All Major Blockchain Consensus Algorithms Explained

Understanding the Different Types of Blockchain Consensus Mechanisms

Learn With Whiteboard
22 min readApr 2, 2023
All Major Blockchain Consensus Algorithms explained
Credit — Anton

Blockchain technology has taken the world by storm, offering a decentralized and secure way to store and transfer information. It has also revolutionized the way transactions are carried out, and with it comes a wide range of consensus algorithms. Here, consensus algorithms play a critical role in ensuring the integrity of blockchain networks. In this article, we will explore all major types of blockchain consensus algorithms, their meaning, advantages, disadvantages, and why they are essential in blockchain technology.

TLDR; Don’t have time to read through? Here’s a video that can help.

Blockchain Consensus Algorithms

Consensus algorithms are a set of rules or protocols that enable nodes in a blockchain network to agree on a shared state of the network. They are used to ensure that all nodes in the network come to a consensus on the validity of transactions and the order in which they are added to the blockchain.

A consensus algorithm is responsible for maintaining the integrity of the blockchain by ensuring that no single node or group of nodes can manipulate the network.

Consensus algorithms are critical in blockchain technology for several reasons.

  1. They provide security by preventing malicious actors from taking control of the network, ensuring valid transactions and smooth network operation.
  2. They help achieve decentralization by ensuring all nodes come to a consensus on transaction validity, preventing centralization.
  3. Consensus algorithms promote transparency by making all transactions visible on the blockchain, making it easy to track and prevent fraudulent activities.
  4. They improve efficiency by allowing nodes to quickly agree on transaction validity and add new blocks to the blockchain in a timely manner.

Types of Consensus Algorithms in Blockchain

Let’s understand all the major consensus algorithms in blockchain, one by one.

1. Proof of Work (PoW)

Proof of Work is a consensus algorithm used in many blockchain networks to validate transactions and add new blocks to the chain. PoW was first introduced by Bitcoin’s creator, Satoshi Nakamoto, as a way to secure the network and prevent double-spending.

The PoW algorithm requires miners to solve complex mathematical problems, known as hashes, in order to validate transactions and add new blocks to the chain. The hash function used in PoW algorithms is designed to be computationally difficult to solve, which means that it requires a significant amount of computational power to solve the problem and add a block to the chain. Miners compete with each other to solve the problem, and the first one to solve it is rewarded with newly minted cryptocurrency.

This algorithm’s security comes from the fact that it is difficult to solve the hash problem, which means that it is expensive for an attacker to try to take over the network. The attacker would need to have control over a significant portion of the network’s computational power, known as the hash rate, in order to launch an attack. This is known as a 51% attack, and it is difficult to pull off because it would require a massive amount of resources.

Proof of Work (PoW)
Credit — investopedia.com

One of the criticisms of the PoW algorithm is that it is energy-intensive, as miners need to use a significant amount of computational power to solve the hash problem. This has led to concerns about the environmental impact of blockchain networks that use PoW. However, some argue that energy consumption is necessary to secure the network and prevent attacks.

2. Proof of Stake (PoS)

Proof of Stake is a consensus algorithm used in blockchain networks to validate transactions and add new blocks to the chain. Unlike Proof of Work (PoW), which requires miners to solve complex mathematical problems, PoS relies on validators who hold a certain amount of cryptocurrency to validate transactions and add new blocks to the chain.

In a PoS network, validators are chosen to add new blocks to the chain based on the amount of cryptocurrency they hold, which is known as their stake. The larger the stake, the greater the chance of being selected to add a block to the chain. Validators are incentivized to act honestly because they risk losing their stake if they validate fraudulent transactions or try to attack the network.

Proof of Stake (PoS)
Credit — investopedia.com

PoS vs PoW

One of the benefits of PoS over PoW is that it is less energy-intensive. PoW requires miners to use significant amounts of computational power to solve complex mathematical problems, while PoS only requires validators to hold cryptocurrency. This makes PoS more environmentally friendly and less costly to operate.

Benefits of PoS

Another benefit of PoS is that it promotes decentralization. In a PoW network, miners with the largest hashrate have more control over the network, which can lead to centralization.

In a PoS network, validators with the largest stake have more control, but it is difficult for a single validator or group of validators to gain control of the network because they would need to control a significant amount of cryptocurrency.

Drawbacks of PoS

One potential drawback of PoS is that it can lead to a rich-get-richer situation, where validators with the largest stake continue to earn more cryptocurrency, making it more difficult for smaller validators to participate in the network.

However, some PoS networks have implemented mechanisms to address this issue, such as random selection of validators or limiting the amount of cryptocurrency that a single validator can hold.

3. Delegated Proof of Stake (DPoS)

Delegated Proof of Stake is a consensus algorithm used in some blockchain networks to validate transactions and add new blocks to the chain. DPoS is a variation of Proof of Stake (PoS) that relies on a smaller group of validators, known as delegates or witnesses, to validate transactions and add new blocks to the chain.

In a DPoS network, token holders vote for delegates to represent them in the validation process. The delegates are responsible for validating transactions and adding new blocks to the chain. The delegates are incentivized to act honestly because they risk losing their position and rewards if they validate fraudulent transactions or try to attack the network.

Delegated Proof of Stake (DPoS)
Credit — Shiksha Online

DPoS vs PoS

One of the benefits of DPoS over PoS is that it is more efficient. PoS requires all validators to participate in the validation process, which can lead to inefficiencies if some validators are not online or not actively participating. In DPoS, only the elected delegates participate in the validation process, which makes it faster and more efficient.

Benefits of DPoS

Another benefit of DPoS is that it promotes decentralization while still providing fast transaction processing times. In a PoS network, validators with the largest stake have more control over the network, which can lead to centralization.

In a DPoS network, token holders have a say in who gets to be a delegate, which can lead to a more decentralized network.

Drawbacks of DPoS

One potential drawback of DPoS is that it can lead to a concentration of power in the hands of a small group of delegates. If a small group of delegates controls a significant amount of voting power, they could potentially collude to manipulate the network.

However, some DPoS networks have implemented mechanisms to address this issue, such as limiting the number of delegates that any one entity can control.

4. Leased Proof of Stake (LPoS)

Leased Proof of Stake is a consensus algorithm used in some blockchain networks to validate transactions and add new blocks to the chain. LPoS is a variation of Proof of Stake (PoS) that allows smaller token holders to participate in the validation process by leasing their tokens to larger validators.

In a LPoS network, token holders lease their tokens to a validator, who uses those tokens to increase their stake and improve their chances of being selected to validate transactions and add new blocks to the chain. The token holder retains ownership of their tokens and receives a share of the rewards earned by the validator in proportion to the amount of tokens they leased.

Leased Proof of Stake (LPoS)
Credit — gate.io

Benefits of LPoS

One of the benefits of LPoS is that it allows smaller token holders to participate in the validation process and earn rewards without having to hold a significant amount of tokens. This promotes decentralization and allows for a more diverse group of participants in the network.

Another benefit of LPoS is that it can potentially increase the security of the network. By allowing more token holders to participate in the validation process, LPoS can make it more difficult for a single validator or group of validators to gain control of the network and manipulate transactions.

Drawbacks of LPoS

One potential drawback of LPoS is that it can be more complex than other consensus algorithms. Token holders must understand the risks and rewards of leasing their tokens to a validator, and validators must manage the tokens they have leased in a responsible manner.

5. Proof of Authority (PoA)

Proof of Authority is a consensus algorithm used in some blockchain networks to validate transactions and add new blocks to the chain. Unlike other consensus algorithms such as Proof of Work (PoW) and Proof of Stake (PoS), PoA relies on a group of trusted validators instead of a decentralized network of nodes.

In a PoA network, a group of validators is designated as authoritative and responsible for validating transactions and adding new blocks to the chain. Validators are typically selected based on their reputation and expertise, and they are incentivized to act honestly because their reputation is on the line.

Proof of Authority (PoA)
Credit — changelly.com

Benefits of PoA

One of the benefits of PoA is that it is more efficient than other consensus algorithms. PoW requires a significant amount of computational power to validate transactions, which can be costly and time-consuming. PoS requires a significant amount of stake to participate in the validation process, which can lead to centralization. PoA, on the other hand, relies on a smaller group of trusted validators, which makes it faster and more efficient.

Another benefit of PoA is that it can be more suitable for private or enterprise blockchain networks. In these networks, it may not be feasible or desirable to have a decentralized network of nodes validating transactions. PoA allows for a more controlled and centralized approach to validation, which may be more appropriate in these contexts.

