🎓
Scallop Learn
  • Guides
    • Welcome to Scallop Learn
    • Crypto
      • Basics
        • Don't Feel the FOMO - Crypto Slangs Explained
        • Blockchain: What is it?
        • What is an Exchange?
        • What are Stablecoins?
        • What is the Metaverse?
        • What are NFTs?
        • History of Bitcoin
        • What is Binance Smart Chain?
        • What is an IDO?
        • What is Staking?
        • Token Burning
        • Debunking Crypto Myths
        • The Crypto Dictionary
        • What is DYOR?
        • What is a Neo-bank?
        • Proof of Work vs Proof of Stake
        • Exploring Crypto Communities: How to Join and Connect with Like-Minded Enthusiasts
        • What is a DAO?
      • Intermediate
        • Scallop Chain Faucet: All you need to know!
        • Layer 2
        • Liquidity Pools
        • ETH 2.0 - The Merge
        • Centralised Exchanges VS Decentralised Exchanges
        • Web 3.0
        • Regulation
        • REIT's on the blockchain
        • The Future of Business Payments: How Crypto Payment Partners are Leading the Way
        • What Is A Crypto Card? How Does It Work?
        • Blockchain and AI
        • Why are regulations essential in Crypto Market? How does Scallop lead the way?
        • Banking on Blockchain
        • E-money Tokens
        • The Power Surge of Cross-Chain Interoperability in Blockchain's Future
        • Crypto Trading 101: Must know candlestick patterns for a successful trade
        • Exploring blockchain innovations and their real-world breakthroughs
        • Do not miss these common indicators of the crypto bull market
        • Decoding the Dynamics of Permissioned Blockchain Consensus Mechanisms
        • Summary
      • Advanced
        • Can Quantum Computers be a potential threat to Crypto?
        • Unlocking the cryptocurrency potential: How Banks can thrive in the digital age?
        • How do privacy-enhancing technologies ensure anonymity on the blockchain?
        • What Does Fintech Mean? Understanding the Intersection of Finance and Technology
          • Decoding Data Tokenisation: Its Vital Role and Relevance
        • Unravelling the Concept of the Time Value of Money: Its Implications and Applications
        • Unlocking the Potential of Real-World Assets
        • What is Byzantine fault tolerance?
        • Global Crypto Adoption and Its Potential Socio-Economic Impact
        • How ZK-Rollups are Supercharging Blockchain Transactions?
    • Security
      • Skimming of Credit and Debit Cards: What You Need to Know
      • How Blockchain Security Can Keep Your Crypto Safe?
      • Keeping Your Account Safe
      • Money muling scams: What are they and how can you avoid them?
      • Beware of these common frauds while using payment cards
    • Tutorials
      • Scallop App
      • Scallop Ramp
    • Markets
      • How are cryptocurrencies taxed across the globe?
      • What Can You Do On An Exchange?
      • Avoid FOMO To Plan A Recovery: 5 Things To Do In A Crypto Bear Market
      • Inflation
      • Meme Coins vs Altcoins
      • The Basics Of Investing
      • The Ripple Effect
      • Central Bank Digital Currencies: A Global Revolution and Impact
    • Know Your Crypto
      • Bitcoin
      • Ethereum
      • Binance Coin
      • Cardano
      • Optimism
      • Ripple
      • Solana
      • USD Coin
      • Polygon
      • Tron
      • Avalanche
      • Tether
    • Defi
      • Defi Introduction
      • Borrowing and Lending: Aave
      • Borrowing and Lending: Compound
      • Tokenisation
      • Defi projects: Terra
      • Wrapped Bitcoin
      • Summary
      • A Practical Guide: The Defi Walkthrough
      • Summary
  • Scallop
    • What is Scallop?
    • Products
      • Scallop Banking
        • Tips And Tricks For Getting The Most Out Of The Scallop App
      • Scallop Exchange
        • Getting started on Scallop Exchange
        • Trading Futures
        • Trading with Margin
        • Buying Ethereum on Scallop Exchange
      • Scallop Chain
        • Tech
          • Scallop Bridge Contracts
          • Configurations
          • Relayers
          • Launch Your Dapp on Scallop
          • Developing and Deploying Contracts​
          • Scallop Explorer​
          • Scallop Faucet​
          • Contract Verification​(Under Development)
          • Contract Security Checks​
          • Scallop Whitelist
        • Scallop Chain: Built on Cosmos and Secured by Biometric Bridge
        • E-Money Tokens and Scallop
      • Scallop Business
    • Getting Started
      • Getting Started: Fiat Onboarding And Exchanges
      • Getting Started: The Defi Walkthrough
      • Getting started: Scallop Exchange
      • Staking
        • Scallop Staking Guide
          • Useful Resources
          • 1. Setting Up Metamask Wallet
          • 2. Importing existing wallet
          • 3. Installing Binance Smart Chain
          • 4. Setting up a Kucoin Account
          • 5. Buying SCLP with a market order on Kucoin
          • 6. Transferring from Kucoin to Metamask
          • 7. Connecting Metamask to the SCLP Staking platform
        • LP Staking Guide
  • Announcements
  • News
    • News: Terra Collapse
    • Terra: Beyond Hope
    • News: Chapter 11 for Celsius
    • News: Nomad Bridge Hack
  • Extras
    • Task Lists
    • Tokenising Real Estate
    • How to Donate Crypto to Ukraine
Powered by GitBook
On this page
  • Permissionless Vs Permissioned Blockchains
  • Achieving Consensus in Permissioned Networks
  • Consensus Protocols in Permissioned Blockchain Systems
  • Final thoughts
  1. Guides
  2. Crypto
  3. Intermediate

Decoding the Dynamics of Permissioned Blockchain Consensus Mechanisms

PreviousDo not miss these common indicators of the crypto bull marketNextSummary

Last updated 1 year ago

A consensus mechanism serves as the backbone of blockchain systems, facilitating distributed agreement on the state of the ledger. Operating within networks that encompass multiple processes and participants, these mechanisms play a pivotal role in enhancing the efficiency and reliability of cryptocurrencies, blockchains, and distributed ledgers. By automating the verification and auditing processes, consensus mechanisms eliminate the need for manual oversight, thereby accelerating transaction validation and system integrity.

While popular blockchains like Ethereum and Bitcoin offer public access to all, businesses prefer to build on a hybrid of public and private blockchains - permissioned blockchains.

Let’s dive into what a permissioned blockchain is and what keeps it operational. Keep reading.

Permissionless Vs Permissioned Blockchains

Permissionless blockchains, like Bitcoin and Ethereum, allow open access for users to interact and transact. Bitcoin employs the Proof-of-Work (PoW) algorithm, while Ethereum utilises Proof-of-Stake (PoS), both exemplifying decentralised, secure transaction frameworks.

Permissioned blockchains stand apart from their public counterparts primarily due to their controlled access. While public blockchains are open for anyone to join and validate transactions, permissioned blockchains set criteria for user participation, often limiting access to a designated group.

Achieving Consensus in Permissioned Networks

In permissioned blockchains, the consensus process is meticulously orchestrated. Here's a simplified outline:

  • Users initiate transactions, which are then shared across the network.

  • These transactions undergo scrutiny by a set of pre-determined validators. These validators, often handpicked by the blockchain's governing body, play a pivotal role in maintaining the network's trustworthiness.

  • Once verified, transactions are grouped into blocks.

  • A consensus mechanism, often requiring a supermajority agreement among validators, determines the transaction order and finalises the state of the blockchain.

  • Upon consensus, the block is added to the chain, cementing a permanent, tamper-proof record of transactions.

Consensus Protocols in Permissioned Blockchain Systems

Permissioned blockchain systems deploy various consensus mechanisms to ensure transaction validation and network integrity. Some prominent protocols include:

1. Proof of Authority (PoA)

PoA relies on identity verification as the primary means to validate transactions. It is prevalent in private and consortium-based blockchain networks.

Entities or individuals, pre-approved by the network's governing authority, serve as validators. Their role is pivotal in upholding network security by ensuring only genuine transactions enter the blockchain.

Notable permissioned blockchains that employ PoA include Quorum and Hyperledger Besu.

2. Proof of Elapsed Time (PoET):

PoET introduces a randomised waiting period algorithm to validate transactions, primarily suitable for private networks where node reliability is a given.

Every participating node remains inactive for a randomly assigned duration. The privilege to initiate the subsequent block rests with the node completing its idle time first. This mechanism mimics a lottery, with nodes receiving a unique random number. A trusted execution environment (TEE) guarantees uniform waiting periods across nodes.

For example Hyperledger Sawtooth's PoET emphasises resource-efficient mining (REM).

3. Practical Byzantine Fault Tolerance (pBFT)

pBFT emphasises quick consensus even amidst node discrepancies. In this protocol, a primary node, or the leader, proposes transactions, which are then vetted by secondary nodes, termed backup nodes or validators. For a transaction to be finalised, it must garner a supermajority consensus from these validators.

The consensus mechanism in pBFT involves a tri-stage communication process: "pre-prepare," "prepare," and "commit." Once a block secures confirmation, its contents become immutable.

pBFT excels in rapid consensus but demands significant communication and resources. However, if a substantial portion of nodes gets compromised, pBFT networks might face fragmentation, making them susceptible to attacks.

Hyperledger Fabric and Corda are leading blockchain platforms leveraging pBFT.

4. Federated Byzantine Agreement (FBA) in Blockchain Networks

The Federated Byzantine Agreement (FBA) serves as a robust consensus mechanism for distributed networks, enabling nodes to reach a consensus even in the presence of faulty or malicious nodes.

FBA operates on the concept of nodes forming "quorum slices," groups of trustworthy nodes. If needed, these slices can combine to form a broader consensus group or "quorum." The system's state and decisions are then determined by these quorums.

One of FBA's distinctive features is its decentralised consensus model. Rather than having a centralised authority dictating the consensus process, individual nodes decide their preferred quorum slices.

The renowned permissioned blockchain platform R3 Corda, leverages FBA as its consensus mechanism.

5. Istanbul BFT (IBFT) Consensus Algorithm

Istanbul BFT (IBFT) is a consensus algorithm tailored for private blockchain networks, ensuring continuity even when certain nodes exhibit faults.

IBFT identifies two primary roles:

  • Validators: Entities responsible for evaluating and confirming block legitimacy.

  • Proposers: Nodes tasked with assembling transactions into blocks for validator scrutiny.

A proposer aggregates transactions and creates a block, which is then reviewed by validators.

For a block to be deemed valid and added to the blockchain, it must secure approval from over two-thirds of the participating validators.

IBFT is employed in platforms like the Quorum blockchain and Hyperledger Besu, facilitating state-machine replication.

Final thoughts

Choosing a consensus mechanism for a blockchain project is a crucial decision and depends on the project's needs. Parameters like scalability, security, interoperability, and following regulations are essential factors. The best choice depends on the specific requirements of the project.

Disclaimer: This article is for educational purposes only