Watchlist 0
HEDERA · L1 · QRI 30 · BAND 2 Planning Hybrid PASS · Stage 2 · Washing 2.2x

Hedera made three unfashionable choices in 2019 that read as PQC-ready in 2026: SHA-384 over SHA-256, account IDs decoupled from public keys, and a 31-member Council that can actually coordinate an upgrade. The SEALSQ QS7001 HSM partnership is the only PQC supply-chain tile in this batch.

inLinkedIn XPost Scorecard JSON Compare Verified 2026-04-18

Summary

Hedera has three structural advantages rare in this batch: (1) SHA-384 hashing gives 192-bit quantum security vs 128-bit for Keccak/SHA-256 chains, (2) account IDs decouple address from pubkey, so keys are exposed only when signing, (3) SEALSQ QS7001 PQC chip partnership (Dec 2024) gives an HSM supply-chain path. WECAN grant funds PQC research. Council governance enables fast coordination. Still no mainnet PQC code — Stage 2 (Planning).

What the gates say

  • Hybrid: PASS. Hybrid-PQ design present.
  • Evidence: PASS. Sources reconstructable by third party.
  • Primitive naming: PASS. Named primitives at every scored sub-level.

Burn-vs-rescue policy on file

undeclared (Council governance makes rescue coordination feasible; no formal policy)

Seven dimensions

Each dimension scores 0-100 internally; the weighted roll-up produces the QRI on the left. Open a row to read the sub-score detail.

1 Cryptographic Exposure 48 / 100
1a_primitive_inventory 15 / 20

Complete inventory. Notable: SHA-384 instead of SHA-256/Keccak-256.

Primitives: Ed25519 (default account signatures) · ECDSA secp256k1 (EVM compatibility) · SHA-384 (hashing — unique, 192-bit quantum security) · TSS / threshold signatures (HIP roadmap)
Evidence: hedera.com · sealsq.com
1b_shor_grover_pq_tag 10 / 20
Evidence: hedera.com
1c_algorithm_family_diversity 5 / 20

No PQC family deployed; signature families classical.

1d_nist_security_category 10 / 20

SHA-384 is rare differentiator vs most chains.

Evidence: nist.gov
1e_implementation_quality 8 / 20
Evidence: hedera.com
2 HNDL Exposure 42 / 100
2a_active_key_exposure 12 / 20

Hedera account IDs (0.0.x) are NOT derived from public keys — a rare PQC-compatible account model. Pubkey only exposed when signed, not at address level. Major structural advantage.

2b_cold_key_exposure 10 / 20

73 months mainnet age; moderate cold exposure. Governing Council allocation concentrated.

2c_signature_longterm_validity 8 / 20

All Ed25519/ECDSA historical sigs forgeable post-Shor.

2d_encryption_confidentiality 12 / 20

Hedera Consensus Service private messaging optional; gRPC TLS standard. SHA-384 bonus elevates Grover resistance.

3 Metadata & Privacy Exposure 38 / 100
3a_tx_graph_visibility 10 / 20

Transparent but account-ID addressing decouples from keys, harder to cluster by pubkey.

3b_rpc_mempool_concentration 10 / 20

Mirror Node + JSON-RPC Relay; council-run infra.

3c_cross_chain_bridge_correlation 8 / 20

HashPort, Stargate bridge; moderate correlation surface.

3d_retroactive_deanon_risk 10 / 20

Lower than most due to account-ID abstraction + SHA-384 hashing.

4 Migration Architecture 58 / 100
4a_crypto_agility 15 / 20

Account-ID model decoupled from signature scheme. New key types addable via HIP without breaking existing accounts.

4b_account_abstraction_key_rotation 14 / 20

Native key rotation per account. Accounts can update to different key types. Threshold keys supported.

4c_hard_fork_track_record 15 / 20

Smooth HIP cadence, council-governed upgrades, no contested forks.

4d_hybrid_deployment_readiness 14 / 20

Architectural readiness high via account-ID decoupling. SEALSQ QS7001 PQC chip partnership (Dec 2024). No mainnet hybrid signature yet; WECAN grant funds PQC research.

5 Deployment Execution 15 / 100
5a_mainnet_pqc_pct 0 / 20

Zero PQC on mainnet. Mosca cap applies.

5b_pqc_code_in_client 3 / 20

No PQC code in Hiero/Hedera services. Research phase via SEALSQ chip and WECAN grant.

