Why Circle's New Stablecoin Blockchain Arc Isn't Ready for Quantum Threats

Arc sells trust, speed, and USDC gas. Without a PQC roadmap, Circle's new stablecoin quantum threat remains the blind spot. Here is what to ask for.

Futuristic digital city with glowing blue and purple energy rings forming a massive circular structure above a city skyline, symbolizing blockchain networks and quantum technology themes.

Date

Oct 23, 2025

Author

Quantum Canary Staff

0 min read
0

Circle's latest ambition is to create the ultimate settlement layer for stablecoins. Its new network, Arc, touts the conveniences that financial and blockchain enterprises ask for, and if you move or manage money for a living, especially stablecoins, its pitch is quite compelling.

But there's a catch here that sits under the surface. Due to its technical implementation, Circle's new stablecoin faces a quantum computing threat that developers and investors should price in before the mainnet launches -- assuming that Circle doesn't make any adaptations before then.

Here's what you need to know.

Arc's Debut, And What It Gets Right

Arc is framed as an EVM-compatible Layer-1 purpose-built for stablecoin finance. It proposes USDC as native gas, which reduces the operational friction of paying fees in a volatile asset. It advertises built-in FX and on-chain banking rails, plus opt-in privacy that selectively shields balances with compliance-friendly proofs. Finality is described as deterministic and sub-second, powered by Malachite, a Rust BFT engine.

The public timeline to launch is average, with a mainnet beta in 2026, which gives the team time to harden the stack if they choose to do so. The incumbents in the stablecoin space are likely to pay attention to how that launch goes. The asset tokenization movement can and will transform key financial market rails, and companies will require predictable fees, high throughput, and clear compliance paths. If Arc can deliver those operational guarantees, cross-border payments and asset tokenization flows will test it.

Circle's New Stablecoin: Quantum Threat Is The Blind Spot Investors Need To Price In

As good as Arc's feature set looks to be, it's missing something critical. 

The cryptography choice at the heart of EVM ecosystems like Arc remains elliptic-curve cryptography (ECC) signatures. A cryptographically-relevant quantum computer would put those signatures at risk, and the public Arc materials do not commit to implementing post-quantum computing (PQC) protections. In fact, they don't even mention them at all. 

Table showing blockchain layers, their cryptography roles, and quantum risks. The Application Layer has low risk, the Transaction Layer is marked critical due to elliptic curve signatures, and the Account and Consensus Layers are marked high-risk for quantum attacks.

That's a bit frightening, as the threat model is as straightforward as it is well-known at this point. Most EVM chains sign transactions with ECDSA over secp256k1. Ethereum's own developer docs explain how ECDSA signatures authenticate transactions, and ENISA's post-quantum brief reminds us that Shor's algorithm breaks ECC, which means an adversary with a sufficiently capable quantum computer can derive private keys from public keys.

The same class of risk exists in other ecosystems that use ECDSA over secp256k1 or use Ed25519, because both are elliptic-curve systems. For instance, Tron's docs state that its signature algorithm is ECDSA over secp256k1, while the XRP Ledger supports secp256k1 and Ed25519 key types. This is why security agencies are already pressing for migration to post-quantum secure system configurations today, rather than when it's too late. CISA, NSA, and NIST all advise that organizations should plan for “harvest now, crack later”, where adversaries collect data today to decrypt once quantum capabilities arrive.

Circle’s silence on a quantum threat matters because NIST has now finalized initial PQC standards, including FIPS 203 ML-KEM, FIPS 204 ML-DSA, and FIPS 205 SLH-DSA, and has already profiled stateful hash-based signatures like XMSS in SP 800-208. If Arc is meant to be trusted infrastructure for moving large volumes of money, its PQC migration path should be first-class, and loudly advertised.

Ethereum researchers are at least discussing viable pathways. One proposal outlines a backward-compatible post-quantum migration via new transaction types or account-abstraction schemes. Work across the ecosystem explores hybrid signature models where transactions are signed by both a classical and a PQ algorithm during transition. Arc can attempt similar approaches, but it has not publicly said that it will.

Not all chains have made the same oversight; consider the Quantum Resistant Ledger (QRL). QRL has long implemented XMSS-secured accounts, and XMSS is explicitly included in NIST SP 800-208. No one is arguing that Arc must adopt XMSS in particular, the point is that a credible PQC story is a must in 2025, and the actual implementation of it can be engineered without torching developer or user experiences.

Comparative Posture And Signature Choices

Arc isn't alone in attempting to process stablecoin transactions at scale without building out the full set of security features needed for the future:

Network

Default signature primitives

Public PQC posture today

Arc

EVM-compatible stack implying secp256k1 ECDSA for accounts

No PQC commitment in launch blog

Ethereum

ECDSA secp256k1 for transactions

Researching PQ migration paths

Tron

ECDSA over secp256k1

No published PQC plan in docs

XRP Ledger

secp256k1 or Ed25519

Community discussion on Dilithium support

QRL

XMSS hash-based signatures

Built to be post-quantum by design

In more concrete terms, companies and investors will look for a credible plan to evolve signatures and keys, and eventually, signs of progress. It's also worth noting that national security programs intend to phase out all equipment and services that cannot support CNSA 2.0 prior to 2030, which is directly relevant to capital-markets-grade infrastructure. And yes, government-issued materials do tend to be part of the information set that investors with a lot of capital use to decide where to park their money.

How To Fix The Gap

Circle markets Arc as reliable, compliant rails. That goal is incompatible with avoiding a PQC commitment until after mainnet launches. The risk is that adversaries are already harvesting now to decrypt later. If important account data, proofs, or attestations are captured in 2026, they can be weaponized when quantum capabilities mature.

Here is a crisp set of asks that would put the issue to bed sooner rather than later:

  1. Publish a key-management and signature roadmap that targets support for FIPS 204 ML-DSA or FIPS 205 SLH-DSA for user accounts and validators.

  2. Adopt a staged hybrid model where transactions can be dual-signed by a classical and a PQ scheme during migration, following documented hybrid patterns.

  3. Describe how opt-in privacy will accommodate PQ proofs, since Arc already references selectively shielded balances.

  4. Coordinate with ecosystem standards so that developer ergonomics match what Ethereum researchers are exploring, for example backward-compatible PQ transaction types.

None of this is speculative science so much as it's an emerging set of best practices which have not yet been widely distributed. The NIST standards exist, and there are live networks like QRL that run XMSS. Ethereum research groups are socializing how to get from here to there, and industry guidance from CISA, NSA, and NIST has been explicit about timelines and urgency, including the 2030 objective.

What Investors And Developers Should Do Next

If you are a developer building on Arc, ask for a dated PQC roadmap and a testnet plan that exercises signatures at production-grade load. If you are an investor weighing Arc's go-to-market, discount “trusted infrastructure” claims until a PQC path is documented and staffed. Addressing Circle's new stablecoin quantum threat is the single most tractable design choice Arc can use to differentiate itself before the 2026 mainnet beta.

If Arc is truly about trust and reliability, then proving that begins with cryptography. There is still time to get this right.

To keep up with the latest in blockchain technology and quantum computing, join us on X and .

Sources:

Christopher Smith's close up photo
Editor-in-Chief
Christopher Smith

Serial Entrepreneur, Hacker, Engineer, Musician.
With a rich career in AI leadership, blockchain innovation, and quantum technology, Chris brings a unique blend of technical mastery and philosophical insight. He continues to push the boundaries of what's possible, driven by a belief that technology, wielded thoughtfully, can redefine humanity's future for the better.

Related Insights

quantum canary's logo

Sponsored by: