Section V: Permissioned Chains
April 9, 2026
Key idea: permissioned ledgers fit when multiple known organizations need a shared record without a single administrative owner.
| Dimension | Permissionless | Permissioned |
|---|---|---|
| Participation | Open | Curated |
| Identity | Pseudonymous / economic | Named / authenticated |
| Sybil resistance | Resource cost | Admission control |
| Ordering | Chosen by miner / proposer selection | Often handled by explicit leaders or ordering services |
| Finality | Often probabilistic | Often deterministic |
| Governance | Social + economic | Administrative + policy-driven |
| Failure Concentration | Broadly distributed influence | More risk from small control-plane failures |
Key idea: a permissioned ledger still distributes trust, but it distributes it through institutions and policy instead of open economic competition.
| Role | Responsibility | Why Separate? |
|---|---|---|
| Client / app | Submit business requests | Business activity ≠ admin control |
| Validator / endorser | Approve transactions | Requesters can’t self-approve |
| Orderer / sequencer | Establish order | Sequencing ≠ business logic |
| Administrator | Manage config & membership | Power isn’t concentrated in one team |
| Auditor / observer | Review history & compliance | Oversight stays independent |
Blockchain does not protect a permissioned network from bad governance.
Governance is a critical component of any blockchain, and it has substantial ramifications for the differences between permissioned and permissionless networks.
| Compromised Target | Ability | Impact |
|---|---|---|
| Read / Audit Identity | Observe permitted records | Confidentiality loss, minimal control impact |
| Submit / Write Identity | Submit to blockchain | Fraudulent submissions, subversion of trust |
| Approval / Voting Identity | Approve transactions | Direct influence over commits to ledger |
| Ordering Service Identity / Role | Sequence accepted transactions | Availability loss or ordering disruption |
| Membership / Admin Identity | Add members, change policy, alter configuration | Highest level of concern; rules of the system can change |
Permissioned Ledger
Benefits:
Challenges:
Permissionless Ledger
Benefits:
Challenges:
Mutable Database
Benefits:
Challenges:
For each scenario, decide as a class: permissioned ledger, permissionless ledger, or mutable database?
| Scenario | Best Fit |
|---|---|
| A hospital system tracks patient consent records internally; one IT department controls all access. | Mutable DB |
| An open-source project wants anyone to verify that released binaries match audited source, with no central authority. | Permissionless |
| Competing shipping companies need a shared system to record cargo handoffs and provide tamper-evident records for customs audits. | Permissioned |
| A social media platform wants users to own their identity and post history even if the platform shuts down. | Permissionless |
| Three allied nations want a joint logistics ledger where no single country controls finality, restricted to vetted military units. | Permissioned |
| A retail chain needs a high-speed inventory system for one warehouse, managed by a single operations team. | Mutable DB |
| A consortium of banks needs to settle cross-border payments with shared finality; regulators can audit but not alter transactions. | Permissioned |
| A volunteer disaster-relief network wants any NGO to join and log aid distributions without a central coordinator. | Permissionless |

Permissioned Distributed Ledgers For Blockchain — Army Cyber Institute — April 9, 2026