Quantix Protocol
Complete technical documentation for the post-quantum Layer 1 blockchain.
01Overview
Quantix is an open-source, post-quantum secure blockchain Layer 1 protocol written in Go. It is designed to provide cryptographic security that remains robust against both classical and quantum computing threats โ including attacks from sufficiently powerful quantum computers running Shor's or Grover's algorithms.
Traditional blockchains rely on ECDSA (Elliptic Curve Digital Signature Algorithm) for transaction signing. ECDSA is vulnerable to Shor's algorithm, which a quantum computer could use to derive private keys from public keys. Quantix eliminates this attack surface by replacing ECDSA with SPHINCS+, a stateless hash-based signature scheme standardized by NIST as a post-quantum standard.
Core Beliefs
- โPrivacy is a fundamental human right, not a luxury โ enforced by mathematics, not trust.
- โSovereignty means individuals should have complete control over their digital assets and identity.
- โHumanity must be preserved through technology that serves people, not surveillance systems.
02Architecture
Quantix is structured as a modular Go codebase with clear separation between layers:
Key Modules
src/consensus/PBFT engine, RANDAO beacon, VDF computation, validator set management, slashingsrc/core/Blockchain state, block execution, genesis, transaction types, wallet, SVM opcodessrc/crypto/SPHINCS+ implementation, SWIFFTX hash, STARK proofs, WOTS+ signaturessrc/handshake/X25519 + Kyber768 hybrid key exchange for node-to-node encryptionsrc/p2p/Peer discovery, connection management, message routingsrc/dht/Distributed Hash Table for peer discovery using 32-byte crypto secretssrc/pool/Mempool with nonce replay protection, balance checks, gas enforcementsrc/state/Storage abstraction, account state, LevelDB interface03Consensus
Quantix uses a hybrid consensus mechanism combining PBFT (Practical Byzantine Fault Tolerance) with Proof-of-Stake and VDF-based RANDAO for unpredictable, manipulation-resistant randomness.
PBFT + PoS
PBFT provides immediate finality โ once a block is committed, it cannot be reversed. The protocol requires โ2N/3โ + 1 votes (strictly more than two-thirds) for both prepare and commit phases. This ensures safety even if up to โ(N-1)/3โ validators are Byzantine.
RANDAO + VDF
Leader election uses a Verifiable Delay Function (VDF) over a class group to produce unbiasable randomness. The VDF requires sequential computation (~1,048,576 squarings) that cannot be parallelized, preventing last-revealer grinding attacks.
- โNo commit/reveal phases โ VDF input is public at slot 0
- โ1022-bit discriminant โ canonical derivation from genesis
- โVDF proofs verified โ all sync messages require valid Wesolowski proof
Staking Parameters
04Cryptography
Every cryptographic primitive in Quantix is chosen to resist quantum attacks. This is not a future upgrade โ it is the current implementation.
A stateless hash-based signature scheme standardized by NIST as FIPS 205. Unlike ECDSA, SPHINCS+ security is based entirely on the collision resistance of hash functions โ which quantum computers cannot efficiently attack. Key sizes are larger than ECDSA but the security guarantees are provably post-quantum.
CRYSTALS-Kyber (now ML-KEM, NIST FIPS 203) is a lattice-based key encapsulation mechanism. Quantix uses a hybrid X25519 + Kyber768 handshake: the X25519 component provides classical security while Kyber768 provides post-quantum security. Both must be broken for the handshake to be compromised.
A lattice-based hash function candidate with provable security under worst-case lattice hardness assumptions. Used for block hashing and state root computation. Its security reduces to the hardness of SIVP (Shortest Independent Vectors Problem) on certain lattices.
Scalable Transparent ARguments of Knowledge. STARKs require no trusted setup (transparent), use only hash functions (post-quantum secure), and produce succinct proofs that can be verified quickly. Used for proving computational integrity without revealing the computation itself.
05Tokenomics
Token Details
Supply Distribution
Fee Structure
Transaction fees in Quantix use a gas model similar to Ethereum but with post-quantum signature overhead accounted for in gas calculations. Gas limit and gas price are set by the transaction sender. Block gas limit is 10,000,000 units per block.
