What are the algorithms that can be used to implement proof of authority in a private blockchain?

What are the algorithms that can be used to implement proof of authority in a private blockchain
Introduction: 
Several algorithms can be used to implement proof of authority in a private blockchain. The Practical Byzantine Fault Tolerance (PBFT) algorithm is the most popular. Other algorithms that can be used include the Proof-of-Stake (PoS) algorithm and the 
Delegated Proof-of-Stake (DPoS) algorithm. The PBFT algorithm is a consensus algorithm used to achieve fault tolerance in 
distributed systems. The PBFT algorithm is based on the concept of Byzantine generals, which states that more than two-thirds of generals (i.e., nodes in a distributed system) are honest for the system to be secure. 
 
The PoS algorithm is an alternative to the PoW algorithm. The PoS algorithm is based on the concept of stake, the amount of money a node has invested in the system. The more money a node has funded, the more likely the node will be honest. The DPoS algorithm is similar to the PoS algorithm but uses delegates instead of investors. The community elects representatives, and they are responsible for validating 
transactions and maintaining the blockchain. These are just some algorithms that can implement proof of authority in a private blockchain. Many other algorithms can be used, depending on what type of consensus mechanism you want to use for your blockchain. 
 
What are its ten benefits? 
1. Proof of authority is a more energy-efficient consensus algorithm than proof of work: It 
doesn’t require expensive mining hardware or a lot of electricity to run. 
 
2. Proof of authority is more secure than proof of work: Since no miners are competing to 
add blocks to the blockchain; there is no incentive for anyone to try to attack the network. 
 
3. Proof of authority is faster than proof of work: Since there is no need to wait for miners to find 
new blocks, transactions can be confirmed much faster on a proof of authority blockchain. 
 
4. Proof of authority is more decentralized than proof of work: Since there is no need for centralized mining pools, the power over the network is more evenly distributed among the participants. 
 
5. Proof of authority is more scalable than proof of work: Since there is no need to wait for 
miners to find new blocks, the network can scale more easily. 
 
6. Proof of authority is more private than proof of work: Since there is no need to publicly 
announce new blocks, the participants’ identities can be kept more private. 
 
7. Proof of authority is more flexible than proof of work: The rules of evidence of authority 
blockchain can be changed more easily than those proof of work blockchains. 
8. Proof of authority: 
POA is more resistant to 51% of attacks than proof of work: Since there is no need 
for a majority of miners, to be honest, for the network to function properly, it is much 
harder for someone to mount a 51% attack. 
9. Proof of authority: 
It is more resistant to Sybil attacks than proof of work: Since there is no need 
for a majority of miners, to be honest, for the network to function properly, it is much 
harder for someone to mount a Sybil attack. 
10. Proof of authority:
It is more environmentally friendly than proof of work: Since it doesn’t 
require expensive mining hardware or a lot of electricity to run, proof of power is more 
ecologically friendly than proof of work. 
Conclusion:
Proof of authority is a more efficient, secure, faster, decentralized, scalable, private, flexible, and environmentally friendly consensus algorithm than proof of work.