TryTRY
BuyBUY
  • newsletter
  • contact
  • corporate
  • careers
Utimaco
TRYour free HSM simulator
BUYget a quote
  • home
  • solutions
  • products
  • services
  • blog
  • downloads
  • partners
  • company

Utimaco Portal

Here you will find everything you need as a partner and customerLogin required

  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research

Home / Blogs / Blockchain – the next 10 years

Blockchain – the next 10 years

November 09, 2020

A decade ago, Satoshi Nakamoto published the bitcoin whitepaper, the spark that started the blockchain fire engulfing us today. Since then the options available and uses of blockchain technology have dramatically expanded.

However, we are still very much in the early days, often described as the “wild west”, of blockchain. What do the next 10 years look like, and what are some ways to ride the blockchain wave to get your company ahead? In this article we’ll be exploring some key features that different blockchain architectures support and discussing the contexts in which they can be useful in a variety of applications across industries.

Consensus algorithms

Consensus algorithms are one of the distinguishing features between blockchain platforms. They determine who adds blocks to the chain, and can affect transaction times, energy usage, and how trustless the network is. Here is an overview of 3 popular protocols and some discussion of where they will go in the next decade.

Proof-of-work (POW)

This is the algorithm used by Bitcoin’s blockchain, as well as Ethereum (currently). The way POW works is that the miners compete to solve a mathematical puzzle every time a block needs to be added to the chain. The miner that solves the puzzle first validates the next block, and receives a reward. It’s one of the most popular protocols, however it has high energy requirements since solving the puzzles takes a lot of computational power and hardware, making it ecologically suboptimal.

This algorithm is good for keeping a network decentralized and secure, the main appeals of blockchain, but network performance suffers as a consequence.Over the next decade it is likely that prominent blockchains will move away from POW. Ethereum currently uses this protocol, but they will soon be moving towards a combination of it and another later mentioned algorithm. Because of the electrical demands and hardware requirements, this algorithm it is losing popularity, which will likely continue.

Proof-of-stake (POS)

A consensus algorithm where the more of the network a node owns (stake) the more likely the node is to mine the next block and reap the reward. This is a more popular protocol than most, but still not nearly as common as POW. It still provides a financial incentive to be a part of the network, and to own a lot of the network, but without the hardware needs and extreme electrical expenditures of POW.POS is typically used in cryptocurrency based networks, with the “stake” being how much of the currency each node owns.

Depending on the function of the network, this may or may not be useful when using blockchain in a business. Ethereum is moving to using a POS-POW combination to improve on the weaknesses already discussed of POW. Whether or not this is the protocol that will replace POW in the next decade is unclear, but it’s certainly a qualified contender.

Proof-of-authority (POA)

Specific nodes in the network are given authority and are the only accounts that can mine new blocks. POA is not a commonly used protocol on public chains (although a couple Ethereum test nets use them). This could be because one of the appeals of blockchain is that it’s decentralized, while POA is not, as the network creators centralize what nodes can verify and mine blocks.

For business applications though this algorithm may become more popular. One of the draws to POW and POS networks is that there is an incentive for being on the network and mining. On a POA chain that isn’t the case. People on the network won’t be there just looking for financial gains via mining. It’s useful for industry applications, as the chain creators have all the control over what nodes are validating blocks.

In the next 10 years potentially other protocols will become more widely adopted, but it’s certainly something to consider when choosing a platform. The choice of algorithm can greatly impact transaction times, network security, and other areas of using a blockchain. Now that we’ve seen some ways in which the depths of blockchain may change in the next decade, let’s look at how some blockchain capabilities could evolve.

Smart contracts

Smart contracts are a feature not supported on the Bitcoin network that are gaining popularity today. They are a piece of code that is visible on the network for nodes to interact with. Ironically, one of the initial appeals of blockchain is that it removed the need for third parties, however a smart contract is essentially just a non-sentient, transparent third party.

Smart contracts are used to control the logic of decentralized applications (next section), but they can also be used to do anything a standard contract can do. For example, the DAO (decentralized autonomous organization) smart contract that was hacked in 2016. One of its functions was to hold cryptocurrency sent to it by members and then distribute funds to projects that members voted on and agreed to fund. Security problems aside, the goal of this contract was to allow for an organization to be fully functional without a management hierarchy.

Many blockchains today have smart contract capabilities, and this trend will likely continue. They can allow for easy data transfer, are transparent, customizable, and trustless (there’s no need to blindly trust anyone on the network). These contracts have an amazing variety of uses, from things like DAOs to distributing tokens in ICOs. When used strategically, smart contracts are an excellent tool on many blockchains to do a wide variety of tasks across a wider variety of industries. In the next decade hopefully they become supported on more blockchains and used by more organizations.

Decentralized applications (Dapps)

Dapps are simply applications deployed on a blockchain. When interacting with them they behave like standard websites or web applications, but rather than running on servers they are decentralized and distributed throughout the nodes in the network. Types of dapps include those that have their own cryptocurrencies (such as gaming apps that use crypto as game currency), financial dapps such as those for distributing tokens in ICOs, and more general dapps that can be used for anything.For example, BlockParty is a dapp that allows participants to register for events by sending it ether.

Once a participant’s attendance is marked as present during the event, the smart contract behind the dapp distributes the ETH deposit (along with any extra money from individuals who didn’t show up) back to attendees. It is a useful, straightforward, transparent decentralized application that could have been written as a standard web app, but instead it utilizes features on the Ethereum blockchain to incentivize attendees to show up to free events.

