Swap Tracker
June Katz 5 min read

Blockchain Consensus Algorithms and Their Varieties

Blockchain Consensus Algorithms and Their Varieties

This article is written for beginners who are just starting to learn the crypto world. We want to help you a little. As you might have guessed, this article will be about blockchain consensus algorithms.

On the blockchain market, there are a lot of consensus algorithms allowing us to choose what is the most relevant node for signing the next block. Some of them are well known and used often, such as the PoW algorithm, and some are only trying to earn a place in the sun.

What are the consensus algorithms?

Most cryptocurrencies have a blockchain, which is controlled by a consensus-building mechanism. The objective of this consensus algorithm is to record information in the blockchain, as well as to ensure the safe and efficient operation of the cryptocurrency network.

Transaction data in cryptocurrencies is recorded in the blockchain and then can not be changed. A consensus mechanism verifies the validity of these transactions. The peculiarity of this principle is that the confirmation of the information from each transaction should be provided to 51% of participants in the network. The consensus algorithm should be made in such a way as to ensure the stable operation of the network.

Here are the most popular varieties of blockchain consensus algorithms.

Proof-of-Work (PoW)

Thanks to Bitcoin, the PoW consensus algorithm is the best-known way to confirm transactions. The main idea is that the nodes of the blockchain network while confirming transactions do complex computational work, the result of which would be easily and quickly checked by other nodes of the network.

The first node that has fully performed all the necessary calculations receives a reward from the blockchain network. All nodes are struggling with each other (increasing the capacity of computing resources) to be a node that receives a reward.

Disadvantages of the PoW consensus algorithm:

  • Senseless energy costs
  • A large number of nodes produce calculations, but in reality, only one (the first) conducts successful work and receives a reward. This is the main reason for creating new consensus algorithms.

Proof-of-Stake (PoS)

PoS is one of the most popular consensus algorithms in blockchain networks. In this algorithm, the creator of the next block in the blockchain selects a node that has a larger balance — the number of resources, such as coins in the cryptocurrency. For the creation of the block itself, the node does not receive a reward. The reward is paid for the transaction.

Possible node selection options:

  • randomly from the most “rich” nodes;
  • randomly from the oldest nodes.

Disadvantages of the PoW consensus algorithm:

  • Motivation in the concentration of funds, which can lead to the centralization of the network.

Delegated Proof-of-Stake (DPoS)

DPoS is one of the varieties of the Proof-Of-Stake consensus algorithm, in which blocks are signed by the selected representatives. The owners of the largest balances choose their representatives, each of whom has the right to sign blocks in the blockchain network. Each representative with one or more percent of all votes goes to the Council. From the formed “Board of Directors” is selected (in a circle) the next representative, who will sign the next block. In the event that for any reason the representative has missed his turn in the signing, he is deprived of the delegated votes and leaves the “Board of Directors”, after which the next most suitable candidate is chosen in his place.

Owners of balance sheets delegating the votes in no way lose control over them as at any time can withdraw them from the representative.

Leased Proof-of-Stake (LPoS)

LPoS is another modification of the Proof-of-Stake algorithm. It is supported only by the Waves platform. As a part of this algorithm, any user has the ability to transfer their balance to rent mining nodes, and for these mining nodes – to share part of the profits with users. This consensus algorithm allows you to get income from mining activities without using mining itself.

Proof-of-Importance (PoI)

PoI is the consensus algorithm that used the blockchain platform NEM. The importance of each user in the NEM network is defined as the amount of funds available to him on the balance sheet and the number of transactions made from/to his wallet. Unlike the more usual PoS, which takes into account only the balance of the user’s available funds, PoI takes into account both the amount of funds and the user’s activity in the blockchain network. This approach involves users not only to hodl funds, but also to actively use them.

Proof-of-Authority (PoAuthority)

PoA consensus algorithm stands apart from other algorithms because it does not need to have any mining at all, as in the cases of PoW or PoS. In a PoA-based blockchain network, all transactions and blocks are verified through approved accounts (validators). Conducting transactions and creating blocks takes place automatically using the computing power of the validator.

