April 7, 2026 · Eric Beans, CEO · H33.ai, Inc.

How H33 Can Demo Post-Quantum Security with Solana

Project Eleven ran a post-quantum signature test on Solana. TPS dropped 90%. The narrative is now that post-quantum cryptography kills blockchain performance. That narrative is wrong. Bad engineering kills performance. Post-quantum cryptography, implemented correctly, is faster than the classical systems it replaces. We can prove it. This is the plan.

The 90% Drop Was an Implementation Problem

Solana lost 90% of its throughput when post-quantum signatures were tested on the network. This result is now being cited as evidence that blockchains cannot migrate to quantum-resistant cryptography without destroying their performance characteristics.

That conclusion is backwards.

The 90% drop happened because the test implementation treated post-quantum signatures as a naive drop-in replacement for Ed25519. Larger signatures consumed more bandwidth. Heavier verification consumed more compute per validator. The network choked on the overhead because the implementation did not account for the fundamental differences between classical and post-quantum cryptographic operations.

The problem was never the cryptography. Dilithium signatures are computationally heavier than Ed25519. That is a fact. But "heavier" does not mean "slow" — it means the implementation has to be engineered for the workload. You do not drop a V8 engine into a go-kart frame and blame the engine when it does not handle. You build the frame for the engine.

H33 built the frame for the engine.

The Numbers

No preamble. No qualifiers.

MetricH33 ProductionNotes
Sustained throughput2,209,429 ops/sec120-second run, ±0.71% variance
Per-operation latency35.25µsFull PQ pipeline, not just signing
Batch latency (32 users)1,128µsFHE + Dilithium + STARK + ML agents
Dilithium sign + verify291µs per 32-user batchAmortized: 9.1µs per signature
ZK-STARK verification0.059µsIn-process DashMap cache
HardwareGraviton4 ARMSingle machine. No GPUs. No ASICs.

Each operation is not a hash. It is not a passthrough. It is the full post-quantum pipeline: BFV fully homomorphic encryption over biometric templates, Dilithium-3 signature attestation, ZK-STARK proof verification, and three ML-based threat detection agents. Every component is post-quantum. Every component runs in that 35.25 microseconds.

Solana's theoretical maximum is 65,000 TPS. H33 processes 34 times that on one machine. The performance problem does not exist at this implementation quality.

Why H33 Is Fast and Project Eleven's Test Was Not

The difference is engineering, not magic. Specific decisions that produce specific results:

None of these optimizations are theoretical. Every one was measured on production hardware over 120-second sustained runs. The methodology and benchmark source code are published.

The lesson from the 90% drop: Post-quantum cryptography is not slow. Unoptimized post-quantum cryptography is slow. The same way unoptimized anything is slow. Solana itself was slow before Anatoly's team spent years engineering Tower BFT and Turbine and Gulf Stream. The cryptography needs the same engineering attention. H33 has done that work.

The Demo Plan

This is what we build, how we test it, and what it proves.

Week 1-2: Devnet Integration

Deploy a Solana program on devnet that generates H33 post-quantum attestations for every transaction. No changes to consensus. No wallet modifications. No UX disruption.

The flow:

  1. User signs with Ed25519 as normal.
  2. Transaction payload hits the H33 API.
  3. H33 returns three independent PQ signatures (Dilithium + FALCON-1024 + SPHINCS+), a ZK-STARK proof, and an ML threat score.
  4. Commitment hash is anchored on-chain via a Solana PDA.

Three-key nested signatures — three different mathematical families. Dilithium is lattice-based. FALCON is NTRU-based. SPHINCS+ is hash-based. If any one family falls to a novel mathematical attack, the other two still hold. No other production system does this.

const attestation = await h33.attest({
  tx_hash: signature,
  payload: message.serialize(),
  algorithms: ['dilithium3', 'falcon1024', 'sphincsplus'],
  zk_proof: true,
  ml_threat_scan: true
});
// 3 independent PQ signatures + STARK proof + threat score
// Total latency: <50µs including serialization

Week 2-3: Throughput Test

Push devnet to sustained load. Attest every transaction. Publish the numbers.

TargetValueWhy It Matters
Solana TPS5,000+ sustainedAbove typical mainnet load
H33 attestation latency<50µs per txInvisible to block production
H33 capacity utilization<0.3%5K of 2.2M = spare capacity everywhere
Coverage100%Every transaction gets a PQ attestation
Drops0Zero missed attestations at this load

At Solana's actual mainnet load, H33 uses less than a quarter of one percent of a single machine. At theoretical max, less than 3%. The attestation layer is not the bottleneck. It is not close to the bottleneck. It would not be the bottleneck if Solana 10x'd its throughput.