There are many fields in which dapps are useful and hopefully will be adopted in the next decade. Social media, healthcare, energy, data storage and other areas are excellent places where dapps could come in handy. There may be a slow transition, as the frameworks for developing dapps is much more limited than those available for web applications. Essentially anything can be tokenized, from domain names to software licenses. Dapps are one of the easiest ways to interact with these tokens and will become more popular along with blockchain.

Domain names

Currently identities on the blockchain look like this: 0xd275225cccae255fb831ff51b13aa5ad52939736. Public addresses mean nothing to humans, so there is some movement in the blockchain community to use human readable domain names. Ethereum Name Services (ENS) for example allows users to register a public address to a domain name. 0xd275225cccae255fb831ff51b13aa5ad52939736 could become myAddress.eth. These domain names also don’t only have to be registered to accounts. On a blockchain everything has a public address, from smart contracts to dapps to miners, and anything with a public address can have a domain registered to it.

Domain names help alleviate some of the difficulties of using blockchain, but they’re not widely used yet or intuitive to come by. Thus there is a lot of room for improvement in the next decade. One of the original selling points of blockchain among its early users was the anonymity public addresses provide. However, as we move into an age where more people are using blockchain, domain names are one way that this technology can be more user friendly.

The future

Presently using blockchain is not for the faint of heart. Cryptocurrencies aside, many tools are not amateur friendly from writing smart contracts to registering domain names. As blockchain becomes more popular in the next decade ideally better resources and more user friendly tools will continue to develop so that in turn the popularity can increase.

Blockchain has hundreds of applications beyond just cryptocurrencies and investments. We’re still in the frenzy phase described by Carlota Perez’s Technological Surge Cycle. There is a lot of experimentation and exploration being done by individuals and organizations about the possibilities and opportunities this technology holds. Where do you think the next decade will take us?

Could blockchains become auditable? –  especially when used in banking, technologies and their implementations need to be auditable. Could the European eIDAS Regulation on Digital Signing and Authentication help? And how fit are blockchains for the future? – in fact they are not ready for quantum computing as Blockchains uses algorithms like elliptic curves which can be cracked by quantum computers.

This series tries to shed light on important security related aspects of blockchains and discusses some of the currently emerging loopholes. This first article looks at expected developments in the blockchain technology during the next 10 years. In the 2nd article we argue why blockchains will need to be auditable for successful business adoption. The 3rd article discusses how the digital signature regulation eIDAS can help making blockchains auditable.
New call-to-action

Back to overview

Stay on top of our news
Don’t miss out on any Utimaco updates

Subscribe to Utimaco Newsletter

We will keep you posted with news from Utimaco and the industries we protect, as well as information on upcoming events and webinars.

Subscribe now

Partners

Cryptomathic GmbH CewTec S.A. Microexpert Limited CREA plus d.o.o. EUROPEAN DYNAMICS SA. Fortiedge Pte Ltd. Skytech Computing Solutions Limited. - Utimaco Hardware Security Modules Partner Astel (UK) Ltd. - Utimaco Hardware Security Modules Partner Utimaco HSM - PTESA_profesionales en transacciones electronicas Envoy Data Corporation - Utimaco Hardware Security Modules Partner Utimaco HSM - QuintessenceLabs ESYSCO Sp. z o.o. Ascertia - Utimaco Hardware Security Modules Partner JJNet International Co., Limited - Utimaco Hardware Security Modules Partner Rohde & Schwarz Cybersecurity GmbH CREAplus Italia S.r.l Throughwave (Thailand) Co.,Ltd - Utimaco Hardware Security Modules Partner Baas Control s.r.o. Nexus Technology GmbH Encryption Consulting LLC Cryptomathic A/S SecureMetric Technology Sdn. Bhd. Macroseguridad cv cryptovision GmbH intarsys AG PETA (Thailand) Co., Ltd. IQuantics Corp Real security d.o.o. Altacom UAB E-Sign S.A. Telegrupp AS Abrantix AG MTG - Utimaco Hardware Security Modules Partner Perceptus-sp.-z-o.-o. AKEA S.A. - Utimaco Hardware Security Modules Partner VAR Group SpA - Utimaco Hardware Security Modules Partner Softline Solutions GmbH Utimaco HSM - InfoGuard Swiss Cyber Security Compumatica secure networks GmbH Fornetix - Utimaco Hardware Security Modules Partner Cogito Group Pty Ltd Synergy Computers (Pvt.) Ltd. - Utimaco Hardware Security Modules Partner MALKOM D.Malińska i Wspólnicy s.j. PKI Solutions Inc. Secure Source Distribution (M) Sdn Bhd - Utimaco Hardware Security Modules Partner Cyber Armor Pte Ltd Compumatica secure networks B.V. Thomas-Krenn.AG Nexus - Utimaco Hardware Security Modules Partner CertiSur S.A. Safesoft Kft. Nexus - Utimaco Hardware Security Modules Partner PrimeKey Labs GmbH Versasec Cryptomathic Inc. Primekey Solutions AB Clearkey Consulting - Utimaco Hardware Security Modules Partner CEGA Security Komar Consulting Inc. - Utimaco Hardware Security Modules Partner MIcrosec
Find a partner

Share this page

EMEA

Utimaco IS GmbH
Germanusstraße 4
52080 Aachen
Germany
Phone: + 49 241 1696 200

Americas

Utimaco Inc.
900 E Hamilton Ave., Suite 400
Campbell, CA 95008
USA
Phone: +1 844 UTIMACO

APAC

Utimaco IS Pte Limited
80 Raffles Place,
#32-01, UOB Plaza
Singapore 048624
Phone: +65 6622 5347

Utimaco

  • support
  • corporate
  • careers
  • legal
  • terms & conditions
  • privacy
  • cookie-policy
© 2021
to top
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research