The negative point of using the PoA consensus algorithm:

  •  As it is clear from the description –  the key persons are validators, which leads to centralization. Probably in some cases, in private networks and with the help of fully (as far as possible) trusted accounts, it makes sense.

Related Posts

What Are Crypto Tokens?

What Are Crypto Tokens?

June Katz 5 min read
A c rypto token is a unit of value issued by a tech or crypto start-up with an intent to be a  part of the ecosystem of their technology platform or project. Tokens are supported by blockchains. They only physically exist in the form of registry entries in the said blockchain. Initially, most tokens were based on the ERC-20 protocol by Et
Read more ❯
Cryptocurrency Wallet Types: Pros And Cons

Cryptocurrency Wallet Types: Pros And Cons

June Katz 7 min read
In order to store crypto and increase the security level of your funds, you can use a cryptocurrency wallet. They have a higher level of protection in comparison with the crypto exchanges. In this article, you will get to know about the advantages and disadvantages of crypto wallets and get acquainted with their varieties and the most popular ex
Read more ❯
The Biggest Cryptocurrency Thefts in the Last 10 Years

The Biggest Cryptocurrency Thefts in the Last 10 Years

June Katz 11 min read
In this article, we will try to remember all the major cryptocurrency thefts over the past 10 years. 1. Bitstamp hack , $5.3 mln ( BTC ), January 4th, 2015 On January 4, 2015, the operational hot wallet of Bitstamp announced that it was hacked by an anonymous hacker and 19,000 Bitcoins (worth of $5 million) were lost. The initiatio
Read more ❯
Public And Private Keys

Public And Private Keys

June Katz 2 min read
As well as fiat, cryptocurrencies need to be stored securely. That’s what we need these keys for. In this article, we will tell you what private and public keys are and how they are used. What are private keys? A private key is a number that is encoded in different formats depending on which wallet you are using. In each format, the private
Read more ❯

Where all instant exchangers met for your smoothest experience

Maximize profits, minimize search

Recent Posts

What Are Crypto Tokens?
What Are Crypto Tokens?

What Are Crypto Tokens?

June Katz 5 min read
A c rypto token is a unit of value issued by a tech or crypto start-up with an intent to be a  part of the ecosystem of their technology platform or project. Tokens are supported by blockchains. They only physically exist in the form of registry entries in the said blockchain. Initially, most tokens were based on the ERC-20 protocol by Et
Read more ❯
Cryptocurrency Wallet Types: Pros And Cons
Cryptocurrency Wallet Types: Pros And Cons

Cryptocurrency Wallet Types: Pros And Cons

June Katz 7 min read
In order to store crypto and increase the security level of your funds, you can use a cryptocurrency wallet. They have a higher level of protection in comparison with the crypto exchanges. In this article, you will get to know about the advantages and disadvantages of crypto wallets and get acquainted with their varieties and the most popular ex
Read more ❯
The Biggest Cryptocurrency Thefts in the Last 10 Years
The Biggest Cryptocurrency Thefts in the Last 10 Years

The Biggest Cryptocurrency Thefts in the Last 10 Years

June Katz 11 min read
In this article, we will try to remember all the major cryptocurrency thefts over the past 10 years. 1. Bitstamp hack , $5.3 mln ( BTC ), January 4th, 2015 On January 4, 2015, the operational hot wallet of Bitstamp announced that it was hacked by an anonymous hacker and 19,000 Bitcoins (worth of $5 million) were lost. The initiatio
Read more ❯
Public And Private Keys
Public And Private Keys

Public And Private Keys

June Katz 2 min read
As well as fiat, cryptocurrencies need to be stored securely. That’s what we need these keys for. In this article, we will tell you what private and public keys are and how they are used. What are private keys? A private key is a number that is encoded in different formats depending on which wallet you are using. In each format, the private
Read more ❯
Exchanges and Exchangers
Exchanges and Exchangers

Exchanges and Exchangers

June Katz 3 min read
There are several ways to swap digital currency in the cryptocurrency market. The choice is between the exchanges and swap services, or exchangers. Both offer a wide range of digital currencies , a lot of altcoins at an affordable cost. So what is the difference? Where it’s better to exchange Bitcoin – on crypto exchange or the excha
Read more ❯