<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Prajwal AHER</title>
    <description>The latest articles on Forem by Prajwal AHER (@prajwalsher33).</description>
    <link>https://forem.com/prajwalsher33</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3815293%2F5ee540d9-1781-490f-9fe1-b7caa30220b4.jpg</url>
      <title>Forem: Prajwal AHER</title>
      <link>https://forem.com/prajwalsher33</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/prajwalsher33"/>
    <language>en</language>
    <item>
      <title>I built a blockchain where quantum computers have no mining advantage — here is how it works</title>
      <dc:creator>Prajwal AHER</dc:creator>
      <pubDate>Mon, 09 Mar 2026 18:16:14 +0000</pubDate>
      <link>https://forem.com/prajwalsher33/i-built-a-blockchain-where-quantum-computers-have-no-mining-advantage-here-is-how-it-works-1hlm</link>
      <guid>https://forem.com/prajwalsher33/i-built-a-blockchain-where-quantum-computers-have-no-mining-advantage-here-is-how-it-works-1hlm</guid>
      <description>&lt;p&gt;&lt;strong&gt;tags:&lt;/strong&gt; &lt;code&gt;blockchain&lt;/code&gt; &lt;code&gt;quantumcomputing&lt;/code&gt; &lt;code&gt;python&lt;/code&gt; &lt;code&gt;machinelearning&lt;/code&gt;&lt;/p&gt;




&lt;p&gt;Every blockchain security article talks about the same threat: Shor's algorithm breaking ECDSA keys. Quantum computer cracks your private key, steals your funds. That's real. NIST finalised its first post-quantum cryptography standards in 2024 precisely because this is coming.&lt;/p&gt;

&lt;p&gt;But nobody talks about the second problem.&lt;/p&gt;

&lt;p&gt;If you replace ECDSA with a post-quantum signature scheme and keep everything else the same — you have still left the door open for quantum hardware to dominate block production. Whoever builds the fastest quantum computer controls the chain. The US and China are both spending billions on this. That is a different kind of centralisation, and arguably worse because it is invisible until it is already too late.&lt;/p&gt;

&lt;p&gt;I spent several months building a blockchain from scratch that solves both problems. It is called &lt;strong&gt;XEQUES&lt;/strong&gt;. Here is exactly how it works.&lt;/p&gt;




&lt;h2&gt;
  
  
  The two problems most post-quantum blockchains ignore
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Problem 1 — Keys
&lt;/h3&gt;

&lt;p&gt;Bitcoin and Ethereum use ECDSA. Shor's algorithm breaks ECDSA completely. Every address that has ever broadcast a transaction has its public key on-chain. Those keys are being harvested right now. The harvest-now-decrypt-later attack is already happening: adversaries store blockchain data today to decrypt when hardware catches up.&lt;/p&gt;

&lt;p&gt;XEQUES uses &lt;strong&gt;Lamport One-Time Signatures&lt;/strong&gt; over SHA3-256. Lamport is the simplest and most auditable post-quantum signature scheme — it relies only on the hardness of inverting SHA3. No elliptic curves, no lattices, no trusted setup. Under Grover's algorithm (the best quantum attack on hash functions) it retains 2^128 security.&lt;/p&gt;

&lt;p&gt;Each wallet address is a &lt;strong&gt;Merkle tree of Lamport keypairs&lt;/strong&gt;. You get a tree of one-time keys. Each transaction consumes one leaf. When all leaves are used you generate a new wallet. The Merkle root is the wallet address.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# Wallet generation
&lt;/span&gt;&lt;span class="n"&gt;wallet&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nc"&gt;MerkleWallet&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;depth&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;10&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;  &lt;span class="c1"&gt;# 2^10 = 1024 one-time keys per wallet
&lt;/span&gt;&lt;span class="n"&gt;address&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;wallet&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;root_hash&lt;/span&gt;       &lt;span class="c1"&gt;# Merkle root is the address
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Problem 2 — Consensus
&lt;/h3&gt;

&lt;p&gt;This is the one nobody talks about.&lt;/p&gt;

&lt;p&gt;If consensus is a speed race — first node to solve the puzzle gets the block — then quantum hardware wins eventually. A quantum computer running at 1000x classical speed does not need 51% of stake. It just needs to be faster. Block production centralises around whoever has the best hardware.&lt;/p&gt;

&lt;p&gt;The fix is to use a puzzle that is equally hard for everyone, including quantum computers.&lt;/p&gt;




