes. QShield L2 is built on the OP Stack and maintains full EVM equivalence. Standard Ethereum tools like MetaMask, Hardhat, Foundry, ethers.js, and web3.js work without modification. The post-quantum features are additive — they operate through ERC-4337 smart accounts and native precompiles, so existing Solidity contracts deploy and execute identically. The MetaMask Snap extension adds PQC key management without replacing the standard MetaMask workflow.

Ready for Q-Day?

Bring post-quantum assurances to your Ethereum workflows with a production-grade L2 foundation designed for institutions.