Vitalik's Speech in Hong Kong: The Future Five Years and Long-Term Vision of the Ethereum Protocol

On the morning of April 20th, Ethereum co-founder Vitalik Buterin delivered a speech at the opening ceremony of the 2026 Hong Kong Web3 Carnival. Vitalik Buterin comprehensively outlined Ethereum’s technical roadmap for the next five years, clarifying Ethereum’s core value positioning, phased technical upgrade plans, and long-term foundational principles for development.

In his speech, Vitalik stated that Ethereum has two irreplaceable core values, which also serve as its foundational support as Web3 infrastructure:

  • First, as a decentralized public bulletin board, providing a trusted on-chain data publishing and notarization backbone for various applications, ensuring transparency, verifiability, immutability of order, and equal information publishing rights for everyone. It is the core technical support for scenarios like privacy protocols, secure electronic voting, and more;

  • Second, as a trusted shared computing platform, supporting shared digital objects controlled by code, encompassing all categories such as ERC-20 tokens, NFTs, ENS domains, DAOs, etc., providing decentralized applications (DApps) with autonomous, secure, verifiable, and fair participation capabilities.

Vitalik also emphasized that the most valuable long-term Web3 applications are based on a deep integration of on-chain and off-chain components, rather than simple on-chain replication of traditional applications.

Regarding short-term technical implementation plans for Ethereum over the next one to two years, Vitalik elaborated on four core upgrade directions:

  • On-chain scalability iteration: Continuously optimize Gas Limit, promote the deployment of CKEVM, and implement series of EIP proposals to enable block parallelization and Gas re-pricing, thereby increasing on-chain data publishing and complex computation capacity while maintaining network security;

  • Full deployment of account abstraction: Advance the implementation of EIP-8141, enabling Ethereum’s native support for smart contract wallets, compatible with pay-for-others transactions, quantum-resistant signatures, privacy protocols, and other core features, greatly expanding Ethereum’s application scope;

  • Preemptive layout for quantum resistance: Address potential risks from quantum computing by optimizing hash-based and lattice-based quantum-resistant signature algorithms, and upgrading EVM vectorization to solve current issues of low efficiency and high on-chain resource consumption of quantum-resistant signatures, completing Ethereum’s foundational post-quantum security preparations;

  • Privacy and storage capacity breakthroughs: Continue strengthening on-chain privacy support, focusing on overcoming technical challenges in storage expansion, and addressing Ethereum’s storage capacity limitations.

Below is the full transcript of Vitalik Buterin’s speech:


Good morning everyone! Where is Ethereum headed? I believe we are witnessing many significant changes in both theory and ecosystem over the past few years. We’ve also seen many shifts outside the Ethereum ecosystem, including the possibilities brought by artificial intelligence, the imminent realization of quantum computing, advances in formal verification, cryptography, and zero-knowledge proofs.

I think one of the key things we’ve been doing is rethinking what truly matters—what is the significance of using this protocol? What features does this protocol have? Why does a random variable need these features? For example, how to integrate it into the Ethereum protocol we previously established, and what will Ethereum be used for in the next five years? I believe it has two main functions:

First, the protocol is like a public billboard, a place where applications can publish messages, and everyone can see the content and order of these messages. These messages can be anything—transactions, hashes, encrypted data, or many other things. In fact, applications have many opportunities to leverage Ethereum as a data publishing platform, while interpreting this data through other types of protocols—decrypting data and performing computations on it.

Second, computational capability: Ethereum essentially provides shared digital objects controlled by code, in various forms—assets, ERC-20 tokens, NFTs, ENS domains, DAOs, etc. Their significance is not just theoretical; ENS is a typical example. They can even represent control over organizations—DAO is a prime example. We can use these to realize many functions, making both core features highly valuable. For decentralized applications, they ensure autonomous security, verifiability, and fair participation, bringing all users together.

Sovereignty essentially means that as a user, you can participate, verify, and ensure your own security, all based on your own infrastructure—you don’t need to trust any third party to run the protocol, nor do you need to trust third parties outside the protocol if you choose not to.

Therefore, verifiability and validation capabilities are crucial—they ensure the correct operation of the chain, that everything on-chain complies with rules, and also safeguard everyone’s right to publish information, allowing anyone to post on this bulletin board. That’s the core: We should see the protocol as a technical module, and think about all applications that this technical foundation can support. The most interesting applications are inevitably products of on-chain and off-chain integration, including ENS, prediction markets, etc. Prediction markets have on-chain components—such as tradable assets created for each event—and off-chain components, with oracles being one example.

Additionally, sometimes the design of prediction markets or order matching occurs on-chain, involving privacy-related content. For example, for decades, people have been researching cryptographic protocols to simplify or realize secure electronic voting. Many such protocols rely on public bulletin boards for publishing information. In these scenarios, people publish encrypted votes, which can ensure everyone’s participation. Any privacy-related matter must include an on-chain component for publishing data and an off-chain component for interpreting it.

Interpreting this data requires off-chain private protocols. That’s why we often talk about Layer-2 (L2). I define meaningful L2 as two types: meaningless and meaningful. A meaningless L2 simply copies a protocol and amplifies throughput by 100 times, ultimately becoming more centralized. A meaningful L2 requires us to review the application first, clarify what off-chain components are involved, what parts are needed beyond FRAML, and then build it.