06Network
P2P Protocol
Nodes communicate via TCP for block propagation and consensus messages, and UDP for peer discovery via DHT. All node-to-node communication is encrypted using the hybrid X25519 + Kyber768 handshake. DHT authentication uses 32-byte cryptographic secrets generated via crypto/rand.
07Run a Node
Prerequisites
- โGo 1.24 or higher
- โLinux or macOS (Windows experimental)
- โ4GB RAM minimum (8GB recommended)
- โ50GB disk space
- โStable internet connection
Build from Source
# Clone the repository git clone https://github.com/ramseyauron/quantix.git cd quantix # Build the binary go build -o bin/quantix ./src/cli/main.go # Run a devnet validator node ./bin/quantix \ -nodes 1 \ -node-index 0 \ -roles validator \ -datadir ./data \ -http-port 0.0.0.0:8560 \ -udp-port 32421 \ -tcp-addr 0.0.0.0:32421
CLI Flags
-nodesNumber of nodes to initialize (default: 1)-node-indexIndex of the node to run (0 to N-1) (default: 0)-rolesComma-separated roles: validator, sender, receiver, none (default: none)-datadirDirectory for LevelDB storage (default: ./data)-http-portHTTP port for JSON API (default: 127.0.0.1:8560)-tcp-addrTCP address for P2P communication (default: 0.0.0.0:32307)-udp-portUDP port for peer discovery (default: 32308)-ws-portWebSocket port (default: 127.0.0.1:8600)-seedsComma-separated seed node UDP addresses 08API Reference
The Quantix node exposes a JSON HTTP API on port 8560 by default.
/Node status, blockchain info, available endpoints/blockcountReturns current block count/bestblockhashReturns the hash of the latest block/block/:idReturns full block data by height (0-indexed)/address/:addrReturns balance, total sent/received, tx count for an address/address/:addr/txsReturns all transactions for an address with direction (IN/OUT)/latest-transactionReturns the most recently submitted transaction/metricsPrometheus metrics endpoint/transactionSubmit a new transaction/mineTrigger devnet block mining (requires DEVNET_MINE_SECRET header)Transaction Format
{
"id": "tx-unique-identifier",
"sender": "0xSenderAddress",
"receiver": "0xReceiverAddress",
"amount": 1000000000000000000, {/* in nQTX (1 QTX = 10^18) */}
"gas_limit": 21000,
"gas_price": 1000000000, {/* in nQTX */}
"nonce": 1, {/* must be > last nonce */}
"timestamp": 1712000000,
"signature": "" {/* SPHINCS+ signature (devnet: empty) */}
}09Security
Quantix underwent a comprehensive internal security audit in April 2026 covering cryptographic correctness, consensus safety, transaction validation, network security, and code quality. All 27 findings were resolved before devnet launch.
Key Security Properties
- โPBFT quorum uses โ2N/3โ + 1 (correct BFT threshold)
- โRANDAO sync requires VDF proof verification โ no unauthenticated state overwrites
- โDHT uses 32-byte crypto/rand secrets โ not brute-forceable
- โAll node key material is never logged (removed from all code paths)
- โHTTP rate limiting: 100 req/s per IP with burst cap of 20
- โCORS restricted to configured origins (via CORS_ALLOWED_ORIGINS env var)
- โTransaction nonce replay protection in mempool
- โ/mine endpoint requires DEVNET_MINE_SECRET header
- โVDF parameters unified to single strong code path (1022-bit discriminant)
10Roadmap
- โReal state execution (ExecuteBlock)
- โPersistent account state (LevelDB)
- โBalance validation in mempool
- โCI/CD pipeline
- โUnit test coverage โฅ70%
- โ4-validator PBFT consensus
- โNode sync protocol
- โNetwork partition handling
- โDocker multi-node setup
- โPrometheus + Grafana monitoring
- โProduction DHT peer discovery
- โValidator join/leave protocol
- โLoad testing (1000 tx/s)
- โExternal security audit
- โComplete documentation
- โPublic validator onboarding
- โBug bounty program
- โFaucet for test QTX
- โBlock explorer public launch
- โCommunity governance proposal