Explorer
Close

REACH OUT TO US

For fastest response
please contact Centrix
team on Discord or
Telegram. Email will
have slower response
times.

info@e.centrix.fi

Technology

Tech!

New Cryptocurrency TechnologyCentrix, born to bridge fair distribution & centralization

CLC

Centrix was created to bridge the gap between fair distribution and centralization, ensuring an equitable ecosystem for all participants.

By combining cutting-edge blockchain technology with a unique Chain of Ownership protocol, Centrix provides transparency, security, and decentralization without compromising on efficiency.

As the crypto space evolves, Centrix stands at the forefront, offering a balanced approach that empowers users while maintaining robust infrastructure and system integrity. Join Centrix, where innovation meets fairness in the digital economy.

Why Centrix Is Different

A Superior Approach to Digital Currency

Centrix Core

Centrix reimagines how digital currencies should work by separating transaction processing from mining operations. Unlike traditional blockchain systems where every transaction must be mined, validated by consensus, and added to blocks, Centrix transactions can occur independently of the mining/blockchain side of operations.

Transaction Speed Transactions are processed instantly without waiting for block confirmations
Enhanced Security Mathematical signatures ensure coins cannot be forged even if servers are compromised
Improved Scalability System can handle high transaction volumes without throughput limitations
Energy Efficiency Separation of mining from transactions creates a more sustainable system
User Privacy Private keys never touch Centrix servers, remaining on user devices

By using a centralized ledger with our unique Chain-of-Ownership protocol, Centrix eliminates the inefficiencies of traditional blockchain systems while maintaining the security and integrity benefits. This hybrid approach delivers the best of both worlds: the speed and efficiency of centralized systems with the security and verification capabilities of decentralized networks.

The Technology

Hybrid Architecture Model

Centrix Core

Centrix combines decentralized distribution with centralized architecture for enhanced security, speed, and privacy. Our "Chain-of-Ownership" protocol eliminates mining requirements for transactions while maintaining integrity across the network.

Security Example

Even if Centrix servers were compromised, coins cannot be forged due to mathematical signatures. Private keys never touch our servers and remain exclusively on the user's device, making theft virtually impossible.

Coin Structure

Centralized Ledger Entries

Centrix Core

Centrix is based on a centralized ledger where each coin is stored as a JSON entry. This format offers excellent performance without requiring encryption, making heavier database solutions unnecessary. Each coin contains several critical components defining its identity and history.

Genesis Time Creation timestamp
Mined Hash Ignored if split from another coin
Mined Difficulty Difficulty level at mining time
Seed Seed used for mining
paidFee Boolean for transaction eligibility
val Current coin value in CLC
Transaction List History of ownership changes

Coin Structure Example

{
  "id": "clc_2d5f8a9c7b3e",
  "genesis": 1683214795,
  "mined_hash": "00a4f2e8d1c7b9...",
  "mined_difficulty": 12,
  "seed": "e7c3b5a9d1f8...",
  "paidFee": true,
  "val": 1.0,
  "transactions": [
    {
      "holder": "3a7c9d2e5f8b...",
      "signature": "9c7b3e5a8d2f..."
    },
    {
      "holder": "7d9e2f5a8c3b...",
      "signature": "5e7d9c2a3f8b..."
    }
  ]
}

Transaction System

Chain-of-Ownership Protocol

Centrix Core

Each coin maintains a transaction list that forms a complete chain of ownership. Every transaction requires proper holder identification and cryptographic signatures, while our advanced merge transaction system enables value transfers between coins through a sophisticated validation mechanism.

Transaction Requirements

  • New holder identification
  • Signature proving previous owner authorization

Merge Transaction Components

  • target - ID of coin to merge to
  • height - length of transactions in target (prevents signature reuse)
  • originSignature - signature of initiating coin
  • vol - value transfer amount (positive or negative)

Standard Transaction Example

{
  "holder": "7d9e2f5a8c3b...",
  "signature": "5e7d9c2a3f8b..."
}

Merge Transaction Example

{
  "holder": "7d9e2f5a8c3b...",
  "signature": "5e7d9c2a3f8b...",
  "merge": {
    "target": "clc_9a8b7c6d5e4f",
    "height": 3,
    "originSignature": "2b4c6d8e9f1a...",
    "vol": 0.5
  }
}

Anti-Forgery Security

Why Coins/Transactions Cannot Be Forged

Centrix Core

The Centrix system is designed from the ground up to prevent forgery and unauthorized coin manipulation, using a security model that does not rely on traditional username/password authentication but instead on mathematical cryptography principles that make coins and transactions unforgeable.

Cryptographic Signatures Each transaction requires a cryptographic signature that can only be generated with the private key of the current coin owner
Client-Side Private Keys Private keys never leave the user's device, making it impossible for attackers to generate valid signatures even if they compromised Centrix servers
Chain-of-Ownership Verification Complete transaction history in each coin allows verification of the entire ownership chain, making it impossible to forge or manipulate coins
Transaction Height Validation The "height" parameter in merge transactions prevents signature reuse attacks by tracking the length of transaction chains
JSON Structure Integrity The JSON database is secure not because of access control, but because the content itself is mathematically verifiable and cannot be tampered with

Why Traditional Authentication Is Not Used

Centrix does not rely on usernames and passwords for security as traditional systems do. Instead, the security is built into the data structure itself. Even if an attacker gained full database access, they couldn't:
1. Create valid signatures without the corresponding private keys
2. Modify existing transactions without breaking the cryptographic chain
3. Inject forged coins into the system as they would fail validation
4. Reuse signatures due to the height parameter tracking

Security in Practice: Forge Attempt Example

// Attack scenario: Attacker has full server access
// and attempts to create a forged transaction

// 1. Attacker tries to add a transaction to a coin
coinData.transactions.push({
  "holder": "attackerAddress...",
  // Problem: Cannot create a valid signature
  "signature": "???" // Would fail verification
});

// 2. Attacker tries to create a new coin
const forgedCoin = {
  "id": "clc_forged123456",
  "genesis": Date.now(),
  "val": 1000.0,
  // Problem: Can’t create Coin because can’t create validate Mined Hash that correlates to the holder": [...]
};

// Both attacks fail due to cryptographic verification