1 thought on “The three common consensus mechanisms for blockchain”

  1. The blockchain is based on the P2P network. The distributed ledger system participated by nodes is the biggest feature of "decentralization". In other words, in the blockchain system, there is no need to establish trust between users and users, between users and institutions, and between institutions and institutions. It only needs to rely on the blockchain protocol system to achieve transactions.

    This, how to ensure the accuracy, authority, and reliability of the ledger? Why do nodes on the blockchain network participate in accounting? What if the node is faked? How to prevent the ledger from being tampered with? How to ensure data consistency between nodes? ... These are the problems that the blockchain needs to solve when establishing a "decentralized" transaction, which has a consensus mechanism.

    The so -called "consensus mechanism" is to complete the verification and confirmation of transactions through the voting of special nodes in a short period of time; when there is inconsistent opinion, no central control is controlled, several cases of control, several cases of several controls, several cases of several controls, several cases of control, several in cases of no central control. The consensus participating in the decision -making of the node, that is, how to establish a trust relationship between individuals who do not trust each other.

    Blockchain technology uses a set of consensus -based mathematical algorithms to establish a "trust" network between machines, so as to endorse a new credit creation through technical endorsement instead of centralized credit institutions.

    The different blockchain types require different consensus algorithms to ensure that the final block on the blockchain can reflect the state of the entire network at any time.

    In so far, the blockchain consensus mechanism mainly includes the following: POW workload certificate, POS equity certificate, DPOS authorized equity certificate, PAXOS, PBFT (practical Byzantine 算 algorithm), DBFT, DAG (DAG (DAG (DAG (DAG (DAG (DAG (DAG (DAG (DAG (DAG (DAG There is no loop graph)

    It the principles of common POW, POS, DPOS consensus mechanisms and application scenarios

    Concepts:

    Proof of work, the earliest economic term, refers to the measurement method set by the system to achieve a certain goal. Simple understanding is a proof that it is used to confirm that you have done a certain amount of work and prove the corresponding workload through certification of the results of the work.

    The workload proof mechanism has the advantages of completely decentralization. In the blockchain with the workload certificate as the consensus, nodes can be freely entered and exited, and the numerical solution of the random hash distribution is solved. The right to compete for accounting and obtain the correct value to generate the ability to generate blocks is the specific manifestation of node computing power.

    Application:

    POW's most famous application is Bitcoin. In the Bitcoin network, during the generation of Block, the miners need to solve the complex password mathematics problem. Find a required block hash consisting of n front leads, and the number of zero depends on the difficulty of the network. During this period, a large number of attempts are required to calculate (workload), and the calculation time depends on the machine's hash computing speed.

    . Finding reasonable hash is a probability event. When the node has the computing power of N%of the entire network, the node has the probability of N/100 to find the block hash. After the node successfully finds the HASH value that is satisfied with, it will immediately perform a broadcast package block on the entire network. The node of the network receives the broadcast packaging block and will immediately verify it.

    If validation passes, it indicates that there are already nodes to successfully solve the fans, and they will no longer compete for the current block. Block competition guess. Only the fastest puzzle block can be added in the ledger, and other nodes are replicated to ensure the uniqueness of the entire ledger.

    If the node has any cheating behaviors, it will cause the node to verify the network to not pass it, and directly discard the block of its packaging. This block cannot be recorded in the general ledger. It is in vain, so under the huge mining cost, the miners consciously and voluntarily abide by the consensus agreement of the Bitcoin system, which also ensure the safety of the entire system.

    The advantages and disadvantages

    If: the result can be quickly verified, the node undertaken by the system is large, the cost of the evil is high, and the conscious compliance of the miners is guaranteed.

    Disadvantages: need a large amount of algorithms to reach a longer period of consensus

    Concept: n
    PROOF of Stake Provers provide a certain amount of ownership of cryptocurrencies.

    The operating method of the rights and interest certification mechanism is that when creating a new block, the miners need to create a "currency right" transaction, and the transaction will send some coins to the miners themselves according to the pre -set ratio. The equity certificate mechanism reduces the mining difficulty of the node according to the proportion and time of each node to the proportion and time of each node, thereby accelerating the speed of finding random numbers.

    Application:

    In 2012, netizens of the pseudonym Sunny King launched a Peercoin (point coin), which is the first application of the equity proof mechanism in cryptocurrencies. The maximum innovation of PPC is that its mining method is mixed with two methods: POW and POS. The workload proof mechanism is issued to issue new coins, and the rights and interest proof mechanisms are used to maintain network security.

    In order to achieve POS, Sunny King borrows from Satoshi Nakamoto's coinbase, and specially designed a special type of transaction called Coinstake.

    This above shows the working principle of Coinstake. Among them, the currency age refers to the holding time period of the currency. If you have 10 coins and hold 10 days, then you have collected 100 days of currency. age. If you use these 10 coins, the currency is consumed (destroyed).

    The advantages and disadvantages:

    advantages: shorten the time required to reach the consensus, more energy conservation than the workload proof.

    Disadvantages: essentially require nodes in the network for mining operations. The authenticity of transfers is difficult to guarantee

    Concept: r
    authorized equity certificate Delegated Proof of Stake, similar to the board of directors, this mechanism has a built -in real -time shareholder voting system, just like the system is always holding a shareholders conference that will never go to the market. All shareholders vote here to decide the company's decision -making.

    This equity certification, while trying to solve the problem of traditional POW mechanisms and POS mechanisms, it can also implement the negative effects brought by technology -based democracy to offset centralization. The decentralization of the blockchain established based on the DPOS mechanism depends on a certain number of representatives, not all users. In such a blockchain, all nodes vote for a certain number of node representatives, and they will represent the nodes to confirm the block and maintain the orderly operation of the system.

    At the same time, all nodes in the blockchain have the power to remove and appoint representatives at any time. If necessary, all nodes can make the current node representatives lose their qualifications, re -elected new representatives to achieve real -time democracy.

    Application:

    Bitshare is a type of crypto currency using the DPOS mechanism. By introducing the concept of witnesses, witnesses can generate blocks, and everyone holding more than special stocks can vote for the witness. The first n (n is usually defined as 101) candidates of the total consent votes can be elected as a witness. Essence

    The testimony of the testimony of the testimony of the testimony (1 day) is updated once. The witness and then arranged randomly. Each witness has a permissions of 2 seconds in order to generate blocks. If the witnesses cannot generate the block at a given time, the block generates permissions to the witnesses corresponding to the next time film. Essence This design of DPOS makes the production of the block faster and more energy -saving.

    DPOS made full use of the shares' voting to reach a consensus in a venue for the owner. The n witnes they voted for voting can be regarded as N mining pools, and this N mining pool The rights of each other are exactly equal. The holders can replace these witnesses (mining pools) at any time. As long as they provide unstable computing power, the computer is down, or trying to use the power in their hands for evil.

    If disadvantages:

    If: Reduce the number of participation and bookkeeping nodes, thereby reaching the second -level consensus verification

    Disadvantages: centrality Weaker, security is weaker than POW. At the same time, the node agent is artificially selected. The fairness is lower than the POS. At the same time, the entire consensus mechanism still depends on the addition of tokens to maintain the stability of the proxy node.

Leave a Comment