Drawbacks of PoA

One potential drawback of PoA is that it is less secure than other consensus algorithms. Because PoA relies on a smaller group of validators, the network is more vulnerable to attacks if one or more validators are compromised or act maliciously. However, some PoA networks have implemented mechanisms to address this issue, such as requiring multiple validators to sign off on transactions.

Additionally, here’s a video that summarizes the difference between proof of stake vs proof of work vs proof of authority.

6. Byzantine Fault Tolerance (BFT)

Byzantine Fault Tolerance is a concept in computer science that refers to a system’s ability to function correctly and reach consensus even if some of its components fail or behave maliciously. In the context of blockchain technology, BFT is a consensus algorithm that enables a distributed network of nodes to reach an agreement on the validity of transactions and maintain the integrity of the blockchain even in the face of malicious attacks or system failures.

BFT is designed to prevent the “Byzantine Generals’ Problem,” a theoretical scenario in which a group of generals must coordinate an attack on a city, but some of the generals are traitors who may send false information to others. In a blockchain network, the Byzantine Generals’ Problem can manifest as nodes on the network that behave maliciously or fail to communicate correctly.

Credit — captainaltcoin.com

BFT addresses this problem by requiring a certain percentage of nodes to agree on the validity of transactions before they are added to the blockchain. In a traditional BFT algorithm, this percentage is set at two-thirds of the total number of nodes. If two-thirds of the nodes agree on the validity of a transaction, then it is added to the blockchain. If less than two-thirds of the nodes agree, then the transaction is rejected.

BFT vs PoW and PoS

BFT is different from other consensus algorithms such as Proof of Work or Proof of Stake in that it does not require a significant amount of computational power or stake to participate in the validation process. Instead, it relies on a smaller group of nodes to reach agreement on the validity of transactions, which makes it more efficient and faster than other consensus algorithms.

Drawbacks of BFT

One potential drawback of BFT is that it requires a higher level of trust in the network participants. If a significant percentage of nodes behave maliciously or fail to communicate correctly, then the network may not be able to reach a consensus and maintain the integrity of the blockchain. However, BFT is often used in private or enterprise blockchain networks where participants are known and trusted.

7. Practical Byzantine Fault Tolerance (PBFT)

This is a consensus algorithm that extends the Byzantine Fault Tolerance (BFT) algorithm to provide a high level of fault tolerance in distributed systems. PBFT is commonly used in enterprise blockchain networks and other distributed systems where a high level of consensus is required.

PBFT works by breaking down the consensus process into a series of steps that are repeated for each transaction. Each step involves a different node in the network, and each node is responsible for verifying the validity of the transaction before passing it on to the next node.

The PBFT algorithm requires a certain number of nodes to reach a consensus on the validity of a transaction before it can be added to the blockchain.

Credit — slideteam.net

In PBFT, this number is determined by the formula; f = (n-1)/3, where f is the maximum number of faulty nodes that the system can tolerate, and n is the total number of nodes in the network.

PBFT is designed to be fault-tolerant, meaning that it can continue to function correctly even if some nodes in the network fail or behave maliciously. The algorithm achieves this by allowing nodes to communicate with each other and reach consensus on the validity of transactions. If a node fails or behaves maliciously, the other nodes can detect the problem and exclude the node from the consensus process.

Benefits of PBFT

One of the benefits of PBFT is that it can achieve high throughput and low latency, even in networks with a large number of nodes. PBFT is also known for its high level of security, as it can tolerate up to f faulty nodes without compromising the integrity of the blockchain.

Drawbacks of PBFT

However, PBFT does have some limitations. It requires a certain number of nodes to reach consensus, which means that it may not be suitable for small networks. PBFT also requires a higher level of computational power than some other consensus algorithms, which can make it less energy-efficient.

8. Delegated Byzantine Fault Tolerance (dBFT)

Now, this consensus algorithm combines the advantages of both Byzantine Fault Tolerance (BFT) and Delegated Proof of Stake (DPoS) algorithms. dBFT is commonly used in blockchain networks that require a high level of consensus and throughput.

Like BFT and PBFT, dBFT is designed to be fault-tolerant, meaning it can continue to function correctly even if some nodes in the network fail or behave maliciously. In dBFT, consensus is reached through a process of voting, where each node in the network can vote on the validity of a transaction.

Credit — steemit.com

However, unlike BFT and PBFT, dBFT uses a delegated model where network participants delegate their voting power to a smaller number of trusted nodes, known as validators. Validators are responsible for verifying transactions and reaching a consensus on the validity of transactions.

dBFT is based on a round-robin system where validators take turns validating transactions. Validators are selected based on their reputation and stake in the network. Validators are incentivized to behave honestly, as any malicious behavior could result in a loss of reputation and stake.

Benefits of dBFT

One of the benefits of dBFT is that it can achieve high throughput and low latency, as only a small number of validators are required to reach a consensus. dBFT also reduces the risk of centralization, as validators are selected based on their reputation and stake, rather than their computational power.

Drawback of dBFT

However, dBFT does have some limitations. It requires a high level of trust in the selected validators, which can lead to potential vulnerabilities if a large number of validators are controlled by a single entity. dBFT is also not suitable for all types of blockchain networks, as it may not be necessary to have such a high level of consensus for some use cases.

9. Directed Acyclic Graph (DAG)

This is a type of data structure that is often used in distributed ledger technology and blockchain systems. Unlike traditional blockchain architectures, which organize data in a linear, chronological sequence of blocks, DAGs allow for a more flexible and efficient way to store and validate data.

DAGs are graphs made up of vertices and edges, where each vertex represents a transaction and each edge represents a relationship between transactions. In a DAG, transactions are not organized in a linear chain like in a traditional blockchain, but rather they are organized in a more complex structure where each transaction is linked to multiple other transactions.

Credit — bitnovo.com

If you want to learn about the difference Blockchain vs DAG vs Holochain vs Hashgraph, here’s a video that can help.

Benefits of DAG

One of the benefits of DAG-based systems is that they can achieve high scalability and transaction throughput. Transactions can be processed concurrently, as long as there are no conflicts between them. This means that multiple transactions can be validated at the same time, improving the overall efficiency of the system.

Another advantage of DAGs is their ability to handle forks in the network. In a traditional blockchain, when two blocks are created at the same time, only one of them can be accepted into the chain. This can lead to a situation where a block that was previously considered valid is suddenly rejected, leading to a fork in the chain.

In a DAG-based system, forks are resolved automatically, as transactions are validated based on their relationship to other transactions in the graph.

Example

One example of a DAG-based system is IOTA, a distributed ledger technology designed for Internet of Things (IoT) devices. In IOTA, transactions are represented as nodes in a DAG, and each transaction must confirm two previous transactions in order to be validated. This creates a more efficient and scalable system, as multiple transactions can be processed concurrently.

Drawbacks of DAG

However, DAG-based systems also have some limitations. One of the challenges of using DAGs is the need for a complex consensus mechanism that can determine the order of transactions in the graph. Additionally, DAGs may not be suitable for all types of blockchain applications, as they may require a more complex architecture than traditional blockchain systems.

10. Proof of Capacity (PoC)

Proof of Capacity is a consensus mechanism used in some blockchain networks to validate transactions and maintain the integrity of the blockchain. PoC is similar to Proof of Work (PoW) in that it requires participants to solve a computational puzzle to add new blocks to the blockchain, but it differs in how it utilizes computer storage rather than computational power.

In a PoC system, participants allocate a portion of their computer’s hard drive space to serve as a plot, which is essentially a pre-computed segment of data that can be used to generate a solution to the computational puzzle. When a new block needs to be added to the blockchain, the participant’s plot is searched to find a solution to the puzzle. The first participant to find a valid solution can add the new block to the blockchain and receive a reward in the form of cryptocurrency.

Credit — Shiksha Online

The use of storage space rather than computational power makes PoC a more energy-efficient consensus mechanism compared to PoW. Since participants do not need to constantly perform complex computations, PoC requires less electricity and has a smaller environmental footprint.

Drawbacks of PoC

However, one drawback of PoC is that it can be vulnerable to certain types of attacks, such as pre-computation and Sybil attacks. In a pre-computation attack, an attacker could pre-compute a large number of plots and then use them to quickly solve the computational puzzle and add new blocks to the blockchain, giving them an unfair advantage over other participants.

In a Sybil attack, an attacker could create multiple identities to increase their chances of finding a solution to the puzzle.

To mitigate these risks, some PoC systems incorporate additional security measures, such as requiring participants to prove they are not a Sybil attacker by performing a challenge-response protocol.

11. Proof of Burn (PoB)

Now, this is a consensus mechanism used in some blockchain networks to validate transactions and add new blocks to the blockchain. Instead of using computational power or storage space like other consensus mechanisms, PoB requires participants to burn, or destroy, cryptocurrency tokens to prove their commitment to the network.

To participate in a PoB system, a user must send a certain amount of cryptocurrency to an address where it will be permanently destroyed. This act of destroying cryptocurrency is known as burning. Once the cryptocurrency is burned, the user is given the right to add new blocks to the blockchain and receive rewards for doing so.

Credit — Henrique Centieiro in DataDrivenInvestor

The idea behind PoB is that by burning cryptocurrency, a user is making a financial sacrifice and demonstrating their commitment to the network. This reduces the likelihood of malicious actors attempting to attack the network, as they would have to burn a significant amount of cryptocurrency to do so.

Benefits of PoB

One potential benefit of PoB is that it can help reduce inflation in a cryptocurrency ecosystem. Since tokens are being destroyed rather than created, the overall supply of tokens decreases, which can help stabilize the value of the cryptocurrency.

Drawbacks of PoB

However, PoB also has some drawbacks. One is that it can be difficult to determine the value of the burned tokens, as they are permanently destroyed and cannot be recovered. This can make it difficult to accurately measure the level of commitment and investment in the network. Additionally, burning tokens can be seen as wasteful and environmentally unfriendly.

12. Proof of Identity (PoI)

It is a consensus mechanism used to verify the identity of participants in the network. It is a type of consensus mechanism that aims to promote trust, security, and authenticity in blockchain transactions.

PoI works by requiring participants to provide a digital identity that is linked to a real-world identity verification process. This can be achieved through a variety of methods, such as government-issued IDs, biometric data, or other forms of verifiable identity credentials. The identity verification process ensures that each participant is a real, identifiable individual, which can help prevent fraudulent or malicious activity in the network.

Credit — businessworld.in

Once a participant’s identity is verified, they are given the right to participate in the network and contribute to consensus. This can be achieved through different mechanisms, depending on the specific blockchain network.

For example, some PoI networks may require participants to vote on proposed transactions, while others may allow participants to propose transactions themselves.

Benefits of Proof of Identity

One of the main benefits of PoI is that it can help prevent Sybil attacks, where a single participant creates multiple identities in the network to gain control or manipulate the system. By requiring participants to provide verifiable identity credentials, PoI ensures that each participant is a unique, identifiable entity in the network.

Drawbacks of Proof of Identity

However, PoI also has some drawbacks. One is that it can be difficult to balance anonymity and privacy with identity verification. Some participants may not want to reveal their identities to maintain their privacy, while others may not have access to the necessary identity verification tools.

Additionally, the identity verification process can be time-consuming and costly, which may discourage some participants from joining the network.

13. Proof of Activity (PoA)

It is a hybrid consensus mechanism that combines Proof of Work (PoW) and Proof of Stake (PoS) to achieve a more secure and efficient blockchain network. PoA was developed as an alternative to the traditional PoW and PoS mechanisms, which have been criticized for their high energy consumption and centralization risks.

In PoA, the blockchain network first uses PoW to generate new blocks, similar to Bitcoin. However, unlike Bitcoin, PoA does not rely solely on PoW for consensus. Instead, once a new block is generated, the system selects a random group of validators from the network based on their PoS holdings. These validators are then required to sign the new block, providing a second layer of consensus verification.

Credit — fourweekmba.com

By combining PoW and PoS, PoA aims to achieve a more secure and efficient consensus mechanism. PoW ensures that blocks are difficult to create and helps prevent malicious attacks, while PoS encourages long-term network participation and prevents centralization by distributing rewards based on the amount of stake a participant holds.

Benefits of Proof of Activity

One of the main benefits of PoA is that it is less energy-intensive than PoW, as it does not require miners to continuously solve complex mathematical problems. Additionally, the PoS element of PoA helps prevent centralization, as it encourages more participants to hold a stake in the network and reduces the incentive for large mining pools to dominate the network.

