How H33 Can Demo Post-Quantum Security with Solana
Project Eleven ran a post-quantum signature test on Solana. TPS dropped 90%. The narrative is now that post-quantum cryptography kills blockchain performance. That narrative is wrong. Bad engineering kills performance. Post-quantum cryptography, implemented correctly, is faster than the classical systems it replaces. We can prove it. This is the plan.
The 90% Drop Was an Implementation Problem
Solana lost 90% of its throughput when post-quantum signatures were tested on the network. This result is now being cited as evidence that blockchains cannot migrate to quantum-resistant cryptography without destroying their performance characteristics.
That conclusion is backwards.
The 90% drop happened because the test implementation treated post-quantum signatures as a naive drop-in replacement for Ed25519. Larger signatures consumed more bandwidth. Heavier verification consumed more compute per validator. The network choked on the overhead because the implementation did not account for the fundamental differences between classical and post-quantum cryptographic operations.
H33 built the frame for the engine.
The Numbers
No preamble. No qualifiers.
| Metric | H33 Production | Notes |
|---|---|---|
| Sustained throughput | 2,209,429 ops/sec | 120-second run, ±0.71% variance |
| Per-operation latency | 35.25µs | Full PQ pipeline, not just signing |
| Batch latency (32 users) | 1,128µs | FHE + Dilithium + STARK + ML agents |
| Dilithium sign + verify | 291µs per 32-user batch | Amortized: 9.1µs per signature |
| ZK-STARK verification | 0.059µs | In-process DashMap cache |
| Hardware | Graviton4 ARM | Single machine. No GPUs. No ASICs. |
Each operation is not a hash. It is not a passthrough. It is the full post-quantum pipeline: BFV fully homomorphic encryption over biometric templates, Dilithium-3 signature attestation, ZK-STARK proof verification, and three ML-based threat detection agents. Every component is post-quantum. Every component runs in that 35.25 microseconds.
Solana's theoretical maximum is 65,000 TPS. H33 processes 34 times that on one machine. The performance problem does not exist at this implementation quality.
Why H33 Is Fast and Project Eleven's Test Was Not
The difference is engineering, not magic. Specific decisions that produce specific results:
- Montgomery NTT with Harvey lazy reduction — Eliminates modular division from the polynomial multiplication hot path. Butterfly values stay in [0, 2q) between stages instead of being fully reduced. This is the single largest contributor to throughput.
- SIMD batching — 32 users packed into a single 4096-slot BFV ciphertext. The FHE cost is amortized across users, not paid per-user. This is why the per-operation latency is 35µs instead of 1,100µs.
- Batch attestation — One Dilithium sign+verify per 32-user batch instead of per-transaction. 31 fewer signature operations per batch. The signature size problem disappears when you stop signing every transaction individually.
- NTT-domain persistence — Enrolled templates stay in Number Theoretic Transform domain. Forward NTT is skipped on every verification because the data is already transformed. This eliminates the most expensive recurring operation.
- In-process ZK cache — ZK-STARK proofs verified via DashMap lookup at 59 nanoseconds. TCP-based cache (Cachee RESP) caused an 11x regression at 96 workers due to connection serialization. The cache is in-process or it is a bottleneck.
- System allocator on ARM — jemalloc regressed 8% on Graviton4. glibc's malloc is optimized for ARM's flat memory model. jemalloc's arena bookkeeping is pure overhead at 96 concurrent workers doing tight cryptographic loops.
None of these optimizations are theoretical. Every one was measured on production hardware over 120-second sustained runs. The methodology and benchmark source code are published.
The Demo Plan
This is what we build, how we test it, and what it proves.
Week 1-2: Devnet Integration
Deploy a Solana program on devnet that generates H33 post-quantum attestations for every transaction. No changes to consensus. No wallet modifications. No UX disruption.
The flow:
- User signs with Ed25519 as normal.
- Transaction payload hits the H33 API.
- H33 returns three independent PQ signatures (Dilithium + FALCON-1024 + SPHINCS+), a ZK-STARK proof, and an ML threat score.
- Commitment hash is anchored on-chain via a Solana PDA.
Three-key nested signatures — three different mathematical families. Dilithium is lattice-based. FALCON is NTRU-based. SPHINCS+ is hash-based. If any one family falls to a novel mathematical attack, the other two still hold. No other production system does this.
const attestation = await h33.attest({
tx_hash: signature,
payload: message.serialize(),
algorithms: ['dilithium3', 'falcon1024', 'sphincsplus'],
zk_proof: true,
ml_threat_scan: true
});
// 3 independent PQ signatures + STARK proof + threat score
// Total latency: <50µs including serialization
Week 2-3: Throughput Test
Push devnet to sustained load. Attest every transaction. Publish the numbers.
| Target | Value | Why It Matters |
|---|---|---|
| Solana TPS | 5,000+ sustained | Above typical mainnet load |
| H33 attestation latency | <50µs per tx | Invisible to block production |
| H33 capacity utilization | <0.3% | 5K of 2.2M = spare capacity everywhere |
| Coverage | 100% | Every transaction gets a PQ attestation |
| Drops | 0 | Zero missed attestations at this load |
At Solana's actual mainnet load, H33 uses less than a quarter of one percent of a single machine. At theoretical max, less than 3%. The attestation layer is not the bottleneck. It is not close to the bottleneck. It would not be the bottleneck if Solana 10x'd its throughput.
