What are the algorithms that can be used to implement proof of authority in a private blockchain?

What are the algorithms that can be used to implement proof of authority
Introduction: 
Several algorithms can be used to implement proof of authority in a private blockchain. The Practical Byzantine Fault Tolerance (PBFT) algorithm is the most popular. The PBFT algorithm is a consensus algorithm used to achieve fault tolerance in distributed systems. The PBFT algorithm is based on the concept of Byzantine generals, which states that more than two-thirds of generals (i.e., nodes in a distributed system) are honest for the system to be secure. Other algorithms that can be used include the Proof-of-Stake (PoS) algorithm and the Delegated Proof-of-Stake (DPoS) algorithm. 
 
The PoS algorithm is an alternative to the PoW algorithm. The PoS algorithm is based on the concept of stake, the amount of money a node has invested in the system. The more money a node has funded, the more likely the node will be honest. The DPoS algorithm is similar to the PoS algorithm but uses delegates instead of investors. The community elects representatives, and they are responsible for validating transactions and maintaining the blockchain. These are just some algorithms that can implement proof of authority in a private blockchain. Many other algorithms can be used, depending on what type of consensus mechanism you want to use for your blockchain. 
What are its ten benefits: 
1. Efficiency:
Proof of authority is a more energy-efficient consensus algorithm than proof of work. It doesn’t require expensive mining hardware or a lot of electricity to run.
2. Security:
Proof of authority is more secure than proof of work. Since no miners are competing to add blocks to the blockchain, there is no incentive for anyone to attack the network. 
3. Speed:
Proof of authority is faster than proof of work: Since miners do not need to wait to find new blocks, transactions can be confirmed much faster on a proof of authority blockchain. 
4. Decentralization:
Proof of authority is more decentralized than proof of work: Since there is no need for centralized mining pools, the power over the network is more evenly distributed among the participants. 
5. Scalability
Proof of authority is more scalable than proof of work: Miners do not need to wait to find new blocks so that the network can scale more easily.
6. Privacy:
Proof of authority is more private than proof of work: Since there is no need to announce new blocks publicly, the participants’ identities can be kept more private.
7. Flexibility: 
Proof of authority is more flexible than proof of work: The rules of proof of authority blockchain can be changed more easily than a proof of work blockchain.
8. Hard to hack:
Proof of authority is more resistant to 51% of attacks than proof of work: Since there is no need for a majority of miners, to be honest, for the network to function properly, it is much harder for someone to mount a 51% attack.
9. Resistant:
Proof of authority is more resistant to Sybil attacks than proof of work: Since there is no need for a majority of miners, to be honest, for the network to function properly, it is much harder for someone to mount a Sybil attack.
10. Environment free:
Proof of authority is more environmentally friendly than proof of work: Since it doesn’t require expensive mining hardware or a lot of electricity to run, proof of authority is more environmentally friendly than proof of work.
Conclusion:
Proof of authority is a more efficient, secure, faster, decentralized, scalable,
private, flexible, and environmentally friendly consensus algorithm than proof of work.