KeyCoin — Post-Economic EraKeyCoin — Post-Economic Era
Home
Whitepaper
Token
Tech
Governance
Roadmap
FAQ
  • 中文
  • English
GitHub
Home
Whitepaper
Token
Tech
Governance
Roadmap
FAQ
  • 中文
  • English
GitHub
  • Docs

    • /en/
    • The Post-Economic Era: A Whitepaper on an Electricity-Driven AI Abundance Economy
    • Key Coin Tokenomics
    • Technical Architecture
    • Governance System
    • Roadmap
    • FAQ

Technical Architecture

Seven-Layer Infrastructure Stack

LayerResponsibility
PhysicalClean energy nodes, smart meters, automated factories, autonomous delivery hardware
NetworkDecentralized message routing, content-addressed storage, compute scheduling
ProtocolERC20 token, PoG consensus, governance voting, cross-chain conversion
ServiceAI contribution quantification, value assessment, identity management, data aggregation
ApplicationUser-facing creation, production, social, and logistics tools

Proof-of-Generation (PoG)

Unlike PoW/PoS traditional mining. Generation is proof.

  • ≥3 independent Oracles cross-verify
  • Deviation > 5%: slashing of staked Key Coin
  • Upon verification: PoG-NFT minted, recording kWh, timestamp, geolocation, AI output

AI Contribution Assessment

Core Formula:

Vt=∑iwi×(eit×cit)V^t = \sum_{i} w_i \times (e_i^t \times c_i^t) V​t​​=​i​∑​​w​i​​×(e​i​t​​×c​i​t​​)

Dimension (i)(i)(i)MeaningExample Weight
1Power contributionBase weight, non-forgeable
2Original designAI computes semantic distance
3Community interactionDeep engagement weighted > shallow likes
4Iterative optimizationIncremental contribution from derivative works

90-99% Approval Mechanism

Multi-round voting → proposal iteration → converging toward consensus. Eliminates 51% tyranny-of-the-majority.

Contract Architecture

ContractAddressFunctionVerified
KeyCoinAnchor0xf2ad...4138ERC20 + Minting✅
KeyCoinLocking0x2c5b...291fLock-up + Time-Weighted Voting✅
KeyCoinGovernor0x87a0...6f91Council + Proposals✅
QuantumMigrationCommitment0x186a...0DFcQuantum Safety Commitment✅

Post-Quantum Cryptography (PQC) Technical Architecture

Key Coin solemnly commits: complete network-wide PQC migration before quantum computers pose a material threat to ECDSA. This commitment is irrevocable and enshrined in the QuantumMigrationCommitment contract.

Threat Model

Quantum computers threaten blockchains from three directions:

Shor's Algorithm — The Asymmetric Crypto Terminator

Shor's algorithm breaks the mathematical foundations of RSA and ECDSA in polynomial time. Ethereum's secp256k1 curve is defenseless against a sufficiently fault-tolerant quantum computer.

N=p×q→f(x)=ax\bmodN→QFT finds period r→p,q=gcd(ar/2±1,N)N = p \times q \quad\rightarrow\quad f(x) = a^x \bmod N \quad\rightarrow\quad \text{QFT finds period } r \quad\rightarrow\quad p,q = \gcd(a^{r/2} \pm 1, N) N=p×q→f(x)=a​x​​\bmodN→QFT finds period r→p,q=gcd(a​r/2​​±1,N)

Grover's Algorithm — The Symmetric Crypto Weakening

Grover's algorithm reduces brute-force search complexity from O(N)O(N)O(N) to O(N)O(\sqrt{N})O(√​N​​​). Keccak-256's preimage resistance drops from 256-bit to 128-bit. Countermeasure: extend hash output to 384-bit or use SHAKE-256 directly.

HNDL (Harvest Now, Decrypt Later) — The Most Urgent Threat

Attackers intercept and store encrypted transaction data today, decrypting it once quantum computers mature. Even if quantum computers are 5-10 years away, data requiring long-term confidentiality is already at risk.

NIST Standardization Landscape

NIST launched the global PQC algorithm competition in 2016. On August 13, 2024, the first three FIPS standards were officially published:

FIPS StandardAlgorithm NameMath BasisPurposeNIST Security Level
FIPS 203ML-KEM (CRYSTALS-Kyber)Lattice (Module-LWE)Key Encapsulation (KEM)1 / 3 / 5
FIPS 204ML-DSA (CRYSTALS-Dilithium)Lattice (MLWE/MSIS)Digital Signature2 / 3 / 5
FIPS 205SLH-DSA (SPHINCS+)Hash FunctionsDigital Signature (Backup)1 / 3 / 5

In March 2025, NIST selected the code-based algorithm HQC for additional KEM standardization, achieving a "lattice + code + hash" triangulation.

