Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Permissioned Blockchain

1 min read
Pronunciation
[per-mish-uhnd blok-cheyn]
Analogy
A permissioned blockchain is like a private country club where membership is by invitation only. Even after joining, different members may have different privileges—some can only attend events, others can vote on club decisions, and only a select few can modify the club's bylaws.
Definition
A blockchain network where participation is restricted to identified and approved entities, with access controls governing who can read the chain data, submit transactions, or participate in the consensus process.
Key Points Intro
Permissioned blockchains prioritize control, compliance, and defined governance over open access.
Key Points

Restricts network participation to identified and vetted organizations or individuals.

Typically offers higher transaction throughput than public networks.

Provides greater privacy for sensitive business or personal data.

Often uses consensus mechanisms that don't require energy-intensive mining.

Example
Hyperledger Fabric powers supply chain tracking systems where only authorized participants like manufacturers, distributors, and retailers receive permission to validate transactions and access sensitive pricing data while maintaining a common record of product movements.
Technical Deep Dive
Permissioned blockchains implement identity and access management layers that don't exist in permissionless systems. These networks typically employ Byzantine Fault Tolerant consensus mechanisms like Practical Byzantine Fault Tolerance (PBFT), Raft, or Proof of Authority that work efficiently with a limited set of identified validators, enabling higher throughput and faster finality than proof-of-work systems. The permission structure often includes multiple layers: network access permission (who can connect), transaction submission permission (who can send transactions), validation permission (who can participate in consensus), and administrative permission (who can modify network parameters). These networks frequently implement advanced privacy features like private transactions, confidential assets, or zero-knowledge proofs to protect sensitive business information while still providing verification capabilities.
Caveat
While permissioned blockchains offer advantages in compliance and performance, they sacrifice some of the core value propositions of blockchain technology, including censorship resistance, trustless operation, and open innovation. Critics argue that many permissioned systems could be replaced by traditional distributed databases with cryptographic verification.

Permissioned Blockchain - Related Articles

No related articles for this term.