top of page
Search
Writer's pictureDR.GEEK

Proof-of-authority (PoA)

( 29th August 2019 )

In PoA-based networks, transactions and blocks are validated by approved accounts, known as validators. Validators run software allowing them to put transactions in blocks. The process is automated and does not require validators to be constantly monitoring their computers. It, however, does require maintaining the computer (the authority node) uncompromised. The term was coined by Gavin Wood, co-founder of Ethereum and Parity Technologies.

With PoA, individuals earn the right to become validators, so there is an incentive to retain the position that they have gained. By attaching a reputation to identity, validators are incentivized to uphold the transaction process, as they do not wish to have their identities attached to a negative reputation. This is considered more robust than PoS (proof-of-stake), as:

In PoS, while a stake between two parties may be even, it does not take into account each party’s total holdings. This means that incentives can be unbalanced.

Meanwhile, PoW uses an enormous amount of computing power, which, in itself lowers incentive. It is also vulnerable to attack, as a potential attacker would only need to have 51% of the mining resources (hash rate) to control a network, although this is not easy to do.

On the other hand, PoA only allows non-consecutive block approval from any one validator, meaning that the risk of serious damage is centralized to the authority node.

PoA is suited for both private networks and public networks, like POA Network, where trust is distributed.

"Proof-of-Research" (POR)

Gridcoin implements a "Proof-of-Research" (POR) scheme, which rewards users with Gridcoin for performing useful scientific computations on the Berkeley Open Infrastructure for Network Computing (BOINC), a distributed computing platform. Gridcoin uses a more energy efficient proof-of-stake system - although it fails to explicitly address the energy cost of computing power.

Gridcoin attempts to ease the environmental energy impact of cryptocurrency mining through its Proof-of-Research and Proof-of-Stake protocols.

Comparisons (Proof-of-work and Proof-of-stake)

The proof-of-work (PoW) consensus uses a mining mechanism, where PoA does not. The proof-of-stake (PoS) mechanism works using an algorithm that selects participants with the highest stakes as validators, assuming that the highest stakeholders are incentivized to ensure a transaction is processed. PoW works by verifying that work (mining) has been done before transactions are carried out.

Meanwhile, PoA uses identity as the sole verification of the authority to validate, meaning that there is no need to use mining.

Delegated proof-of-stake (DPoS) works using witnesses, who generate blocks. Witnesses are elected by stakeholders at a rate of one vote per share per witness. However, with PoA, the appointment of an authority is automatic, meaning that there can be no bias or uneven process caused by unequal stakes. In PoA, validators need to have their identity verified formally via DApps, and have this identity information available in the public domain for everyone to cross-reference.

Since PoA security is centralized in the form of the authority node, a lot of PoA critics wonder the point of using a blockchain for this kind of usages - stating that PoA blockchains are not really decentralized and a simple DB would be more efficient, faster, and cost effective.

Examples

1) Parity supports PoA claims on the Ethereum network.

2) POA Network.

3) Kovan is an Ethereum testnet that runs on PoA.

0 views0 comments

Recent Posts

See All

Commenti


bottom of page