What does this mean for the protocol? We need to expand data, enhance on-chain data publishing capacity, and improve peer-to-peer networks—this has been reflected in recent hard forks, incorporated into updates last year, but we still need further progress. Computing power expansion is equally important because it’s part of Ethereum’s chain, helping different applications to interconnect and communicate directly without intermediaries.

You can visit Strong Map Organization, which has a roadmap designed for the next five years. The short-term core goals of the protocol are twofold: first, short-term scalability—continually and actively increasing the gas limit; second, launching CKEVM. CKEVM allows Ethereum to support more scenarios and perform more complex calculations while still easily verifying on-chain information. Additionally, we are working on early preparations for the post-quantum era—over the years, we’ve been paying attention to quantum computing, aware of the challenges it will bring, and have already devised some countermeasures. In the short term, we will improve quantum security protocols and optimize the entire roadmap.

Our ultimate goal is to make the protocol fully quantum-secure, ensuring all parts are safe and efficient, while improving modular construction processes and strengthening privacy support. Therefore, many EIP proposals for short-term scalability will be implemented in subsequent phases: protocol hard forks will enable parallel processing of block access lists, and gas re-pricing will improve efficiency and security, making higher gas limits safer.

EPBS extends the time required for verifying protocols and blocks, further enhancing security, and also boosting the protocol’s capabilities—supporting state download via EIP-8141, an account abstraction proposal that is simple yet powerful. Essentially, a transaction is a series of calls, one of which may be verification, another execution, enabling native support for smart contract wallets, used for paying others’ transactions, and supporting quantum-resistant signatures and privacy protocols.

This broadens Ethereum’s application scope, supporting more functions. Quantum-resistant signatures have existed for 20 years; we understand their principles and how to build them. But the issue is efficiency: a four-round signature consumes 2000–3000 bytes, while current signatures only need 64 bytes; on-chain gas consumption is around 200k gas, but now only about 3,000 gas. So, we plan to adopt two types of signatures: hash-based signatures and lattice-based signatures. Our approach is to add vectorization capabilities into the EVM, using principles similar to those that enable fast AI computations—previously, we processed large data sets in parallel, and this logic can also be applied to quantum-resistant signatures, striving to make signatures both quantum-resistant and more efficient.

Account-level storage, balance, and smart contract execution are relatively easier to implement, but storage expansion remains challenging—there’s still much work to do in this area.

That’s our plan for Ethereum’s short-term and long-term development, and the direction we hope Ethereum will evolve.

Ethereum is not competing with high-frequency trading platforms; the goal isn’t to be the fastest chain, but to be a secure, decentralized chain—one that stays online continuously and can be trusted. One of our aims is to maximize secure consensus: if the network is secure, it can withstand 49% node failures, and even if almost all nodes go offline, it can still operate normally, providing security comparable to Bitcoin. Even if the network encounters issues, we can still maintain a 33% security certainty—that’s the first part of our goal.

The second part is formal verification of all components. We’ve already begun actively using AI-generated data proofs to verify that long-term software versions of the protocol have the required properties. We’ve made progress that was impossible two years ago. AI is advancing rapidly, and we’re leveraging this advantage, pursuing simplicity to make long-term protocols as straightforward as possible, preparing for the future.

Therefore, a protocol needs to pass an “exit test”—if a protocol is to be deployed practically, it must be dependable, capable of running even without power (no available electrical outlets). This aligns with Bitcoin’s goal and is something we must achieve: to safeguard digital assets long-term, we need to build a system that can continuously provide security, whose security doesn’t depend on any team’s ongoing existence or work. Lean consensus combines the strengths of two approaches: one is the Bitcoin-style global chain method, and the other is BFT (finality), which offers optimal security, quantum resistance, and fast finality.

Thus, finality can be achieved within 1 to 3 slots, with an expected total finalization time of about 10 to 20 seconds, or even less. zkVM (Zero-Knowledge Virtual Machine) can enable you to verify the correctness of the chain without relying on large computers running all operations—everyone should be able to verify the chain before trusting it, even your phone or IoT devices. Currently, zkVM speeds are fast enough to support real-time virtual machine proofs. Our goal this year is to ensure its security, deploy zkVM on a small portion of the network initially, and gradually increase its application. By 2028, through zkVM deployment, Ethereum will be capable of scaled expansion, handling more transactions while maintaining decentralization.

What is the vision behind all this? Ethereum is a world computer. It is both a global shared layer for making commitments, publishing data, recording actions, and enabling different users to perform operations; and a platform accessible to everyone, where data can be proven to be published or not. At the same time, it is a global shared layer for ensuring the execution of high-value rules—a protocol that must be highly robust and easily verifiable. I believe that in the future, with the help of AI, ensuring software security will become easier and more straightforward than we imagine.

If you want to ensure software security but neglect safety issues, the number of vulnerabilities and attacks will be ten times what it is now. Therefore, as a blockchain, Ethereum must prioritize security first, then decentralization; once these conditions are met, we should do our best to provide this security to users. If you aim to build decentralized applications, you need to guarantee their sovereignty, verifiability, and user participation rights. This covers fields like finance, decentralized social, identity verification, and more—both financial and non-financial applications, including ENS, prediction markets, etc. The core goal of the protocol is to make application development simple, which is also our default effort.

The roadmap for the next four years is designed around this goal. Thank you!

ETH0.06%
ENS-0.63%
BTC-0.46%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin