visit
The absurd rate of innovation that takes place in crypto is a breeding ground for new ideas. These new ideas require new, yet familiar forms of being communicated. One of the most overused forms of communication is through the formulation of terminology as “PROOF-OF-xyz”.
Everybody is always trying to prove something & this is for good reason, after all, the very essence of blockchain is “Don’t Trust, Verify.”
Ok, not really, but we will dissect one of the most important technical aspects upon which the entire industry is built: Consensus Mechanisms
Computational complexity
The amount of resources & steps that are necessary in order to arrive at the desired outcome (the quicker/shorter, the better)
Fault-tolerance
At the core of any computational network’s consensus is the ability to maintain operations in the event that network participants drop out or stop working (which can happen sporadically) The higher the fault tolerance, the easier it is to game the system; the lower the tolerance the more resilient the system it. So if the fault tolerance of a system is 51% that means that the system can continue to operate as long as 49% is compromised. If the tolerance is 67%, that means the system can handle only 33% of compromised nodes.
Resilience
The ability to continue delivering proper results in the event of malicious activity (which can happen for prolonged periods of time)
Liveliness
The guarantees that even after some unforeseen event happens, the network will continue to operate truthfully
While there are hundreds, if not thousands of different mechanisms out in the marketplace today; there are two general types of Consensus mechanisms based on their operational logic, proof-of-work & proof-of-stake. Every other variation will just be some modular adjustment or combination of these two.
Decentralization: Very High
Fault Tolerance: 51%
Use case: Securing blockchain history
Description: Resource-intensive process of extreme mathematical complexity that demands dedicated hardware. POW consensus is reached via the contribution of computational resources to solving mathematical problems of monstrous complexity. Here, nodes are called miners and earn their rewards through the emission of new network tokens. Leaders for block proposals are chosen on a first-come, first-serve basis according to whoever is able to solve the mathematical problem.
POW Examples - Bitcoin (BTC), Dogecoin (DOGE), Litecoin (LTC),
Decentralization: moderate-high
Fault Tolerance: 67%
Use case: Securing blockchain history
Description: The most popular model for consensus. The concept behind this one is straightforward, users lockup/collateralize their tokens in order to participate. In POS models there are fixed circulating supplies meaning that no new tokens are issued as block rewards, the rewards are earned through the accrual of transaction fees. Additionally, unlike POW, POS models employ stake-slashing for any misbehavior; in the event that malicious/subversive behavior is found, that violating node will have ~50% of its stake forfeited to the network for redistribution amongst the fair nodes. Commonly considered to be less secure & more centralized than POW in the sense that incentives of network nodes are similar to legacy financial systems; deeper-pocketed players have a better chance to own the network nodes.
POS Examples — Ethereum (ETH), Cardano (ADA), , CELO (CELO), Polkadot (DOT), Avalanche (AVAX),
Decentralization: Low
Fault Tolerance:** 67%
Use case: Securing blockchain history
Description: The most popular adaptation of regular POS; delegated Proof of Stake is an attempt to democratize access to participation in the network’s operations & rewards. Only the largest can partake in the securing process while smaller-sized token holders “delegate” their tokens to the operating nodes; basically, they vote with their tokens, never giving them to the actual node. dPOS consensus models will typically have in the range of 21–101 nodes that are handling network operations. These network operators are selected based on the amount of tokens they have at stake. The largest benefit of the dPOS variant is that by constraining the amount of nodes; while this leads to centralization, it does also bring the added benefit of faster processing times.
dPOS Examples — Polygon (MATIC), Tron (TRX), EOS (EOS), , ,
Decentralization: Low - Moderate
Fault Tolerance: 67%
Use case: Securing blockchain history
Description: This is an advanced variation of POS. Very similar to the delegated proof of stake model, Leased Proof-of-Stake provides the technical difference in; that in dPOS the network nodes accrue the rewards & then distribute them to their delegators; but in LPOS users are actually lending their tokens to the nodes, thereby they own a portion of that nodes weight & accrue the rewards directly, rather than through the delegate. The tradeoff here is that to run the physical node, a very high level of technical knowledge & equipment is needed. So far this implementation has only been utilized in one project.
LPOS Examples — Waves (WAVES)
Decentralization: Moderate
Fault Tolerance: 51%
Use case: Securing blockchain history
Description: As the name might have hinted out, HPOS is a creative architecture that leverages both base consensus models (POW + POS). In this model, there are two tiers of processes that take place. On the base level, miners (just as in POW) verify & package transactions into blocks. Then these pre-vetted blocks are submitted into the mempool of the second tier, where POS nodes run an extra round of checks on the blocks & validate them.
HPOS Examples — DASH (DASH),
Decentralization: Very High* (not really)
Fault Tolerance: 67%
Use case: Securing blockchain history
Description: Another variation of POS. Novel in design when compared to other variations because it is arguably more decentralized (not). This variant does not have a punishment mechanism; so technically bad actors can act badly & not suffer. However, this design is extremely low in its barrier to entry, only 1 single token is required to join as a node. In theory, this is easy to game because a single actor can make a silent-Sybil attack by distributing 1,000 tokens over 1,000 different wallets.