&lt;h2&gt;
  
  
  The #P-hard consensus mechanism
&lt;/h2&gt;

&lt;p&gt;XEQUES uses a &lt;strong&gt;Proof of Quantum Control VDF&lt;/strong&gt; (PoQC-VDF). The puzzle exploits a result from quantum complexity theory that most blockchain developers have never encountered.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Simulating a random quantum circuit in the anti-concentration regime is #P-hard.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not just NP-hard. #P-hard. This is the same hardness property behind Google's Sycamore experiment — the reason Google's paper claimed quantum advantage was that no classical algorithm can efficiently simulate their random circuit. But here is the critical insight:&lt;/p&gt;

&lt;p&gt;A quantum computer cannot efficiently simulate &lt;em&gt;another&lt;/em&gt; quantum computer's random circuit either.&lt;/p&gt;

&lt;p&gt;This hardness is symmetric. Classical hardware cannot do it fast. Quantum hardware cannot do it fast. The playing field is physically level.&lt;/p&gt;

&lt;p&gt;The circuit is constructed deliberately to land in the hard regime:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;random_vdf&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;n_qubits&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;5&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;depth&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="mi"&gt;8&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
    &lt;span class="sh"&gt;"""&lt;/span&gt;&lt;span class="s"&gt;
    Anti-concentration circuit construction:
    - T gates on every qubit per layer (non-Clifford, breaks Clifford shortcuts)
    - Random Rz rotations (continuous, blocks algebraic attacks)
    - Alternating brick CZ entanglement (drives anti-concentration)
    &lt;/span&gt;&lt;span class="sh"&gt;"""&lt;/span&gt;
    &lt;span class="n"&gt;circuit&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[]&lt;/span&gt;
    &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;layer&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="nf"&gt;range&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;depth&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
        &lt;span class="c1"&gt;# T gates — takes circuit outside Clifford group
&lt;/span&gt;        &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;q&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="nf"&gt;range&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;n_qubits&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
            &lt;span class="n"&gt;circuit&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;append&lt;/span&gt;&lt;span class="p"&gt;((&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;T&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;q&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
        &lt;span class="c1"&gt;# Random Rz rotations — continuous parameter space
&lt;/span&gt;        &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;q&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="nf"&gt;range&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;n_qubits&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
            &lt;span class="n"&gt;theta&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;random&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;uniform&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="n"&gt;math&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;pi&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
            &lt;span class="n"&gt;circuit&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;append&lt;/span&gt;&lt;span class="p"&gt;((&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;Rz&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;q&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;theta&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
        &lt;span class="c1"&gt;# Brick CZ entanglement — alternating pattern (Sycamore style)
&lt;/span&gt;        &lt;span class="n"&gt;pairs&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[(&lt;/span&gt;&lt;span class="n"&gt;q&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;q&lt;/span&gt;&lt;span class="o"&gt;+&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;q&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="nf"&gt;range&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;layer&lt;/span&gt;&lt;span class="o"&gt;%&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="o"&gt;==&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="k"&gt;else&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;n_qubits&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="p"&gt;)]&lt;/span&gt;
        &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;pair&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;pairs&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
            &lt;span class="n"&gt;circuit&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;append&lt;/span&gt;&lt;span class="p"&gt;((&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="s"&gt;CZ&lt;/span&gt;&lt;span class="sh"&gt;'&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;pair&lt;/span&gt;&lt;span class="p"&gt;))&lt;/span&gt;
    &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="n"&gt;circuit&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Every submitted answer is checked for correctness AND for whether the circuit was actually in the hard regime. XEQUES measures the second moment of the output distribution against the Porter-Thomas target (2/2^n). Puzzles outside the hard regime are rejected.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;is_in_hard_regime&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;distribution&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
    &lt;span class="n"&gt;n&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;len&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;distribution&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
    &lt;span class="n"&gt;second_moment&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;sum&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;p&lt;/span&gt;&lt;span class="o"&gt;**&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt; &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;p&lt;/span&gt; &lt;span class="ow"&gt;in&lt;/span&gt; &lt;span class="n"&gt;distribution&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;values&lt;/span&gt;&lt;span class="p"&gt;())&lt;/span&gt;
    &lt;span class="n"&gt;pt_target&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;2&lt;/span&gt; &lt;span class="o"&gt;/&lt;/span&gt; &lt;span class="n"&gt;n&lt;/span&gt;          &lt;span class="c1"&gt;# Porter-Thomas prediction for random circuits
&lt;/span&gt;    &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="n"&gt;second_moment&lt;/span&gt; &lt;span class="o"&gt;&amp;lt;=&lt;/span&gt; &lt;span class="mf"&gt;3.0&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="n"&gt;pt_target&lt;/span&gt;   &lt;span class="c1"&gt;# reject if too uniform
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Proof of Command Correctness — ordering without a central authority
&lt;/h2&gt;