Week 3: Simulated Quantum Attack
This is the demo that makes it real.
- Create transactions on devnet. Each one signed Ed25519 and attested by H33.
- "Break" Ed25519 — mark all classical signatures as unverifiable.
- H33 attestations still verify. Dilithium holds. FALCON holds. SPHINCS+ holds.
- Now disable Dilithium (simulating a lattice-breaking advance). FALCON and SPHINCS+ still verify.
- Disable FALCON. SPHINCS+ still verifies alone.
The audience watches transactions survive a simulated quantum apocalypse. Three layers of protection, three independent mathematical foundations. The only way to break the attestation is to simultaneously solve three unrelated hard problems. That is the value of three-key nested signatures demonstrated live.
Week 3-4: Threshold Signing
Address the centralization question directly. Deploy 5 independent H33 attestation nodes. Each holds a Shamir secret share of the signing key. Any 3 of 5 must collaborate to produce a valid attestation. No single node has the complete key. If 2 nodes go down or are compromised, the system continues.
This is not theoretical. H33's 3-of-5 threshold decryption is in production.
Getting Off AWS Before Quantum Hits
The deeper strategic problem: Solana validators on AWS are double-exposed. Ed25519 is quantum-vulnerable. The TLS protecting validator communication is quantum-vulnerable. The KMS backing the HSMs is quantum-vulnerable. When a quantum computer arrives, the attacker does not need to break the blockchain — they break the infrastructure underneath it.
The migration path has four steps:
- Now: Add H33 PQ attestation to critical transactions on existing infrastructure. Quantum-resistant proofs are generated immediately, even over classical TLS. The attestation survives even if the transport layer is later compromised.
- Months 1-3: Migrate validator communication to PQ-TLS (ML-KEM key exchange + ML-DSA authentication). Less than 1ms overhead per handshake.
- Months 3-6: Move validators off centralized cloud to bare-metal or edge infrastructure with hardware-backed PQ key management. H33 is hardware-agnostic — runs on ARM, x86, ready for RISC-V.
- Months 6-12: Consensus-level PQ signature migration. By this point, the ecosystem has been running PQ attestations for months. The migration is a formalization of what is already in production.
Step 1 can start this week. No consensus changes. No validator upgrades. No wallet modifications. One API integration.
What the API Is and Is Not
The objection: "You are adding a centralized API to a decentralized system."
What the API is: an attestation service that generates cryptographic proofs over transactions that have already been authorized by users. It does not hold keys. It does not approve or reject transactions. It does not participate in consensus.
What happens if the API goes down: nothing. Solana continues processing transactions exactly as it does today. Transactions during the outage lack PQ attestations. When the service resumes, it picks up from the next transaction. No state to reconcile. No consensus to recompute.
The attestations are independently verifiable. Anyone with the public Dilithium/FALCON/SPHINCS+ verification keys can verify any attestation without contacting the H33 API. The math is the authority, not the service.
The service can be decentralized via threshold signing. 3-of-5 Shamir across independent nodes, different providers, different jurisdictions. This is demonstrated in the week 3-4 phase of the plan.
What We Need
- Devnet deployment access for a Solana program that writes PQ attestation commitments.
- Permission to run a load generator at sustained TPS on devnet.
- An engineering contact to review the on-chain program and discuss integration patterns.
- A 2-hour demo slot to walk through the throughput test, the quantum attack simulation, and the threshold signing.
H33 provides everything else.
The Point
Solana watched its TPS drop 90% in a post-quantum test. The conclusion should not be "post-quantum cryptography is too expensive for blockchains." The conclusion should be "that particular implementation was not production-grade."
H33 processes 2,209,429 post-quantum operations per second on a single ARM CPU. That is 34 times Solana's theoretical maximum. The performance gap between what was tested and what is possible is not incremental — it is orders of magnitude.
We can demonstrate this on Solana's devnet in weeks. No consensus changes. No wallet modifications. No infrastructure overhaul. The attestation layer runs alongside the existing network and proves that post-quantum security and high throughput are not in conflict.
The 90% slowdown was not a verdict on post-quantum cryptography. It was a verdict on that implementation. We have a different implementation. We would like to show you.
Don't take our word for it. Run 1,000 auths yourself.
Full post-quantum pipeline — FHE biometric + ZK-STARK + Dilithium attestation. Live on our Graviton4 production server. No caching, no shortcuts. Results in seconds.
Run the Speed Test →Let's build the Solana demo
2.2M PQ ops/sec. 35µs per auth. Dilithium + FALCON + SPHINCS+. Single ARM CPU. Ready now.
Talk to Us →