3. Consensus Mechanism

3.4. Consensus in permissioned and permissionless blockchains

Permissioned blockchains:

Permissioned blockchains are private or consortium networks where access and participation are restricted to a known group of entities. In these networks, consensus mechanisms differ from those used in permissionless (public) blockchains. Let's explore the consensus mechanisms commonly used in permissioned blockchains:

1. Practical Byzantine Fault Tolerance (PBFT):

PBFT is a consensus mechanism often utilized in permissioned blockchains. It relies on a known set of validators who participate in a voting-based consensus process. Validators are typically pre-selected and trusted entities within the network. PBFT aims to achieve consensus even in the presence of Byzantine faults, where validators may behave maliciously or experience failures. It requires a threshold number of validators to agree on the validity of transactions and the order of blocks.

2. Raft Consensus:

Raft is another consensus algorithm commonly used in permissioned blockchains. It follows a leader-based approach, where a leader node is responsible for proposing and ordering transactions. The other nodes, called followers, replicate and validate the proposed transactions. Raft focuses on achieving consensus in a fault-tolerant manner by electing a leader and maintaining replicated logs across the network. It provides strong consistency and fault recovery mechanisms.

3. Proof of Authority (PoA):

PoA is a consensus mechanism suitable for permissioned blockchains where validators are known and trusted entities. Validators take turns proposing blocks, and their authority to do so is based on their identity or reputation within the network. PoA eliminates the need for computationally intensive mining, as validators are already trusted to validate transactions. This approach allows for faster block confirmation times and higher transaction throughput.

4. Practical Byzantine Fault Tolerance with Identity (PBFT-IBFT):

PBFT-IBFT is an extension of PBFT designed for permissioned blockchains that require identity verification. It combines the features of PBFT and a robust identity management system. Validators are required to prove their identities, ensuring that only authorized entities can participate in block validation. This mechanism enhances security and prevents Sybil attacks, where malicious entities create multiple identities to gain control over the network.

The use of specific consensus mechanisms in permissioned blockchains allows for greater control over the network's participants and decision-making processes. It enables higher scalability, faster transaction confirmation, and potentially lower energy consumption compared to some permissionless blockchain networks. However, permissioned blockchains sacrifice the decentralized and trustless nature of permissionless blockchains, as they rely on a pre-selected group of validators.

It's worth noting that different permissioned blockchain networks may adopt variations or custom consensus mechanisms based on their specific requirements, governance models, and desired levels of trust and decentralization.

Permissionless blockchains:

Permissionless blockchains, also known as public blockchains, are open networks where anyone can participate as validators to achieve consensus. These networks rely on consensus mechanisms specifically designed to facilitate agreement among a large number of participants. Let's explore the consensus mechanisms commonly used in permissionless blockchains:

1. Proof of Work (PoW):

PoW is the most well-known consensus mechanism used in permissionless blockchains like Bitcoin and Ethereum. Miners compete to solve computationally intensive puzzles, with the first one to find a solution earning the right to propose the next block. This process requires substantial computational power and energy consumption. PoW provides a high level of security and is resilient against attacks, as altering the blockchain's history would require a majority of the network's computational power.

2. Proof of Stake (PoS):

PoS is an alternative consensus mechanism that aims to address the energy consumption and scalability concerns associated with PoW. Instead of miners, validators are selected to create and validate blocks based on the amount of cryptocurrency they hold and "stake" in the network. Validators are chosen randomly or through a deterministic algorithm, with the probability of selection proportional to their stake. PoS consumes less energy and allows for faster block confirmation, but it introduces potential concerns regarding the concentration of wealth and stakeholder influence.

3. Delegated Proof of Stake (DPoS):

DPoS is a variation of PoS that introduces a voting-based system to select a limited number of delegates as validators. Token holders vote for these delegates, who then validate blocks on behalf of the network. DPoS aims to enhance scalability by reducing the number of validators and increasing transaction throughput. While DPoS can provide fast block confirmation times, it introduces a level of centralization as the number of validators is limited and chosen through voting.

4. Practical Byzantine Fault Tolerance (PBFT):

PBFT, originally designed for permissioned blockchains, can also be adapted for permissionless networks. PBFT-based consensus mechanisms rely on a voting-based system among validators to reach an agreement on the validity and order of blocks. Validators take turns proposing blocks, and a threshold number of validators must agree on the proposed block for it to be considered valid. PBFT offers fast finality and can tolerate a certain number of faulty or malicious validators.

5. Proof of Elapsed Time (PoET):

PoET is a consensus mechanism used in some permissionless blockchains, such as Hyperledger Sawtooth. It leverages a trusted execution environment (TEE) where validators compete to win the right to propose a block based on a random waiting period. Validators request a wait time from the TEE, and the validator with the shortest wait time is granted the block proposal privilege. PoET reduces energy consumption and allows for high scalability while maintaining a decentralized network.

These consensus mechanisms in permissionless blockchains ensure decentralized decision-making, security against attacks, and censorship resistance. Each mechanism comes with its own set of advantages and considerations, and the choice of consensus mechanism depends on factors such as security requirements, scalability needs, and the desired level of decentralization within the network.