&lt;p&gt;Standard signatures prove &lt;em&gt;who&lt;/em&gt; sent a transaction. They do not prove &lt;em&gt;when&lt;/em&gt; or &lt;em&gt;in what order&lt;/em&gt; relative to other transactions from the same sender.&lt;/p&gt;

&lt;p&gt;XEQUES adds a per-sender hash chain to every transaction. Every command carries a chain hash that links it to all previous commands from that address.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;chain_hash[0] = SHA3(address + command_hash[0])
chain_hash[n] = SHA3(chain_hash[n-1] + command_hash[n])
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This is called &lt;strong&gt;Proof of Command Correctness (PoCC)&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;What it proves simultaneously:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Authorisation&lt;/strong&gt; — Lamport signature proves who sent it&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Ordering&lt;/strong&gt; — chain hash proves sequence relative to all prior commands&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Integrity&lt;/strong&gt; — any field tampered with breaks the chain hash&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Replay attacks insert a copy of a previous transaction. PoCC rejects them because the chain hash would duplicate a used position. Reorder attacks try to move transaction N before transaction N-1. PoCC rejects them because the chain breaks. Field tampering changes an amount or address after signing. PoCC rejects it because the command hash changes.&lt;/p&gt;

&lt;p&gt;All of this is caught at mempool admission, before a block is ever produced.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="k"&gt;class&lt;/span&gt; &lt;span class="nc"&gt;PoCCRegistry&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="k"&gt;def&lt;/span&gt; &lt;span class="nf"&gt;verify&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;):&lt;/span&gt;
        &lt;span class="n"&gt;last&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;self&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;chains&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;get&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;sender&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="n"&gt;expected&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nf"&gt;sha3&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;last&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;command_hash&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;last&lt;/span&gt; &lt;span class="k"&gt;else&lt;/span&gt; &lt;span class="nf"&gt;sha3&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;sender&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;command_hash&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;
        &lt;span class="k"&gt;return&lt;/span&gt; &lt;span class="n"&gt;command&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="n"&gt;chain_hash&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="n"&gt;expected&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  A spiking neural network runs inside every validator node
&lt;/h2&gt;

&lt;p&gt;Before PoCC even runs, every transaction is screened by a Leaky Integrate-and-Fire spiking neural network.&lt;/p&gt;

&lt;p&gt;Architecture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Input: 7 features (amount ratio, fee ratio, velocity, time delta, balance ratio, network deviation, is-new-address)&lt;/li&gt;
&lt;li&gt;Hidden: 20 LIF neurons&lt;/li&gt;
&lt;li&gt;Output: 3 neurons — VALID / SUSPICIOUS / FRAUDULENT
&lt;/li&gt;
&lt;/ul&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="c1"&gt;# LIF dynamics
&lt;/span&gt;&lt;span class="n"&gt;tau_m&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mf"&gt;20e-3&lt;/span&gt;    &lt;span class="c1"&gt;# membrane time constant (20ms)
&lt;/span&gt;&lt;span class="n"&gt;R_m&lt;/span&gt;   &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mf"&gt;80e6&lt;/span&gt;     &lt;span class="c1"&gt;# membrane resistance (80 MΩ)
&lt;/span&gt;&lt;span class="n"&gt;V_rest&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mf"&gt;65e-3&lt;/span&gt;  &lt;span class="c1"&gt;# resting potential
&lt;/span&gt;&lt;span class="n"&gt;V_th&lt;/span&gt;   &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mf"&gt;50e-3&lt;/span&gt;  &lt;span class="c1"&gt;# threshold
&lt;/span&gt;
&lt;span class="n"&gt;dV&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="n"&gt;V&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;V_rest&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;R_m&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="n"&gt;I&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="o"&gt;/&lt;/span&gt; &lt;span class="n"&gt;tau_m&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="n"&gt;dt&lt;/span&gt;
&lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;V&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; &lt;span class="n"&gt;V_th&lt;/span&gt;&lt;span class="p"&gt;:&lt;/span&gt;
    &lt;span class="nf"&gt;spike&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt; &lt;span class="n"&gt;V&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;V_rest&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The network learns via &lt;strong&gt;Spike-Timing-Dependent Plasticity (STDP)&lt;/strong&gt;. After each confirmed block, weights update based on which transactions were actually confirmed as valid. No external labels. No central model. Each node learns from its own observed history.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight python"&gt;&lt;code&gt;&lt;span class="n"&gt;Δw&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;A&lt;/span&gt;&lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="err"&gt;·&lt;/span&gt; &lt;span class="nf"&gt;exp&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="n"&gt;Δt&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;τ&lt;/span&gt;&lt;span class="o"&gt;+&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;   &lt;span class="c1"&gt;# pre fires before post → strengthen
&lt;/span&gt;   &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="n"&gt;A&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="err"&gt;·&lt;/span&gt; &lt;span class="nf"&gt;exp&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="o"&gt;+&lt;/span&gt;&lt;span class="n"&gt;Δt&lt;/span&gt;&lt;span class="o"&gt;/&lt;/span&gt;&lt;span class="n"&gt;τ&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt;   &lt;span class="c1"&gt;# post fires before pre → weaken
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This means nodes that see different transaction patterns develop slightly different weight distributions. The fraud detection emerges from local learning — closer to how biological neural populations work.&lt;/p&gt;