Drawbacks of Proof of Activity

However, PoA also has some drawbacks. One is that it can still be susceptible to 51% attacks, where a group of validators colludes to manipulate the network. Additionally, PoA can be more complex to implement than traditional PoW or PoS mechanisms, as it requires a combination of both.

14. Proof of Elapsed Time (PoET)

It is a consensus algorithm developed by Intel for use in permissioned blockchain networks. PoET is designed to be a more energy-efficient and secure alternative to traditional Proof of Work (PoW) algorithms used in public blockchains like Bitcoin.

In PoET, each participant in the network is assigned a random waiting time, similar to a lottery. Participants compete to be the first to finish their wait time, and the first to do so is granted the right to create the next block. This process is called a “leader election.”

Unlike in PoW, where participants compete to solve complex mathematical problems, in PoET participants simply wait for their assigned time to elapse. This waiting period is determined using a trusted execution environment (TEE) provided by Intel’s hardware, which ensures that the wait time is random and cannot be influenced by participants.

Benefits of PoET

One of the main benefits of PoET is that it is much less energy-intensive than PoW, as it does not require participants to continuously perform complex calculations. This makes it more suitable for use in permissioned blockchain networks, where participants are known and trusted.

PoET is also designed to be highly secure. Since each participant is assigned a random wait time, it is very difficult for a single participant or group of participants to manipulate the network. Additionally, the use of Intel’s TEE ensures that the wait time is truly random and cannot be predicted or influenced by participants.

Drawbacks of PoET

However, one potential drawback of PoET is that it requires the use of Intel’s hardware, which may limit its adoption in some cases. Additionally, since PoET is designed for use in permissioned networks, it may not be suitable for public blockchains where anyone can participate.

15. Proof of Importance

This is a consensus algorithm used in the NEM blockchain network. It is designed to determine which nodes in the network should have the right to create new blocks and validate transactions based on their overall level of participation and investment in the network.

In proof of importance, a node’s importance is determined by two factors: its balance of the native cryptocurrency (XEM) and its overall participation in the network. The more XEM a node holds and the more transactions they make, the higher its importance score. This score is then used to determine which nodes have the right to create new blocks and validate transactions.

Credit — btcwires.com

Benefits of Proof of Importance

One of the benefits of Proof of Importance is that it is designed to encourage active participation in the network. Nodes that hold a large amount of XEM but do not participate in transactions will have a lower importance score than nodes that actively participate in the network. This incentivizes nodes to be active participants in the network, which can help improve the overall security and reliability of the blockchain.

Another benefit of PoI is that it is designed to be more energy-efficient than traditional Proof of Work (PoW) algorithms used in some other blockchain networks. Since PoI does not require nodes to perform complex calculations, it uses less energy and computing resources.

Drawbacks of Proof of Importance

However, one potential drawback of PoI is that it may not be as secure as some other consensus algorithms. Since a node’s importance is determined in part by its XEM balance, there is a risk that a large number of XEM could be concentrated in the hands of a small number of nodes, giving them a disproportionate amount of influence over the network.

Conclusion

In conclusion, selecting the right consensus algorithm is a critical decision when designing a blockchain network. Each consensus algorithm has its own strengths and weaknesses, and choosing the wrong one can have severe consequences on the network’s security, decentralization, and performance.

Therefore, it is essential to evaluate the requirements of the blockchain application and consider factors such as scalability, efficiency, security, and decentralization while selecting the consensus algorithm. A well-designed consensus algorithm can provide several benefits such as improved security, increased efficiency, faster transaction times, and enhanced decentralization. On the other hand, an ill-suited consensus algorithm can result in slower transactions, higher costs, and decreased security.

Ultimately, the right consensus algorithm choice can determine the success of a blockchain application, making it vital to choose wisely. As blockchain technology continues to evolve and new consensus algorithms emerge, it is essential to stay up-to-date and informed to make the best decision for each unique blockchain application.

Get Certified in Blockchain Technology.

Both tech and Non-Tech can apply!
10% off on Blockchain Certifications.
Use Coupon Code — blockchain10
Enroll Now — https://bit.ly/3ND4QAl

--

--

Learn With Whiteboard

Get byte-size whiteboard lessons to help you increase your tech and non tech vocabulary.