You have 3 free guides left 😟
Unlock your guides
You have 3 free guides left 😟
Unlock your guides

4.3 Permissioned vs. Permissionless Blockchains

3 min readaugust 6, 2024

Blockchain networks come in two main flavors: permissioned and permissionless. Permissioned blockchains limit access, requiring approval to join. They're great for businesses needing privacy. Permissionless blockchains are open to all, like Bitcoin and .

These types use different ways to agree on transactions. Permissioned blockchains use faster methods for trusted groups. Permissionless ones use slower but more decentralized approaches like mining. Each has its own strengths in security, speed, and who can join.

Blockchain Types

Permissioned vs Permissionless Blockchains

Top images from around the web for Permissioned vs Permissionless Blockchains
Top images from around the web for Permissioned vs Permissionless Blockchains
  • Permissioned blockchains restrict access to the network, requiring users to obtain permission from a central authority or to participate
    • Typically used in enterprise settings where data privacy and are critical (supply chain management)
    • Enables fine-grained control over user roles and permissions within the network
  • Permissionless blockchains allow anyone to join the network and participate in the consensus process without requiring permission
    • Exemplified by public blockchains like Bitcoin and Ethereum, which prioritize decentralization and open access
    • Attracts a larger, more diverse set of participants but may face challenges in terms of and regulatory compliance

Consensus Mechanisms in Permissioned and Permissionless Blockchains

  • Permissioned blockchains often employ more efficient consensus algorithms that do not rely on computational power, such as Practical Byzantine Fault Tolerance (PBFT) or
    • These algorithms are better suited for environments with a limited number of trusted participants
    • Faster transaction processing and higher throughput compared to permissionless blockchains
  • Permissionless blockchains typically use Proof-of-Work (PoW) or Proof-of-Stake (PoS) consensus mechanisms
    • PoW involves competing to solve complex mathematical problems to validate transactions and create new blocks (Bitcoin mining)
    • PoS requires participants to stake their tokens as collateral to validate transactions and create new blocks (Ethereum 2.0)
    • These mechanisms prioritize decentralization and security but may be slower and more resource-intensive than permissioned alternatives

Access Control

Identity Management and Access Rights

  • Permissioned blockchains require robust systems to control access to the network and assign roles and permissions to participants
    • Digital identities are typically linked to real-world identities, ensuring accountability and compliance with regulations ( (KYC) and (AML) requirements)
    • can be granularly defined, allowing different levels of access to sensitive data or smart contract functionality based on a participant's role (read-only access for auditors)
  • Permissionless blockchains often rely on , with access control enforced through the consensus mechanism and smart contract logic
    • enables users to interact with the blockchain using pseudonymous addresses, preserving a degree of privacy
    • Access to specific smart contract functions or assets can be controlled through the use of or implemented within the smart contract itself

Security Implications of Access Control Models

  • Permissioned blockchains offer enhanced security through tighter access control and the ability to vet participants before granting access
    • Reduced risk of malicious actors infiltrating the network and compromising the integrity of the blockchain
    • Potential vulnerabilities may arise from points or the need to trust the entities managing access control
  • Permissionless blockchains prioritize security through decentralization and the economic incentives built into the consensus mechanism
    • Large, diverse networks are more resistant to attacks, as the cost of compromising a majority of participants is prohibitively high
    • Open access may attract malicious actors, but the transparent nature of the blockchain allows for swift detection and response to suspicious activities

Regulatory Compliance in Permissioned and Permissionless Blockchains

  • Permissioned blockchains are better positioned to comply with industry-specific regulations and data protection laws
    • Ability to restrict access to sensitive data and maintain an audit trail of all transactions and interactions
    • Compliance with data localization requirements by hosting nodes within specific jurisdictions (General Data Protection Regulation (GDPR) in the European Union)
  • Permissionless blockchains face challenges in terms of regulatory compliance due to their open, pseudonymous nature
    • Difficulty in enforcing Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations without compromising user privacy
    • Potential for misuse in illegal activities, such as money laundering or terrorist financing, which may attract regulatory scrutiny (Silk Road darknet market)
  • Both permissioned and permissionless blockchains must navigate evolving regulatory landscapes and adapt to new compliance requirements as they emerge
    • Proactive engagement with regulators and the development of industry standards can help foster trust and mainstream adoption of blockchain technology
© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.


© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.

© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.
Glossary
Glossary