Article preview
“The short answer: receiving is PQ-safe, spending is not.”Original post: Pranshu Rastogi on X, March 9, 2026
The short version
SPECTER already upgrades the recipient privacy layer to ML-KEM-768. That is the part that decides whether outsiders can map a public announcement back to you. But once the payment needs to become a spendable Ethereum wallet output, the current implementation derives asecp256k1 key so it can work with today’s wallet stack.
That is the tradeoff.
Why receiving is the strong side
Inspecter/specter-stealth/src/payment.rs, the sender:
- encapsulates to
viewing_pk - gets a shared secret
- computes the
view_tag - derives the one-time destination
- publishes the announcement
specter/specter-crypto/src/kyber.rs.
That means the on-chain discovery breadcrumb is not resting on classical ECDH.
Why spending is still classical
Inspecter/specter-crypto/src/derive.rs, the shared secret is turned into a valid Ethereum-compatible seed:
derive_eth_address_from_seedderives the addressderive_stealth_keysreturns a private key object- the scan API exposes
eth_private_key
The honest product statement
SPECTER today offers post-quantum recipient privacy and classical spend compatibility.
What could close the gap?
ERC-4337 smart accounts
ERC-4337 already lets smart accounts define their own verification logic. The standard explicitly says thesignature field usage is defined by the smart account implementation, and validateUserOp is where that verification happens.
That creates a path for PQ signature validation inside smart accounts.
Source: ERC-4337
EIP-8141 frame transactions
As of January 29, 2026, EIP-8141 is a draft proposal for frame transactions. Its abstract says transaction validity and gas payment can be defined abstractly and may use any cryptographic system. That makes it the cleanest native-looking future path for post-quantum validation on Ethereum, if it progresses.A realistic SPECTER path
- Keep ML-KEM for recipient privacy and discovery.
- Move spending into smart-account style validation.
- Replace ECDSA verification with a PQ signature scheme when the account layer is ready.