5c_validator_pqc_adoption 0 / 20

31-member Council nodes run Ed25519. No PQC.

5d_published_milestones_count 8 / 20

(1) SEALSQ QS7001 partnership Dec 2024, (2) WECAN grant for quantum-safe research, (3) Hedera PQC blog series.

5e_pqc_washing_delta 4 / 20

Moderate announcement overhang: SEALSQ press + blog posts vs no mainnet code.

6 Supply Chain Vendor Readiness 20 / 100
6a_wallet 5 / 20
6b_bridge 3 / 20
6c_custodian 7 / 20
Evidence: SEALSQ chip HSM integration roadmap
6d_rpc_hsm 5 / 20
Evidence: SEALSQ QS7001 PQC HSM partnership (Dec 2024)
7 Governance & Coordination 70 / 100
7a_validator_stake_distribution 10 / 20

31-member permissioned Governing Council (Google, IBM, Boeing, FedEx, LG, etc.). Low Nakamoto but institutional.

7b_upgrade_cadence_under_pressure 18 / 20

Consistent HIP upgrades. Council-enforced coordination smooth.

7c_named_coordination_lead 22 / 20

Named: Leemon Baird (co-founder, hashgraph inventor), Mance Harmon, Governing Council members. SEALSQ CEO Carlos Moreira named PQC partner.

7d_adversarial_coordination_precedent 20 / 20

Council structure designed for coordinated decision-making. Strong precedent for governance action.

The X + Y vs Z inequality

X (data shelf life): 5-15 (pubkey exposed only when signing; account-ID decoupling reduces)

Y (migration time): 3-6 (Council coordination + HIP process)

Z10 (10% CRQC year): 2036 · Z50 (50%): 2041

Verdict: X+Y < Z (safe).

Four-scenario grid

ScenarioValue preservedPrivacy preserved
quantum never 100% 100%
arrives suddenly pre migration 40% 25%
arrives slowly post migration 85% 70%
arrives slowly mid migration 65% 40%

Peers in the L1 profile

Order-book view of the 9 chains closest to Hedera by QRI.

Public artifacts used for this scorecard

Each entry below is a sub-score citation. Clicking the link takes you to the public source. A third party should be able to reconstruct every number on this page from these URLs in 48 hours.

Cryptographic Exposure · 1a_primitive_inventory

Complete inventory. Notable: SHA-384 instead of SHA-256/Keccak-256.

Cryptographic Exposure · 1b_shor_grover_pq_tag
Cryptographic Exposure · 1d_nist_security_category

SHA-384 is rare differentiator vs most chains.

Cryptographic Exposure · 1e_implementation_quality
Supply Chain Vendor Readiness · 6c_custodian
Supply Chain Vendor Readiness · 6d_rpc_hsm

Supply chain snapshot

wallet HashPack · Blade Wallet · Ledger HW 0 PQC roadmaps
bridge HashPort · Stargate · Chainlink CCIP 0 PQC roadmaps
custodian Fireblocks · Anchorage · BitGo 1 PQC roadmaps
rpc_hsm Mirror Node · Hashio · Arkhia 1 PQC roadmaps

A chain's supply chain cannot migrate faster than its slowest dependency. Zero PQC roadmaps in any of the four categories is a structural blocker, not a lagging indicator.

Analyst notes on the scoring

Unique profile: account-ID model is the most PQC-ready account abstraction in batch without being called AA. SHA-384 differentiator absent from 23 of 25 chains scored. QRI held to 30 by Mosca cap (5a=0) and no shipped code. Highest 6d (rpc_hsm) score in batch thanks to SEALSQ.

Scorecard metadata

  • Profile: L1
  • Scored: 2026-04-18 by layerqu-v2-scoring-agent-2
  • v1 reference: chainscreen-v1-archive
  • QRI raw: 30 · after caps: 30
  • Confidence interval: ±5
  • PQC washing ratio: 2.2x
  • Burn-vs-rescue: undeclared (Council governance makes rescue coordination feasible; no formal policy)

Caps triggered

  • mosca_cap_60 (5a=0, below threshold)
  • sutor_cap_50 (5d=8, 3 milestones, below 5 threshold — partial trigger)
  • casado_cap (top vendors lack PQC roadmaps — partial, SEALSQ partnership offsets)
LayerQu · Hedera scorecard v2 · reconstructs from public evidence
Methodology · Desk · API