Home > Today’s Crypto News
bitcoin
bitcoin

$108666.101237 USD

0.49%

ethereum
ethereum

$4347.968522 USD

0.77%

tether
tether

$1.000168 USD

0.02%

xrp
xrp

$2.803957 USD

0.01%

bnb
bnb

$857.733203 USD

0.34%

solana
solana

$200.950393 USD

-0.38%

usd-coin
usd-coin

$0.999945 USD

0.01%

dogecoin
dogecoin

$0.214830 USD

2.15%

tron
tron

$0.338022 USD

0.63%

cardano
cardano

$0.816559 USD

0.34%

chainlink
chainlink

$23.370293 USD

0.73%

hyperliquid
hyperliquid

$44.163430 USD

0.17%

ethena-usde
ethena-usde

$1.000528 USD

0.01%

sui
sui

$3.281138 USD

1.95%

stellar
stellar

$0.356334 USD

-0.10%

Consortium Blockchain

What Is a Consortium Blockchain?

Consortium blockchains are created and used by groups of corporations when they want to enjoy the advantages in exchanging value and information offered by a distributed ledger but find public, permissionless blockchains inadequate for any reason.

Consortium blockchains can be considered an intermediate step between public and private blockchains.

Public blockchains are the original and most widespread kind: the largest cryptocurrencies, such as Bitcoin (BTC) and Ethereum (ETH), belong to this type. They have a permissionless, decentralized nature: anyone can access their networks and become an equal-rights participant if they chose to do so.

Private blockchains, on the other hand, are designed by corporations to be used exclusively within their own organization. They do not allow any outside agents access to their networks and are managed in a centralized manner.

Consortium blockchains occupy the middle ground between these two types. They are designed collectively by groups of companies that want to use a common decentralized network that no entity outside of the consortium can gain access to.

Consortium blockchains enjoy a certain degree of decentralization over private blockchains, as all companies in the network are independent and can collaborate as equals, with no single node being able to force its will on others.

At the same time, they restrict access from outside of the consortium, protecting sensitive corporate data and reducing the load placed on the network by large numbers of nodes that otherwise might have decided to participate in it.