Trade-offs:

Analyzing the trade-offs between permissioned and permissionless blockchains involves considering various factors such as scalability, security, and governance. Let's examine these trade-offs:

1. Scalability:

- Permissioned Blockchains: Permissioned blockchains often have higher scalability compared to permissionless blockchains. Since the network participants are known and trusted, consensus mechanisms can be designed with fewer validation steps or more efficient algorithms, allowing for faster transaction processing and higher throughput.

- Permissionless Blockchains: Permissionless blockchains, especially those using Proof of Work (PoW), may face scalability challenges. The need for extensive computational work and the involvement of a large number of participants in the consensus process can result in longer confirmation times and limited transaction throughput. However, newer consensus mechanisms like Proof of Stake (PoS) and sharding aim to address scalability concerns in permissionless blockchains.

2. Security:

- Permissioned Blockchains: Permissioned blockchains typically offer higher security against external threats due to the controlled and trusted nature of the network participants. The validators are known entities, reducing the risk of Sybil attacks and collusion among malicious actors. Additionally, permissioned blockchains can employ consensus mechanisms like Practical Byzantine Fault Tolerance (PBFT) that provide strong resilience against Byzantine faults and can tolerate a certain number of malicious validators.

- Permissionless Blockchains: Permissionless blockchains provide a higher level of security against centralization and censorship attempts. The decentralized nature of these networks, especially in Proof of Work (PoW) systems, makes it extremely difficult for any single entity or group to control the majority of the computational power and manipulate the blockchain. However, permissionless blockchains may face security challenges due to the potential for 51% of attacks, where an entity controls a majority of the network's computational power.

3. Governance:

- Permissioned Blockchains: Permissioned blockchains offer more centralized governance compared to permissionless blockchains. The network participants are known and often have predefined roles and responsibilities, allowing for easier decision-making and coordination. Governance models in permissioned blockchains are typically more structured and involve trusted entities or consortiums. This can facilitate faster consensus and decision-making processes but may sacrifice the decentralized and trustless nature of blockchain technology.

- Permissionless Blockchains: Permissionless blockchains embrace decentralized governance, where decision-making power is distributed among the network participants. The governance is typically achieved through consensus mechanisms that allow validators or token holders to have a voice in protocol upgrades and network decisions. While this decentralized governance ensures a greater level of transparency and avoids concentration of power, it can be challenging to achieve consensus and make timely decisions due to the diverse interests and motivations of participants.

It's important to note that the trade-offs between permissioned and permissionless blockchains are not absolute and can vary depending on the specific implementation, consensus mechanism, and goals of the blockchain network. Hybrid approaches combining elements of both permissioned and permissionless blockchains have also emerged to address the trade-offs and offer a balance between scalability, security, and governance.

Hybrid approaches:

Hybrid consensus models aim to combine the advantages of both permissioned and permissionless blockchains, creating a flexible approach that suits specific use cases. These hybrid models attempt to strike a balance between scalability, security, and governance while accommodating diverse network requirements. Here are a few examples of hybrid consensus models:

1. Federated Consensus:

Federated consensus combines the controlled nature of permissioned blockchains with the decentralized characteristics of permissionless blockchains. In this model, a selected group of trusted validators (often referred to as "federators") participate in block validation and decision-making. These federators are known entities with predefined roles and responsibilities. However, unlike traditional permissioned blockchains, federated consensus may allow for a certain level of decentralization by incorporating voting mechanisms to elect or replace federators. This hybrid approach offers scalability, reduced energy consumption, and enhanced security while maintaining a degree of decentralization.

2. Consortium Chains:

Consortium chains are another hybrid approach where a group of organizations or entities collectively govern the blockchain network. While permissioned in nature, consortium chains may include elements of permissionless consensus mechanisms to achieve certain goals. For example, consortium chains may employ Proof of Stake (PoS) or Delegated Proof of Stake (DPoS) mechanisms to select validators from among the consortium members. This hybrid model ensures a higher level of trust among validators while providing scalability, faster transaction confirmation, and decentralized decision-making.

3. Sidechains:

Sidechains operate as independent chains that are connected to the main blockchain network. They allow for the execution of specific use cases or smart contracts with different consensus mechanisms tailored to their requirements. These sidechains can adopt permissioned or permissionless consensus models based on the desired characteristics. By offloading certain transactions or computations to sidechains, the main blockchain can achieve higher scalability and throughput while maintaining the desired level of security and decentralization.

4. Hybrid PoW/PoS:

Hybrid Proof of Work/Proof of Stake consensus models combine the computational work aspect of PoW with the stake-based selection of validators in PoS. This approach aims to address the energy consumption concerns of traditional PoW while providing enhanced security and decentralization compared to pure PoS systems. Validators may be selected based on a combination of their stake in the network and their computational power, allowing for more inclusive participation and reducing the risk of concentration of power.

Hybrid consensus models offer flexibility to blockchain networks, allowing them to adapt to specific use cases, performance requirements, and governance structures. By combining elements of permissioned and permissionless approaches, these hybrid models aim to overcome the limitations of each and create a more tailored solution. However, implementing and maintaining such hybrid models may introduce additional complexities in terms of protocol design, governance mechanisms, and interoperability between different consensus systems.