PPOS Examples — Algorand (ALGO)
Decentralization: Low-Moderate
Fault Tolerance: 67%
Use case: Securing blockchain history
Description: Reputation-based model that is yet another implementation of POS. Difficult to become accepted as a valid node, easy to get kicked out. I must admit, this one is a little more creative in its approach. Proof of importance utilizes two factors outside of just the stake; these include:
POI Examples —
Decentralization: None - very low'
Fault Tolerance: 51%
Use case: Securing blockchain history
Description: Centralization is the name of the game here. POA utilizes a valuable non-financial primitive to operate, identity. By using identity, all of the operating network participants risk their reputations in order to be part of the consensus circle. Anywhere there is identity there is centralization. However, by having small constrained amounts of known operators, networks that use POA have extremely high throughput potential. This is definitely not a mechanism that you want underpinning any public goods blockchains, but that hasn’t stopped projects from leveraging it.
POA Examples — VeChain (VET)
Decentralization: Low
Fault Tolerance: 67%
Use case: Developing robustness of a mechanism
Description: A key compositional component for building other consensus mechanisms. Typically found in permissioned networks, pBFT works by leveraging the replication of data throughout nodes. Not the most efficient of models due to inherent communication restraints, but very resilient (obviously tolerance is high in centralized systems, the players only have themselves & their friends to blame).
pBFT Examples — {uses a mixture of POW + pBFT}
Decentralization: Low
Fault Tolerance: 51%
Use case: Developing robustness of a mechanism
Description: As is the case with its cousin above (pBFT) delegated Byzantine fault tolerance is a compositional element for the creation of more robust blockchain systems. On its own, the mechanism can be used to support distributed communications, however, they are limited by communication constraints that make dBFT systems centralized by default.
dBFT Examples — NEO (NEO)
Decentralization: Low
Fault Tolerance: 51%
Use case: Securing blockchain history
Description: Unique twist on the POW consensus mechanisms; rather than utilizing processing units to constantly solve problems; proof-of-Capacity leverages disk space/memory. POC plots potential solutions to future problems & stores them in the empty disk space of miners. Not to be confused with a total lack of mining, because mining still takes place; it just happens pre-emptively (which then might bring up potential security risks). Not very effective at large scale due to high sensitivity in the event of a node dropping out, which requires a re-plotting of the whole network & becomes less efficient as more mining nodes join (they require additional plotting which then creates huge backlogs on the computers allocating disk space).
POC Examples — , ,
Decentralization: N/A
Fault Tolerance: N/A
Use case: Timestamping & organization
Description: This is not a standalone protocol to build a blockchain on. POH is used with, you guessed it, POS, as a technique used to timestamp transactions using a VRF (verifiable random function) hashing method that allows for blocks in a blockchain to be processed & submitted into a mempool. This allows for a network to continue operations at maximum capacity regardless of what might be happening with any individual node at a given time. If a node did not submit a block on time that is not going to hinder the production of the next block because the delayed block will be organized into its correct position as soon as possible.
POS Examples — Solana (SOL)
Decentralization: Nope
Fault Tolerance: 51%
Use case: Securing blockchain history
Description: This is an extremely centralized model for building a network, primarily because it is Intellectual property (IP) that is protected by patents & nobody wants to go to war with Intel. Nevertheless, the design itself is brilliant. POET is yet another model that leverages POS logic with a mixture of the Nakamoto consensus principle of the longest/heaviest chain, along with its own added concepts of an internal timer & “resting”. Miner nodes are selected at random & the same node cannot be selected back to back. Once a node commits a block a random timer is put on the node & it falls “asleep”. While it is asleep it does not use any computational resources; which makes this model greener in terms of electrical consumption than other POS variants.
POET Example —
Decentralization: Low
Fault Tolerance: 51%
Use case: Securing Storage & data
Description: An augmented version of POW, Proof-of-Access is an algorithm created by the Arweave project that uses a clever technique to verify incoming blocks. Instead of solely relying on the previous block, miners use something called a “recall block” along with a randomly picked previous block. Recall blocks can be thought of as reliable points in the history of the chain that do not require the storage of all the chain data. This creates a lightweight model for proving data, resulting in more efficient storage capabilities, less computational resource waste & increased throughput. One potential downside of this model is that it prefers older nodes due to their history archives; newer nodes do not have access to the same archived data & will only be downloading the recall blocks. Which in theory creates a hierarchy by age.
POA Examples — Arweave (AR)
Decentralization: N/A
Fault Tolerance: 51%
Use case: Securing Storage & data + Cloud Computing
Description: This beauty of a model is actually an expansion of a predecessor model in data storage (Proof-of-Space) with a build-out integration of POW that prioritizes the ability of storage space on the network/in the operational node’s disk space. There are elements of the pBFT consensus mechanism in that data that is added into the network, is replicated throughout network miners. The ingenuity of POREP is defined by its ability to combat the decentralized cloud computing industry’s most devious attack vector known as a “generation attack”, whereby a mining node pays to upload a document & then infinitely requests that document, collecting fees for providing the storage of it.
POREP Examples — Filecoin (FIL)