defi

Nominated Proof of Stake Explained for Beginners

Learn what Nominated Proof of Stake (NPoS) is, how it works, and how it differs from DPoS. Includes a practical Polkadot example and clear explanations for beginners.

Nominated Proof of Stake Explained for Beginners

Nominated Proof of Stake (NPoS) is a consensus mechanism used by blockchain networks to achieve security, scalability, and decentralization without consuming excessive energy. It extends the basic proof-of-stake model by introducing two distinct roles – nominators and validators – who work together to maintain the network. This design ensures that token holders can participate in consensus even if they lack the technical expertise to run a full node.

How Nominated Proof of Stake Works

At its core, Nominated Proof of Stake allows token holders to deposit their coins as a sign of commitment to the network, but with a crucial twist. Instead of every staker directly validating transactions, NPoS separates the community into two groups: validators (who produce new blocks and finalize transactions) and nominators (who select which validators to back with their stake). This two-tier structure keeps the validator set limited and efficient while giving many token holders a voice in governance.

When a nominator stakes their tokens to one or more validators, they are effectively saying, “I trust this validator to act honestly.” In return for putting their tokens at risk, both the nominator and the validator receive rewards from the network’s inflation or transaction fees. However, if a validator behaves maliciously – for example, by signing conflicting blocks – a portion of the validator’s stake is slashed (destroyed), and the nominators who backed that validator also lose part of their delegated stake. This accountability aligns incentives and discourages bad behavior.

The Selection Process in NPoS

Unlike Delegated Proof of Stake (DPoS), where token holders vote for a fixed number of delegates and the top vote-getters become validators, NPoS uses an algorithmic selection process called the Phragmén method (a proportional allocation algorithm). The network runs this algorithm periodically to choose the optimal set of validators based on the stake each nominator has assigned. The goal is to maximize the total stake behind the active validator set while distributing influence fairly among nominators. This prevents a small group of wealthy token holders from dominating the network.

The Roles in Nominated Proof of Stake: Nominators and Validators

Understanding the two roles in NPoS is essential for anyone considering staking their tokens.

  • Validators are the nodes that actually produce blocks and participate in finality. They must run specialized software, maintain high uptime, and often need to bond a minimum amount of their own tokens. Validators are rewarded for honest work and can be punished through slashing if they break protocol rules.
  • Nominators are token holders who do not wish to run a node themselves. They back one or more validators by placing their tokens as stake behind them. Nominators earn a share of the validator’s rewards, but they also share the risk: if the validator gets slashed, nominators lose part of their delegated stake proportionally.

Key Differences Between DPoS and NPoS

AspectDelegated Proof of Stake (DPoS)Nominated Proof of Stake (NPoS)
Selection methodSimple vote, top N delegates winPhragmén algorithm yields proportional representation
Stake distributionVotes are equal, not weighted by stake amountStake weight determines influence within allocation limits
Slashing riskNominators seldom face slashingNominators are directly slashed if their validator misbehaves
Stake lockingTypically locked for a fixed periodTokens are locked but can be released after a cooling period (no fixed bond period)
Participation levelVoting is often low-friction but can favor whalesActive selection required; nominators must choose validators carefully

This table shows that NPoS encourages deeper engagement from nominators because their financial risk is real. It also prevents vote-buying schemes common in DPoS systems where a few exchanges can accumulate enormous voting power.

What Sets Nominated Proof of Stake Apart in Security and Decentralization

NPoS achieves stronger security guarantees than many other proof‑of‑stake models. Because the Phragmén algorithm distributes stake proportionally, the network can support a larger set of validators without sacrificing performance. For example, the Polkadot network runs over 200 validators at any given time, each backed by many nominators. This makes it very expensive for an attacker to accumulate enough stake to control a majority of validators.

Decentralization is also enhanced because nominators can distribute their stake across multiple validators. A nominator with 10,000 tokens might back five different validators with 2,000 tokens each. If one validator behaves badly, the nominator only loses the 2,000 tokens assigned to that validator – not the whole pool. This risk‑mitigation strategy encourages broader participation from average token holders who might otherwise be reluctant to stake.

Practical Example: How NPoS Functions on the Polkadot Network

To see Nominated Proof of Stake in action, consider Polkadot, one of the earliest and largest blockchains to adopt NPoS.

  1. Staking setup: A token holder (Alice) owns DOT tokens. She decides to become a nominator. She locks her tokens into the network’s staking system and selects three validators she trusts – let’s call them Validator A, B, and C.

  2. Phragmén allocation: At the start of each era (a few hours long), the network runs the Phragmén algorithm. It considers Alice’s choice along with thousands of other nominators. The algorithm decides that Validators A and B will be part of the active set, but Validator C is not selected because the algorithm optimizes total stake.

  3. Rewards and risk: While Validators A and B are active, they produce blocks and earn rewards. Alice receives a portion of those rewards based on the fraction of their total stake she provided. If Validator A tries to censor a transaction or goes offline for too long, the network slashes a percentage of the validator’s own stake – and Alice loses a proportional amount of her delegated stake.

  4. Changing selections: Alice can unbound her tokens (a cooling period of 28 days on Polkadot) or switch to different validators at any time. This flexibility allows her to react quickly if a validator’s performance drops.

This practical example shows that NPoS is not a “set and forget” system – nominators must actively manage their selections to maximize rewards and minimize slashing risk.

Conclusion: Why Nominated Proof of Stake Matters for the Future of Blockchain

Nominated Proof of Stake offers a middle ground between full proof of stake (where every staker is a validator) and delegated models (where voting power can be easily bought). By combining proportional allocation with shared slashing risk, NPoS creates a system where security increases as more token holders participate, yet technical barriers remain low for nominators. As blockchain networks seek to scale without sacrificing decentralization, NPoS provides a proven blueprint – already running on Polkadot, Kusama, and other modern chains. For beginners, understanding NPoS opens the door to staking with confidence, knowing your tokens are not just sitting idle but actively securing a network you believe in.