Description

Proof of Authority (PoA) is a blockchain consensus mechanism where a limited number of pre-approved validators (or authorities) are responsible for verifying transactions and creating new blocks. Unlike Proof of Work (PoW) or Proof of Stake (PoS), PoA does not rely on computational power or token holdings—instead, it depends on the identity and reputation of the validators.

It is commonly used in private or consortium blockchains, as well as in testnets and some Layer 2 solutions where speed and scalability are prioritized over full decentralization.

How It Works

  1. A group of trusted validators is selected based on identity, reputation, or affiliation.
  2. These validators take turns proposing and validating new blocks.
  3. The rest of the network accepts the block as valid based on the assumption that validators act honestly due to their public accountability.
  4. Malicious behavior leads to reputation damage or removal from the validator set.

There is no mining, and the energy cost is minimal.

Core Characteristics of PoA

FeatureDescription
Validator SelectionBased on identity/trustworthiness rather than stake or mining
Centralization LevelHigh – limited and identifiable group of validators
PerformanceFast block times and high throughput
SuitabilityBest for permissioned or hybrid blockchain systems
Security ModelBased on validator accountability, not economic incentives

Advantages of Proof of Authority

High Throughput – Block confirmation times are very fast
Low Energy Usage – No need for power-hungry mining equipment
Predictable Governance – Validators are known and can be audited
Simplicity – Easier to implement and maintain in enterprise environments
Scalability – Suitable for use cases needing consistent speed and performance

Disadvantages and Risks

Centralization – Limited validator set introduces trust assumptions
Censorship Risk – Validators could exclude or reverse certain transactions
Identity-Based Trust – Relies on the assumption that validators value their reputations
Less Resilience – More vulnerable to collusion or coercion
Not Ideal for Public Chains – Conflicts with the ethos of permissionless decentralization

Use Cases of PoA

Project/ChainUse Case
Ethereum KovanTestnet that uses PoA for speed and stability
VeChainSupply chain tracking with enterprise validators
POA NetworkEthereum sidechain using PoA consensus
xDAI ChainLow-fee stablecoin payments on a PoA network
Microsoft Azure BlockchainEnterprise blockchain templates often built with PoA

PoA vs Other Consensus Mechanisms

MechanismBasis for ValidationDecentralizationEnergy UsageSpeed
PoWComputational effortHighVery highModerate
PoSToken ownershipModerate–highLowFast
PoAIdentity/trustLowVery lowVery fast
DPoSElected validatorsModerateLowFast

Common Misconceptions

  • PoA is not inherently insecure, but it trades decentralization for speed.
  • Validators are not anonymous; public identity is crucial.
  • PoA is not suitable for highly adversarial environments like permissionless public chains.

Related Terms

  • Validator – Authorized entity that confirms blocks in PoA
  • Permissioned Blockchain – Requires approved access, often uses PoA
  • Reputation System – Underpins validator accountability
  • Delegated Proof of Stake (DPoS) – Related system using elected validators
  • Testnet – PoA is often used in test networks for stability