Global Migration Timeline Consensus

TimelineEventSource
2025Software/firmware signing, browsers/servers → PQC defaultNSA CNSA 2.0
2027Operating systems → PQC defaultNSA CNSA 2.0
2028Organizations complete crypto asset discovery, formulate migration plansNCSC
2030Deprecate ≤112-bit classical asymmetric algorithms (incl. RSA-2048)NIST IR 8547
2031High-priority systems complete PQC migrationNCSC
2035Full ban on classical asymmetric crypto, PQC migration completeNIST + NCSC + EU

Algorithm Families

Lattice-Based — The Workhorse

Security relies on SVP (Shortest Vector Problem) and CVP (Closest Vector Problem) in high-dimensional lattices, both NP-hard.

ML-KEM (Kyber) — Key Encapsulation

Built on the Module-LWE problem. Intuition: given many "noisy" linear equations A⋅s+e=bA \cdot s + e = bA⋅s+e=b, recovering the secret vector sss from bbb is hard in both classical and quantum settings.

Process:

  1. Key Generation: random matrix AAA + small secret vector sss → public key (A,t=A⋅s+e)(A, t = A \cdot s + e)(A,t=A⋅s+e)
  2. Encapsulation: encrypt with rrr → ciphertext (u,v)(u, v)(u,v) → derive shared key
  3. Decapsulation: recover shared key from ciphertext using sss (leverages bounded error correction)

Performance benchmark: 6000 encapsulations/sec, 3500 key pairs/sec.

ML-DSA (Dilithium) — Digital Signature

Adopts the Fiat-Shamir with Aborts paradigm. If the response vector zzz coefficient is too large during signing, "abort" and retry, preventing secret vector distribution leakage.

Key feature: supports batch signature verification — in "single key + multiple messages" scenarios, 20%-50% faster than per-message verification.

Performance benchmark: 1000 signatures/sec, 3000 verifications/sec.

Hash-Based — The Conservative Backup

SLH-DSA (SPHINCS+) depends only on hash function collision resistance, making it the most conservative security assumption.

Structure: WOTS+ one-time signatures → Merkle Tree aggregation → Hypertree multi-layer nesting.

Trade-off: signature size 8-50 KB (vs ECDSA's 64 bytes, Dilithium's ~2.4 KB), signing speed 1-2 orders of magnitude slower. Used only as backup in high-frequency TLS handshakes.

Code-Based — Diversity Assurance

HQC is based on the syndrome decoding problem (NP-complete), having withstood 40+ years of cryptanalysis since the original McEliece scheme in 1978. NIST selected it as Kyber's "mathematically distinct" backup — should a theoretical breakthrough compromise lattice-based cryptography, HQC provides an escape path.

Key Coin PQC Migration Architecture

Hybrid Signature Mode — The Transition Core

Key Coin employs Hybrid AND mode (not OR):

Valid Signature=ECDSA(secp256k1) verifies AND ML-DSA(Dilithium) verifies\text{Valid Signature} = \text{ECDSA}(secp256k1) \text{ verifies } \mathbf{AND} \text{ ML-DSA}(Dilithium) \text{ verifies} Valid Signature=ECDSA(secp256k1) verifies AND ML-DSA(Dilithium) verifies

Not "either/or" — both must pass to be valid. Prevents attackers from downgrading to ECDSA-only weak mode.

Crypto-Agility Design

Core principle: algorithm selection decoupled from business logic. Never hard-code algorithms in contracts.

// ❌ Hard-coded — unacceptable
require(ecrecover(hash, v, r, s) == signer, "invalid")
// ✅ Crypto-agile — upgradeable
interface ISignatureVerifier {
    function verify(bytes32 hash, bytes calldata signature, address claimedSigner)
        external view returns (bool);
}

Verifier contracts are pluggable: ECDSAVerifier → HybridVerifier → DilithiumVerifier, with zero changes to business contracts.

Five-Tier Threat Response Mechanism

TierNameTrigger ConditionSystem BehaviorUser Action
0NONECurrent stateNormal operation, PQC libraries continuously integrated on testnetNone required
1AWAREQuantum computing theoretical breakthrough (Shor's algorithm experimentally verified ≥ 10 qubits)Deploy Dilithium verifier on testnet, open PQC key registrationOptional: generate PQC key pair early
2CONCERNEDLogical qubits > 1000 or equivalent fault-tolerant qubits > 100Hybrid signature mode live, ECDSA + ML-DSA dual verificationRecommended: register PQC public key hash
3CRITICALQuantum computer approaching 256-bit ECDSA break (estimated ≥ 5000 logical qubits)Auto-freeze non-PQC high-value TX (>100K KEY), 90-day migration deadlineRequired: complete PQC key registration
4BREACHEDECDSA actually brokenOnly PQC signatures valid, non-PQC TX permanently rejectedNon-PQC addresses frozen, recovery via governance proposal

Escalation Flow

Each tier change requires:

  1. ≥ 3 quantum security expert committee members' multi-sig confirmation
  2. IPFS evidence link attached (academic papers, NIST bulletins, industry reports)
  3. On-chain event permanently recorded

Key & Signature Size Comparison

AlgorithmPublic KeyPrivate KeySignature/CiphertextSecurity Level
ECDSA (secp256k1)33 B32 B64 BClassical 128-bit
ML-DSA (Dilithium)1.3 KB2.5 KB2.4 KBNIST L2 (128-bit PQ)
ML-DSA (Dilithium-5)2.6 KB4.9 KB4.6 KBNIST L5 (256-bit PQ)
SLH-DSA (SPHINCS+-128s)32 B64 B7.9 KBNIST L1
FN-DSA (Falcon-1024)1.8 KB2.3 KB1.3 KBNIST L5
ML-KEM (Kyber-768)1.2 KB2.4 KB1.1 KB (ciphertext)NIST L3

Side-Channel Attacks & Fault Injection Defense

Mathematical security of PQC algorithms ≠ physical implementation security. High-performance implementations (e.g., NTT number theoretic transform) may leak secrets through power consumption, timing, or electromagnetic radiation.

Known Attack Vectors

Attack TypeTargetMethodConsequence
Differential Power Analysis (DPA)Kyber / DilithiumCollect tens of thousands of power traces, statistical analysisRecover secret polynomials
Template AttacksLattice implementationsProfile known-key device → attack unknown deviceRecover full private key
Fault Injection (FI)Dilithium abort checkSkip loop check → collect faulty signaturesFew faulty signatures recover private key
Timing Attacks"Constant-time" implementationsExploit compiler optimization / CPU microarchitecture differencesLeak secret bits

Key Coin Defense Strategy

LayerCountermeasure
SoftwareStrict constant-time coding, masking + shuffling dual protection
HardwareExecute signing inside HSM/TPM, physically isolate keys, built-in side-channel mitigation
ProtocolHybrid AND mode: even if PQC implementation has flaws, ECDSA side still provides protection
GovernanceExpert committee continuously monitors PQC implementation security advisories, emergency contract upgrades when needed

User Migration Flow

THREAT = 0-1 (Current): Normal ECDSA usage, no action required
    ↓
THREAT = 2 (CONCERNED): Generate Dilithium key pair → register PQC public key hash on-chain → system auto-enables hybrid signing, zero friction
    ↓
THREAT = 3 (CRITICAL): 90-day countdown begins, all high-value TX must use hybrid signing, non-migrated → frozen

PQC Public Key Registration TX: registerPQCKey(bytes32 pqcPubKeyHash)

  • Only submit public key hash (32 bytes), minimal on-chain storage overhead
  • After registration, address binds both ECDSA public key (implicit, i.e., address) and PQC public key hash
  • Updatable (72-hour timelock to prevent hijacking)

On-Chain Contract Architecture

QuantumMigrationCommitment Core Interface:

interface IQuantumMigrationCommitment {
    function currentThreatLevel() external view returns (uint8);
    function upgradeThreatLevel(uint8 newLevel, string calldata evidenceIPFS) external;
    function migrationDeadline() external view returns (uint256);
    function registerPQCKey(bytes32 pqcPubKeyHash) external;
    function pqcKeyRegistered(address user) external view returns (bool, bytes32);
    function verifyHybrid(bytes32 hash, bytes calldata ecdsaSig, bytes calldata pqcSig, address claimedSigner) external view returns (bool);
}

Current on-chain data: threat level = 2 (CONCERNED) ✅

Global Standards Alignment

Key Coin PQC ArchitectureNIST / Global StandardStatus
ML-DSA (Dilithium)FIPS 204✅
ML-KEM (Kyber)FIPS 203✅
SLH-DSA (SPHINCS+)FIPS 205✅
HQCNIST Round 4✅ Monitoring
2035 Full MigrationNIST IR 8547 / NCSC✅
Hybrid AND ModeNIST Whitepaper Recommended✅
Crypto-AgilityNIST Crypto-Agility Principles✅
Contributors: ryckli
Prev
Key Coin Tokenomics
Next
Governance System