&lt;h2&gt;
  
  
  Running it takes one command
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/prajwalaher33/XEQUES
&lt;span class="nb"&gt;cd &lt;/span&gt;XEQUES
pip &lt;span class="nb"&gt;install &lt;/span&gt;numpy
python main.py
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The demo spins up a 4-node testnet, mines 5 blocks via PoQC-VDF, runs PoCC verification on transactions from 3 wallets, fires the SNN on each transaction, and shows the stake and governance system.&lt;/p&gt;

&lt;p&gt;Output:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight console"&gt;&lt;code&gt;&lt;span class="go"&gt;=== XEQUES v0.2.0 — 4-node testnet ===

[PoCC] alice command_0: chain_hash=a3f8... VERIFIED
[PoCC] Replay attack detected and rejected
[PoQC-VDF] Block 1 puzzle: anti_concentration_score=1.84 (HARD REGIME ✓)
[PoQC-VDF] Block 1 mined. ΣP=1.000000000000
[SNN] tx_001: VALID (58 STDP weight updates applied)
[Governance] Quadratic vote: FAILED (insufficient support)
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  What is still missing
&lt;/h2&gt;

&lt;p&gt;This is a research prototype, not a production blockchain. To be honest about what is not built yet:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;No persistent storage — chain lives in memory, restart wipes it&lt;/li&gt;
&lt;li&gt;No real P2P networking — validators are simulated in-process&lt;/li&gt;
&lt;li&gt;No economic incentive layer — staking exists but rewards are not enforced by the protocol&lt;/li&gt;
&lt;li&gt;No test suite — pytest coverage is next on the roadmap&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Python implementation is the reference. A Rust production implementation (xeques-core) is planned once the architecture is stable.&lt;/p&gt;




&lt;h2&gt;
  
  
  The question I genuinely want answered
&lt;/h2&gt;

&lt;p&gt;Are there known approximate classical or quantum simulation methods that break #P-hardness at realistic circuit depths (depth 5–15, 5 qubits)? Tensor network methods? Matrix product state approximations?&lt;/p&gt;

&lt;p&gt;I have read the literature but I want to hear from people who work on this directly. If the anti-concentration regime can be broken efficiently at these parameters, the consensus mechanism needs to be redesigned. I would rather know now.&lt;/p&gt;

&lt;p&gt;GitHub: &lt;a href="https://github.com/prajwalaher33/XEQUES" rel="noopener noreferrer"&gt;https://github.com/prajwalaher33/XEQUES&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you find this interesting, a star on the repo means a lot for a solo project at this stage. And if you spot a flaw in the #P-hard argument — open an issue. That is exactly the kind of feedback that makes research better.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Built with Python and numpy. No dependencies beyond the standard library except numpy for the quantum simulation.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>blockchain</category>
      <category>cryptocurrency</category>
      <category>security</category>
      <category>showdev</category>
    </item>
  </channel>
</rss>
