Download documents
Download documents

Blockchain infrastructure
for the Internet of tomorrow

Quantum-safe distributed network for low-level services.

Scroll Down
Framework advantages
Our framework is based on an original sharding implementation: it is based on high-performance Cells — [DAG+Blockchain] elementary units which performance can achieve up to 100,000 TPS.
Cellframe is a low-level architecture solution built on plain C. It efficiently interacts with hardware, and it can be launched on a wide range of devices: your smartphone, laptop, enterprise server system, or even a smart fridge.
Cellframe is protected by the implementation implemented post-quantum cryptographic signatures by default with an encryption variability feature. We have almost 0% of third party code.
Interchain communication
Read more about the architecture of Cellframe interchain communications in our blog.

The Future of dApps and digital economy rely on the fast and secure transfer of value and information across public and private blockchains.

Interoperability is a hot topic in the industry, widely researched and developed by a number of experienced teams. Nevertheless, at the moment, there is no ready-to-use solution for blockchain interoperability.

Cellframe is developing a solution for inter-blockchain communications, based on the Cells approach and p2p communications model.



The Quantum Threat is real

A Quantum computer with logical qubits is coming in the next 10-15 years. The NSA (US National Security Agency) and NIST (National Institute of Standards and Technology) are preparing for it and developing standards for post-quantum cryptography since 2015.

Read more about quantum computing and its threat to financial system and blockchains in our blog.

PQ Encryption by default
We had successfully implemented several quantum resistant signatures including finalists of the second round of NIST PQC contest, and we will implement several more by 2021.
Encryption Variability
Due to current uncertainty regarding the question “which perspective PQ signatures would be truly quantum-resistant, and which not?” feature of encryption variability is the one option to build quantum-safe systemTruly quantum resistant system
Quantum Keys
Quantum Keys. Implementation of a quantum key exchange by Q3 2020.
Framework implementations
Framework implementations
Blockchain Interoperability
Features :
Cellframe provides interoperability by using Cell bridges to public blockchains. You can connect several blockchains into a single system including integration of public blockchains.
Distributed VPN and Content Delivery Network (CDN)
Features :
Free to use (torrent base logic of use, bandwidth sharing economy), quantum safe encryption, DPI resistant (AI driven algorithm protects your data from deep packet inspection (i.e. Golden Shield, etc.), throughput is limited only by the number of nodes around the user, traffic management system (traffic flows not the shortest way but the fastest one)
Status :
VPN (ready to launch), CDN (soon)
Blockchain framework
Features :
The open source framework for launching fully customizable and scalable subchains, interoperable by design in Cellframe ecosystem
Learn more
MIRROR CHAINS: a solution for protection public and private blockchains from terminal attacks.
Features :
Doesn’t affect blockchain performance, restores latest state in case of the attack and can be used for interoperability features.
Status :
80% ready
Learn more
Second Layer Solutions
Features :
Cellframe Cells can act as second layer solutions for existing public chains, e.g., Ethereum or almost any other layer one platform. It may work as a sidechain for throughput outsourcing.
Learn more
Audio/video streaming
Features :
Protocol for streaming audio and video content across Cellframe network using quantum safe encrypted channel without affecting the user experience.
Status :
70% ready
Learn more
Edge computing
Features :
Edge computing is a form of fog computing carried out on edge devices (smartphones, laptops, pcs) as close as possible to the source of the task. Computational task is divided between swarm (or fog) of devices concentrated around the initiator to reduce time, avoid potential pollution of the traffic channel and lower the cost of the mistake
Status :
Learn more
01/ 01
Fight censorship,
Support freedom of the net!

Download first blockchain VPN that protects your privacy and traffic even from quantum and supercomputer attacks

Coming soon
Coming soon
Light node - fits to any
Almost unlimited TPS scaling
in interconnected network
Military grade encryption
by default
Up to 10,000 TPS
per one CPU core
Areas of implementation
Notaries, lawyers
Document verification within notary institutions .
Management companies
Tracking tenants, advertisers (marketplace), rules of safety and security
Universities, training centres, online schools
Issuance of certificates, diplomas, their validity check
Managing driver/weapon licences
Issuance of the rights to bear arms, registration of weapons, the right to drive (auto, boat, airplane).
Confirmation of invariability and authorship of comments/reviews (+ KYC)
Real Estate
Registration of land and objects: realtor information, rental rates, apartment history
Labor Records
Employee and employer labour market history. Review of competencies, recommendations, cases, partnerships.
Tracking the facts of access to protected objects, decrease of the number of operations with increased system security
Plants and factories
Registry of the facts of unauthorised access to information, incorrect system behaviour, productivity and other indicators
Airport, railway
Check-in procedure with a verified multi-passport, baggage tracking
Casino, gambling
Transparency of rates and coefficients
Branch organisations
Instant protected sync. of document workflow
Reservations, feedback on services, loyalty programs
Easy access to documents (visas, reservations, tickets, passes)
Taxi, car sharing
Identification and authorisation of drivers based on verified data
Professional sport
Medal register, achievements, awards, records, commission meetings, judiciary boards
Visa centres, embassies
Visa issuance process with less actions, visa check
Police, hospitals
Medical certificates, analyses, health indicators, doctor visits, police records, protocols.
Internet of Things
M2M data and commands exchange
Identification of a person through KYC
Audit of merchandising tasks (layout, availability of goods, the authenticity of the manufacture date)
Transport companies
Documentation: transit visa, export declaration, CMR, bill of lading for shipping by sea, AWB, DF, accounts and others
Payments, single ledger format of credit and transaction history for banks
01/ 01