Blockchain for Enterprise – Permissionless vs. Permissioned Blockchains

Blockchain Technology is mainly categorized into two categories Permissionless and permissioned blockchain. In the permissionless blockchain platform, anyone can join the network and obtain the services without proving their actual identity. However, in the permissioned blockchain platform, users need to prove their identity, and mostly they know each other by some means. 

PropertiesPermissionless BlockchainPermissioned Blockchain
Access Open read/write access to the database.Permissioned read/write access to the database.
ScaleScale to a large number of nodes, but not in transaction throughput.Scale in terms of transaction throughput, but not to a large number of nodes.
Consensus Proof of work/proof of stake.Closed membership consensus algorithms.
Identity Anonymous/pseudonymous.Identities of nodes are known, but transaction identities can be private/anonymous/pseudonymous.
AssetNative assets.Any asset/data/stage.

References

  • NPTEL lecture series on Blockchains Architecture, Design and Use Cases by Prof. Sandip Chakraborty, IIT Kharagpur.

 121 total views,  1 views today

Scroll to Top
Scroll to Top
%d bloggers like this: