Home > Today’s Crypto News
bitcoin
bitcoin

$93113.538616 USD

-0.11%

ethereum
ethereum

$1748.590950 USD

-2.15%

tether
tether

$1.000392 USD

0.02%

xrp
xrp

$2.177851 USD

-1.16%

bnb
bnb

$600.317897 USD

-0.84%

solana
solana

$151.339663 USD

1.47%

usd-coin
usd-coin

$0.999927 USD

0.01%

dogecoin
dogecoin

$0.179240 USD

2.45%

cardano
cardano

$0.707230 USD

2.73%

tron
tron

$0.243466 USD

-0.61%

sui
sui

$3.323843 USD

10.76%

chainlink
chainlink

$14.828095 USD

0.41%

avalanche
avalanche

$21.905207 USD

-0.82%

stellar
stellar

$0.275988 USD

4.91%

unus-sed-leo
unus-sed-leo

$9.206268 USD

0.44%

Consortium Blockchain

What Is a Consortium Blockchain?

Consortium blockchains are created and used by groups of corporations when they want to enjoy the advantages in exchanging value and information offered by a distributed ledger but find public, permissionless blockchains inadequate for any reason.

Consortium blockchains can be considered an intermediate step between public and private blockchains.

Public blockchains are the original and most widespread kind: the largest cryptocurrencies, such as Bitcoin (BTC) and Ethereum (ETH), belong to this type. They have a permissionless, decentralized nature: anyone can access their networks and become an equal-rights participant if they chose to do so.

Private blockchains, on the other hand, are designed by corporations to be used exclusively within their own organization. They do not allow any outside agents access to their networks and are managed in a centralized manner.

Consortium blockchains occupy the middle ground between these two types. They are designed collectively by groups of companies that want to use a common decentralized network that no entity outside of the consortium can gain access to.

Consortium blockchains enjoy a certain degree of decentralization over private blockchains, as all companies in the network are independent and can collaborate as equals, with no single node being able to force its will on others.

At the same time, they restrict access from outside of the consortium, protecting sensitive corporate data and reducing the load placed on the network by large numbers of nodes that otherwise might have decided to participate in it.