Week 3: Simulated Quantum Attack

This is the demo that makes it real.

  1. Create transactions on devnet. Each one signed Ed25519 and attested by H33.
  2. "Break" Ed25519 — mark all classical signatures as unverifiable.
  3. H33 attestations still verify. Dilithium holds. FALCON holds. SPHINCS+ holds.
  4. Now disable Dilithium (simulating a lattice-breaking advance). FALCON and SPHINCS+ still verify.
  5. Disable FALCON. SPHINCS+ still verifies alone.

The audience watches transactions survive a simulated quantum apocalypse. Three layers of protection, three independent mathematical foundations. The only way to break the attestation is to simultaneously solve three unrelated hard problems. That is the value of three-key nested signatures demonstrated live.

Week 3-4: Threshold Signing

Address the centralization question directly. Deploy 5 independent H33 attestation nodes. Each holds a Shamir secret share of the signing key. Any 3 of 5 must collaborate to produce a valid attestation. No single node has the complete key. If 2 nodes go down or are compromised, the system continues.

This is not theoretical. H33's 3-of-5 threshold decryption is in production.

Getting Off AWS Before Quantum Hits

The deeper strategic problem: Solana validators on AWS are double-exposed. Ed25519 is quantum-vulnerable. The TLS protecting validator communication is quantum-vulnerable. The KMS backing the HSMs is quantum-vulnerable. When a quantum computer arrives, the attacker does not need to break the blockchain — they break the infrastructure underneath it.

The migration path has four steps:

  1. Now: Add H33 PQ attestation to critical transactions on existing infrastructure. Quantum-resistant proofs are generated immediately, even over classical TLS. The attestation survives even if the transport layer is later compromised.
  2. Months 1-3: Migrate validator communication to PQ-TLS (ML-KEM key exchange + ML-DSA authentication). Less than 1ms overhead per handshake.
  3. Months 3-6: Move validators off centralized cloud to bare-metal or edge infrastructure with hardware-backed PQ key management. H33 is hardware-agnostic — runs on ARM, x86, ready for RISC-V.
  4. Months 6-12: Consensus-level PQ signature migration. By this point, the ecosystem has been running PQ attestations for months. The migration is a formalization of what is already in production.

Step 1 can start this week. No consensus changes. No validator upgrades. No wallet modifications. One API integration.

What the API Is and Is Not

The objection: "You are adding a centralized API to a decentralized system."

What the API is: an attestation service that generates cryptographic proofs over transactions that have already been authorized by users. It does not hold keys. It does not approve or reject transactions. It does not participate in consensus.

What happens if the API goes down: nothing. Solana continues processing transactions exactly as it does today. Transactions during the outage lack PQ attestations. When the service resumes, it picks up from the next transaction. No state to reconcile. No consensus to recompute.

The attestations are independently verifiable. Anyone with the public Dilithium/FALCON/SPHINCS+ verification keys can verify any attestation without contacting the H33 API. The math is the authority, not the service.

The service can be decentralized via threshold signing. 3-of-5 Shamir across independent nodes, different providers, different jurisdictions. This is demonstrated in the week 3-4 phase of the plan.

What We Need

  1. Devnet deployment access for a Solana program that writes PQ attestation commitments.
  2. Permission to run a load generator at sustained TPS on devnet.
  3. An engineering contact to review the on-chain program and discuss integration patterns.
  4. A 2-hour demo slot to walk through the throughput test, the quantum attack simulation, and the threshold signing.

H33 provides everything else.

The Point

Solana watched its TPS drop 90% in a post-quantum test. The conclusion should not be "post-quantum cryptography is too expensive for blockchains." The conclusion should be "that particular implementation was not production-grade."

H33 processes 2,209,429 post-quantum operations per second on a single ARM CPU. That is 34 times Solana's theoretical maximum. The performance gap between what was tested and what is possible is not incremental — it is orders of magnitude.

We can demonstrate this on Solana's devnet in weeks. No consensus changes. No wallet modifications. No infrastructure overhaul. The attestation layer runs alongside the existing network and proves that post-quantum security and high throughput are not in conflict.

The 90% slowdown was not a verdict on post-quantum cryptography. It was a verdict on that implementation. We have a different implementation. We would like to show you.

Live Speed Test

Don't take our word for it. Run 1,000 auths yourself.

Full post-quantum pipeline — FHE biometric + ZK-STARK + Dilithium attestation. Live on our Graviton4 production server. No caching, no shortcuts. Results in seconds.

Run the Speed Test →
Free · No API key required · Your browser, our server, real cryptography

Let's build the Solana demo

2.2M PQ ops/sec. 35µs per auth. Dilithium + FALCON + SPHINCS+. Single ARM CPU. Ready now.

Talk to Us →