Back to Course
55% Complete

3. Consensus Mechanism

3.4. Consensus in Permissioned and Permissionless Blockchains

Permissioned Blockchains

Permissioned blockchains are private or consortium networks where access and participation are restricted to a known group of entities. In these networks, consensus mechanisms differ from those used in permissionless (public) blockchains. Let's explore the consensus mechanisms commonly used in permissioned blockchains:

1. Practical Byzantine Fault Tolerance (PBFT)

PBFT is a consensus mechanism that relies on a known set of validators who participate in a voting-based consensus process. Validators are typically pre-selected and trusted entities within the network. PBFT aims to achieve consensus even in the presence of Byzantine faults, where validators may behave maliciously or experience failures. It requires a threshold number of validators to agree on the validity of transactions and the order of blocks.

2. Raft Consensus

Raft is another consensus algorithm commonly used in permissioned blockchains. It follows a leader-based approach, where a leader node is responsible for proposing and ordering transactions. The other nodes, called followers, replicate and validate the proposed transactions. Raft focuses on achieving consensus in a fault-tolerant manner by electing a leader and maintaining replicated logs across the network. It provides strong consistency and fault recovery mechanisms.

3. Proof of Authority (PoA)

PoA is a consensus mechanism suitable for permissioned blockchains where validators are known and trusted entities. Validators take turns proposing blocks, and their authority to do so is based on their identity or reputation within the network. PoA eliminates the need for computationally intensive mining, as validators are already trusted to validate transactions. This approach allows for faster block confirmation times and higher transaction throughput.

The use of specific consensus mechanisms in permissioned blockchains allows for greater control over the network's participants and decision-making processes. It enables higher scalability, faster transaction confirmation, and potentially lower energy consumption compared to some permissionless blockchain networks. However, permissioned blockchains sacrifice the decentralized and trustless nature of permissionless blockchains, as they rely on a pre-selected group of validators.

Permissionless Blockchains

Permissionless blockchains, also known as public blockchains, are open networks where anyone can participate as validators to achieve consensus. These networks rely on consensus mechanisms specifically designed to facilitate agreement among a large number of participants. Let's explore the consensus mechanisms commonly used in permissionless blockchains:

1. Proof of Work (PoW)

PoW is the most well-known consensus mechanism used in permissionless blockchains like Bitcoin and Ethereum. Miners compete to solve computationally intensive puzzles, with the first one to find a solution earning the right to propose the next block. This process requires substantial computational power and energy consumption. PoW provides a high level of security and is resilient against attacks, as altering the blockchain's history would require a majority of the network's computational power.

2. Proof of Stake (PoS)

PoS is an alternative consensus mechanism that aims to address the energy consumption and scalability concerns associated with PoW. Instead of miners, validators are selected to create and validate blocks based on the amount of cryptocurrency they hold and "stake" in the network. Validators are chosen randomly or through a deterministic algorithm, with the probability of selection proportional to their stake. PoS consumes less energy and allows for faster block confirmation, but it introduces potential concerns regarding the concentration of wealth and stakeholder influence.

These consensus mechanisms in permissionless blockchains ensure decentralized decision-making, security against attacks, and censorship resistance. Each mechanism comes with its own set of advantages and considerations, and the choice of consensus mechanism depends on factors such as security requirements, scalability needs, and the desired level of decentralization within the network.

Hybrid Approaches

Hybrid consensus models aim to combine the advantages of both permissioned and permissionless blockchains, creating a flexible approach that suits specific use cases. These hybrid models attempt to strike a balance between scalability, security, and governance while accommodating diverse network requirements.

1. Federated Consensus

Federated consensus combines the controlled nature of permissioned blockchains with the decentralized characteristics of permissionless blockchains. In this model, a selected group of trusted validators ("federators") participate in block validation and decision-making. These federators are known entities with predefined roles, but may allow for a certain level of decentralization through voting mechanisms to elect or replace federators.

Hybrid consensus models offer flexibility to blockchain networks, allowing them to adapt to specific use cases, performance requirements, and governance structures. By combining elements of permissioned and permissionless approaches, these hybrid models aim to overcome the limitations of each and create a more tailored solution.