Keccak256(block_header)
SHA3-256(dilithium_sig)
STARK_proof_commitment
VRF_output_randomness
RANDAO_reveal_aggregate

QUANTUMWING // POST-QUANTUM BRIDGE

Production-grade cross-chain infrastructure secured by Dilithium Mode-3, ZK-STARK proofs, and deterministic timelock enforcement.

Launch Explorer Documentation

Consensus Layer

DILITHIUM MODE-3

VRF-based slot selection with canonical byte encoding. Every block and attestation is post-quantum hardened using NIST-approved lattice cryptography.

Genesis RANDAO Commit VRF Selection Block Proposal Dilithium Signature Finality
Signature Algorithm
Dilithium Mode 3
3293-byte quantum-safe signatures
Block Time
12 seconds
32 slots per epoch
Finality
BFT 2/3+ supermajority
2 epoch lag (384s)
Hash Function
Keccak-256
Ethereum-compatible, quantum-safe

PQC Committee

7-of-10 MULTISIG

Byzantine fault-tolerant attestation system. Each validator submits Dilithium signatures directly to beacon state via /api/v1/bridge/attest.

Committee Size
10 Validators
Registered in beacon state
Threshold
7 Signatures Required
70% supermajority (Byzantine tolerant)
Signature Type
Dilithium Mode 3
SHA3(BID || validatorID || timestamp)
BID Lifecycle
PENDING → ATTESTED
Automatic transition at 7/10 threshold

ZK-STARK Proof Engine

RUST FFI

Real Rust backend producing ~9.9 KB proofs per epoch. Go ↔ Rust FFI verified with byte-perfect commitment matching (Keccak-256 hashing).

ATTESTED BIDs Sort & Encode Keccak-256 Commitment Rust Prover (FFI) STARK Proof (~9.9KB) PROVEN State
Proof System
STARK (Transparent)
No trusted setup required
Proof Size
~9,900 bytes
Per epoch batch aggregation
Hash Alignment
Keccak-256 (Go ≡ Rust)
Verified byte-perfect matching
Backend
Rust + cgo FFI
Native library integration

Timelock Vault

AMOUNT + RISK TIERS

Deterministic delay enforcement from 5 minutes to 24 hours. Once proof verified, timelock starts automatically and transitions to READY when expired.

Tier 1 (0-10 ETH)
5 minutes
Low risk multiplier: 1.0x
Tier 2 (10-100 ETH)
10 minutes
Base delay × 2
Tier 3 (100-1000 ETH)
20 minutes
Base delay × 4
Tier 4 (1000+ ETH)
40 minutes - 24 hours
High risk: up to 8x multiplier
Automatic Transitions:
PROVEN → READY (when timelock expires)
READY → REDEEMED (when user claims wrapped tokens)

Redemption Module

QWETH WRAPPER

READY BIDs automatically unlock QWETH minting through pre-defined flows. Wraps legacy assets in PQC-only vaults: Dilithium + STARK + Timelock layers.

Sepolia Lock BID Creation 7/10 PQC Attest STARK Proof Timelock Wait QWETH Mint
Wrapped Assets
QWETH (ERC-20)
Quantum Wrapped ETH
Contract Type
WASM (QWVM)
QuantumWing Virtual Machine
Mint Authorization
Bridge Operator
Dilithium Mode 3 signed
Storage
u128 Balances
16-byte little-endian precision

Three-Layer Architecture

ETHEREUM 2.0 PATTERN

Complete separation of concerns: Validators propose, Beacon validates consensus, Execution processes state. Dual API access allows validators to query both layers.

VALIDATOR LAYER
Independent Validators
↓ REST API Communication
BEACON CHAIN
PoR Consensus VRF Selection Dilithium Verify
↓ Engine API
EXECUTION LAYER
Transaction Pool State Updates Persistent Storage
Architecture
Ethereum 2.0 Pattern
Complete layer separation
Block Time
12 seconds
VRF-based proposer selection
Epoch Duration
32 slots (6.4 minutes)
RANDAO commit-reveal
Finality
~12.8 minutes
BFT 2/3+ supermajority

P2P Networking

LIBP2P + GOSSIPSUB

Multi-node synchronization with DHT peer discovery, GossipSub block propagation, and mDNS for local networks. Quantum-safe validation at every hop.

Discovery
mDNS + Kademlia DHT
Auto-discovery <1s (local), 30s (public)
Block Gossip
GossipSub PubSub
Topic-based block propagation
Attestation Propagation
Multi-node finalization
Byzantine fault tolerant sync
Chain Sync
Batch backfill (100 blocks)
Dilithium verification per block
Multi-Node Validated:
✓ Perfect synchronization across nodes
✓ Attestation propagation verified
✓ Zero verification errors
✓ Scales to 100+ node networks

QWVM Smart Contracts

WEBASSEMBLY

WebAssembly contract execution with quantum-safe host functions. Deploy contracts in Rust, Go, C++, or AssemblyScript with 5 quantum-safe host functions.

WASM Deploy SHA3-256 Address QWVM Execution Gas Metering Storage Update
Contract Languages
Rust, Go, C++, AssemblyScript
Any language → WASM → Deploy
Host Functions
5 quantum-safe APIs
RANDAO, SHA3, balance, storage, caller
Address Derivation
SHA3-256(bytecode)[last 20 bytes]
Deterministic contract addresses
Storage Model
Isolated key-value per contract
BadgerDB with ZSTD compression

Wallet & JSON-RPC

ETHEREUM-COMPATIBLE

Professional CLI wallet with JSON-RPC 2.0 API. Ethereum-style hex format, sequential nonce, and 8 qw_* methods for Web3 integration.

CLI Commands
generate, balance, send
Full quantum-safe wallet management
JSON-RPC Methods
8 qw_* methods
Ethereum-compatible API
Faucet
10 ETH per request
24-hour cooldown, production-ready
Transaction Signing
Server-side Dilithium Mode 3
3293-byte quantum-safe signatures
Wallet Features:
✓ Dilithium Mode 3 quantum-safe signing
✓ EVM-compatible address format (0x)
✓ Sequential nonce replay protection
✓ Ethereum-style hex encoding

Monitoring & Analytics

GRAFANA + PROMETHEUS

Production-grade observability with 14-graph Grafana dashboard, 18 custom Prometheus metrics, and real-time explorer API for network statistics.

Grafana Dashboard
14 graphs, 5s refresh
Slot/epoch, validators, attestations
Prometheus Metrics
18 custom metrics
Chain height, gas fees, mempool, peers
Explorer API
12 REST endpoints
Stats, top holders, validators, search
Storage Engine
BadgerDB + ZSTD
100k+ ops/sec, ~60% compression

Technology Comparison

Feature QuantumWing Ethereum Bitcoin Solana Polygon
Signature Algorithm Dilithium Mode 3 (PQC) ECDSA/BLS (quantum-vulnerable) ECDSA (quantum-vulnerable) Ed25519 (quantum-vulnerable) ECDSA (quantum-vulnerable)
Quantum Resistance NIST PQC Level 3 (192-bit) None (Shor's breaks ECDSA) None (Shor's breaks ECDSA) None (Shor's breaks Ed25519) None (inherits Ethereum)
Consensus Mechanism PoR (VRF + RANDAO) PoS (Casper FFG) PoW (SHA-256) PoH + PoS PoS (Ethereum fork)
Block Time 12 seconds 12 seconds ~10 minutes 400ms 2 seconds
Finality BFT ~12.8 min ~12.8 min Probabilistic (6+ blocks) ~13 seconds ~2-3 min
Smart Contracts WASM (multi-language) EVM (Solidity/Vyper) Limited (Script) Rust (eBPF) EVM (Solidity)
Transaction Throughput 2,000 TPS (verified) ~30 TPS (L1) ~7 TPS 65,000 TPS (theoretical) ~7,200 TPS
Cross-Chain Bridge PQC + ZK-STARK + Timelock External bridges (ECDSA) External bridges Wormhole (ECDSA) Plasma bridge (ECDSA)
Bridge Security 7-of-10 Dilithium multisig Varies (ECDSA multisig) N/A 13-of-19 ECDSA ECDSA multisig
ZK Proof System STARK (transparent) None (L2 only) None None (L1) zkEVM (L2)
Timelock Protection Amount + risk tiers (5m-24h) Manual (smart contracts) CheckLockTimeVerify Manual Manual
Address Format EVM (0x, 20 bytes) EVM (0x, 20 bytes) Base58 (P2PKH/P2SH) Base58 (32 bytes) EVM (0x, 20 bytes)
Energy Efficiency PoR (PoS-based, low energy) PoS (low energy) PoW (high energy) PoH + PoS (low) PoS (low energy)
Launch Year 2025 (quantum-ready) 2015 (pre-quantum) 2009 (pre-quantum) 2020 (pre-quantum) 2017 (pre-quantum)
Quantum Threat Timeline Protected today Vulnerable by 2030-2035 Vulnerable by 2030-2035 Vulnerable by 2030-2035 Vulnerable by 2030-2035

Production Stats (Verified)

Signature Size:
3,293 bytes (Dilithium Mode 3)
Public Key Size:
1,952 bytes (quantum-safe)
Block Size:
3,409 bytes canonical header
STARK Proof:
~9,900 bytes per epoch
Signature Time:
~800 μs (signing)
~300 μs (verification)
Storage Compression:
~60% with ZSTD
Test Coverage:
39 consensus tests (100% pass)
Network Tested:
Multi-node validated
System Status
Bridge Pipeline
OPERATIONAL
PQC Committee
ACTIVE
Consensus
FINALIZING
ZK Proofs
VERIFIED
Timelock
ENFORCED
Network
SYNCED